160 likes | 296 Views
Network and System Support for Multi-Level Security. C. Edward Chow Department of Computer Science University of Colorado At Colorado Springs. Outline of the Talk. Motivation. Related Literature
E N D
Network and System Support for Multi-Level Security C. Edward Chow Department of Computer Science University of Colorado At Colorado Springs chow
Outline of the Talk • Motivation. • Related Literature • “A Model for Secure Multimedia Database System in a Distributed Environment”, by Joshi et al, Distributed Multimedia System Lab Purdue • XrML: eXtensible right Markup Language, www.xrml.org/about.asp. www.contentguard.com • “A Cryptographic Solution to Implement Access Control in a Hierarchy and More, by Ray et al. • Proposed Approach • Discussion chow
SGFR Features Psychology EvaluationStress Level Tracking Effectiveness of Tool Usage(Keyboard/Mouse Event Tracking,History of Commands, Mistakes, Popup Quiz?) Security Enhanced GroupwareInstant messenger(JabberX) Group Key ManagmentSecure Group Rekeying system(Keystone) Group Communication Server Instant Messaging Server (Jabber) chow
SGFR System Architecture SGFR Client SGFR Group Key Server SGFR Instant MessengerServer SGFR Client SGFR Client Group key distribution Registration/authentication Sign-in create/join chat groups Encrypt/Decrypt msgs using group key chow
Associate JabberX client with Keyserver and Jabber server • Users login to the Jabber server • If login successful, the client registers with the Keyserver. • When a user creates/joins a group, the Keyserver gives a key to the client. • When a user leaves the group, the Keyserver generates a new key for the remaining members of the group. chow
First group key assigned to… Same for the description of the 2nd key below Point out certificate User ganesh joining group g1 Output of the Keystone Server User ayen joining group g1 chow
Fig shows the encryption of the message from client to server. Fig shows the output of the Jabber server running on a machine chow
Secure Keystone Client Request • Show the key piece of calls that send request to Keystone server. • If it checks the server certificate ( show the code). • Show the code that handle the response • Show how Daemon process receive the group key and its format. Port # used. chow
Secure Keystone Client Verification • Show the code that • Accept the SSL request, • Verify the certificate of the client, chow
Keystone Access Control • Show the code that Compare the subject info with access list (show the file format of access List) chow
Keystone Server • Show how group key are generated and distributed, the related specification file. • Show how the group key are multicast. chow
Jabber-KeyStone Interface • Show how the modified Jabber code uses group key for encryption. chow
Group File Download & Display • Show how the client and server side code that implement remote image file download. chow
Testing Results • Table 1 time taken for client registration group join, group leave • Table 2 time taken for file transfer chow
Future work • Improve the file transfer capability using Reliable Multicast Transport Protocol. • Improve keystone’s error handling mechanism between keyserver/registrar and client manager. • Improve keystone client manager by moving it into socket layer and providing socket layer API between a client manager and data processor. • Integrate with multilevel secure document distribution system. chow