1 / 31

Software Quality and Infrastructure Protection for Diffuse Computing

FY2001 ONR CIP/SW URI. Software Quality and Infrastructure Protection for Diffuse Computing. Principal Investigator: Andre Scedrov Institution: University of Pennsylvania URL: http://www.cis.upenn.edu/spyce. STARTED IN MAY 2001. The SPYCE Team. Cynthia Dwork* (Microsoft)

neci
Download Presentation

Software Quality and Infrastructure Protection for Diffuse Computing

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. FY2001 ONR CIP/SW URI Software Quality and Infrastructure Protection for Diffuse Computing Principal Investigator: Andre Scedrov Institution: University of Pennsylvania URL:http://www.cis.upenn.edu/spyce STARTED IN MAY 2001

  2. The SPYCE Team • Cynthia Dwork* (Microsoft) • Joan Feigenbaum (Yale) • Joseph Y. Halpern (Cornell) • Patrick D. Lincoln* (SRI) • John C. Mitchell (Stanford) • Andre Scedrov (U Penn) • Vitaly Shmatikov* (SRI) • Jonathan M. Smith (U Penn) • Paul Syverson* (NRL)

  3. Project Coordination:Multi-Pronged Approach to Herding Research • Physical meetings (Dec ’01, Dec ’02) • Workshop on Economics and Information Security (May ’02) • Video conference (Oct ’01) • Teleconferences (joint, subgroups) • Email discussions • Organization and coordination centered at UPenn

  4. Main Theme: Diffuse Computing Managing and maintaining a computational infrastucture, distributed among many heterogeneous nodes that do not trust each other completely and may have incentives (needs, priorities).

  5. National CINC JFHQ Staff JF Component Service Component CIA STRATCOM JFLCC JFHQ CINC Plug NRO Other Agencies NCA DLA NRO Unified CINC NMCC JCS NIST JOC Prepare JISE ARFOR Element CINC IMO ONA JFHQ NSA SPACECOM JLRC Prepare JOC TCCC JWAC JISE JPRC IO Cell CONPLAN NSA 5.3.9 JWAC Theater JF HQ JLRC w/FDOs JFHQ JPRC Develop USMC Logistics USAF DIA NMJIC Navy Collaborative Planning Environment TRANSCOM DIA Support JFHQ JPG JRTOC SPSTF JCCC Army JFACC Support JPG external Sharpen Commands JCCC Theater JIC/JAC JFHQ MARFOR Element Functional ONA JIC Functional Inputs JIOC NSA Inputs JF HQ Mission 5.3.4 0.0 GNOSC Task 5.3.1 Compare Analysis JFHQ COE DISA Mission CINC MoE JFHQ Tactical 0.0 JFACC JFHQ STRATCOM RNOSC Assets RNOSC Revise NRO JISE/J2 Watch (JFACC) AFSPOC ONA JISE/J2 (JFMCC) JFHQ 5.3.4 ARSPOC JMOC SPOC JFHQ Compare Project NAVSPOC JAOC Develop MoP JCCC 5.3.5 Theater JIC/JAC Future 0.0 AFFOR Element JCCC JFHQ JFMCC COAE SPACECOM JFHQ JFHQ Operations NIMA JFMCC AOC End Analyze JMCG Determine State COAE 5.3.2 NOC 5.3.3 5.3.7 5.3.9 5.4 Desired TFCC CVIC/CDC Coast Guard Element CDR CDR CDR JFHQ JFHQ CINC End State TRANSCOM JCS Unified CINC Prepare Planning Select Command NOC AFFOR Element ETO Guidance COAE JCCC JISE/J2 (JSOTF) JFLCC NAVFOR Element NAVFOR Element NCA JCCC JSOTF JOC (JSOTF) JISE (JFLCC) CP Main JOC (JFLCC) SOCOM JSOTF POC MTACC/ACE COC CP Fwd Red Academia 0.0 MI TOC JPOTF Team Red Team Inputs NOC ACE NOC 5.3.6 DOCC 5.3.8 JFHQ OPFAC Interfaces in Wartime Scenario CDR JFHQ MARFOR Element ARFOR Element C4ISR Architecture

  6. Diffuse Computing • Paradigm developing rapidly as a result of • commercial computing markets • now-recognized potential of peer-to-peer computing and grid computing • the need for distributed network-centric systems, • Raises challenges for • system design, • software production, • the development of mechanisms ensuring stable equilibria of diffuse systems

  7. Smart devices diffuse into the environment…. Room ‘40s Desktop ‘80s Wearable ‘90s … with control and assurance Pervasive ‘00s SPYCE Objective:Scaleable High Assurance Develop fundamental understanding, models, algorithms, and network testbed, in order to reduce cost, improve performance, and provide higher reliability for networked operations across untrusted networks. Persistent Object Base CPU Mobile team Efficient Diffuse Multimedia Networking Incentive Compatibility Authorization Schemes CPU Secure Data Storage and Communication CPU CPU CPU Intelligent information processing

  8. Software Quality and Infrastructure Protection for Diffuse Computing scedrov@saul.cis.upenn.edu Web URL: http://www.cis.upenn.edu/spyce/ URI, 2001 March, 2003 Smart devices diffuse into the environment…. URI Objective Algorithms to model diffuse computing and achieve scaleable high assurance DoD capabilities enhancedReduced cost, improved performance, and higher reliability for networked operations across untrusted networks Room ‘40s Desktop ‘80s Wearable ‘90s … with control and assurance Pervasive ‘00s • Scientific/technical approach • Computing and networking elements diffusing into the environment need: • Local incentive-compatibility in global distributed computing • Scaleable authorization mechanisms • Assured communication • Experimental evidence • Sample Accomplishments • Local conditions for stable routes in interdomain routing • Anonymous communication • SPAM reduction algorithms • Content transcoding for heterogeneous clients • Kerberos V protocol analysis • Logic for reasoning about digital rights

  9. Conferences where we publish • Computer Security Foundations Workshop • Conference on Computer and Communication Security • International Information Security Conference • Workshop on Security and Privacy in Digital Rights Management • Conference on Electronic Commerce • Symposium on Principles of Distributed Computing • International Symposium on High-Performance Distributed Computing • Conference on Computer Communications • International Workshop on Web Content Caching and Distribution • International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems

  10. Conferences where we publish • Computer Security Foundations Workshop • Conference on Computer and Communication Security • International Information Security Conference • Workshop on Security and Privacy in Digital Rights Management • Conference on Electronic Commerce • Symposium on Principles of Distributed Computing • International Symposium on High-Performance Distributed Computing • Conference on Computer Communications • International Workshop on Web Content Caching and Distribution • International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems Keywords Computer Security Distributed Communication

  11. Project Themes July 2001 • Combines 4 complementary thrusts: • Incentive-compatibility in distributed computing • Authorization mechanisms • Secure data storage and retrieval • Communication protocols • Multi-institution experimental platform + systematic, formal treatment of underlying models, algorithms & data structures

  12. Today SPYCE areas of concentration • Market-based computation (incentive-compatibility) • Communication and security protocols analysis • Authorization mechanisms (trust management) • Privacy and anonymity • Networking, experimental platform

  13. Spyce Interaction Graph Andre John Cynthia Joan Vitaly Joe Jonathan Paul Patrick

  14. Spyce Interaction Graph • Protocol Analysis Andre John Cynthia Joan Vitaly Joe Jonathan Paul Patrick

  15. Spyce Interaction Graph • Protocol Analysis • Formal Methods for Cryptography Andre John Cynthia Joan Vitaly Joe Jonathan Paul Patrick

  16. Spyce Interaction Graph • Protocol Analysis • Formal Methods for Cryptography • Anonymity Andre John Cynthia Joan Vitaly Joe Jonathan Paul Patrick

  17. Spyce Interaction Graph • Protocol Analysis • Formal Methods for Cryptography • Anonymity • Privacy Andre John Cynthia Joan Vitaly Joe Jonathan Paul Patrick

  18. Spyce Interaction Graph • Protocol Analysis • Formal Methods for Cryptography • Anonymity • Privacy • Algorithmic Mech Design Andre John Cynthia Joan Vitaly Joe Jonathan Paul Patrick

  19. Spyce Interaction Graph • Protocol Analysis • Formal Methods for Cryptography • Anonymity • Privacy • Algorithmic Mech Design • Authorization Andre John Cynthia Joan Vitaly Joe Jonathan Paul Patrick

  20. Spyce Interaction Graph • Protocol Analysis • Formal Methods for Cryptography • Anonymity • Privacy • Algorithmic Mech Design • Authorization • Decision Theory Andre John Cynthia Joan Vitaly Joe Jonathan Paul Patrick

  21. Spyce Interaction Graph • Protocol Analysis • Formal Methods for Cryptography • Anonymity • Privacy • Algorithmic Mech Design • Authorization • Decision Theory • BGP Andre John Cynthia Joan Vitaly Joe Jonathan Paul Patrick

  22. Spyce Interaction Graph • Protocol Analysis • Formal Methods for Cryptography • Anonymity • Privacy • Algorithmic Mech Design • Authorization • Decision Theory • BGP • Digital Rights Andre John Cynthia Joan Vitaly Joe Jonathan Paul Patrick

  23. Presentations today • Feigenbaum Market-based computation • Halpern Communication and security protocols • Mitchell Authorization mechanisms • Everyone Poster Session • Lincoln Privacy and anonymity • Smith Networking

  24. Summary of Project: Multidisciplinary Research • Software Quality and Infrastructure Protection for Diffuse Computing • Algorithms to model diffuse computing and achieve scaleable high assurance • Multi-institution experimental platform

  25. FY2001 ONR CIP/SW URI Software Quality and Infrastructure Protection for Diffuse Computing Principal Investigator: Andre Scedrov Institution: University of Pennsylvania URL:http://www.cis.upenn.edu/spyce STARTED IN MAY 2001

  26. Diffuse Computing • Diffuse computing is an emerging paradigm in which computational task are performed by aggregated computational services, distributed over a network. • This paradigm, developing rapidly as a result of commercial computing markets, the now-recognized potential of peer-to-peer systems, and the need for distributed network-centric systems, raises challenges for system design, software production, and the development of mechanisms ensuring stable equilibria of diffuse systems.

  27. Project Meetings • URI kickoff meeting July 7 ‘01 (DC) • Video conference Oct 8 ’01 (Penn-SRI) • First board meeting Nov 5 ’01 (Penn) • Group meeting Dec ’01 (Calistoga, CA) • Workshop on Economics and Information Security May ’02 (Berkeley) • Second board meeting June 21 ’02 (Penn) • Third board meeting Sep 30 ’02 (Cape May) • Group meeting Dec ’02 (St. John,USVI) • Continuing visits among sites, teleconferences • Fourth board meeting Mar 31 ’03 (Penn)

  28. Persistent Object Base CPU Mobile team CPU CPU CPU CPU Intelligent information processing Diffuse Computing

More Related