Скачать презентацию Formalizing Security Requirements for Grids Syed Naqvi 1 Скачать презентацию Formalizing Security Requirements for Grids Syed Naqvi 1

4d308e7e86f0e23b7e5a8c10758fd530.ppt

  • Количество слайдов: 18

Formalizing Security Requirements for Grids Syed Naqvi 1, 2, Philippe Massonet 1, Alvaro Arenas Formalizing Security Requirements for Grids Syed Naqvi 1, 2, Philippe Massonet 1, Alvaro Arenas 2 1 Centre of Excellence in Information and Communication Technologies (CETIC) {syed. naqvi, philippe. massonet}@cetic. be 2 CCLRC Rutherford Appleton Laboratory {s. naqvi, a. e. arenas}@rl. ac. uk

Functional View of Grid Data Management taken from www. twgrid. org Application Metadata Service Functional View of Grid Data Management taken from www. twgrid. org Application Metadata Service Planner: Data location, Replica selection, Selection of compute and storage nodes Replica Location Service Information Services Security and Policy Executor: Initiates data transfers and computations Compute Resources Location based on data attributes Location of one or more physical replicas State of grid resources, performance measurements and predictions Data Movement Data Access Storage Resources European Research Network on Foundations, Software Infrastructures and Applications for large scale distributed, GRID and Peer-to-Peer Technologies 2

File. Stamp Architecture European Research Network on Foundations, Software Infrastructures and Applications for large File. Stamp Architecture European Research Network on Foundations, Software Infrastructures and Applications for large scale distributed, GRID and Peer-to-Peer Technologies 3

File. Stamp – Distributed File System Decentralized multi-writer file system – Based on a File. Stamp – Distributed File System Decentralized multi-writer file system – Based on a Peer-to-Peer technology – Self managing data storage location European Research Network on Foundations, Software Infrastructures and Applications for large scale distributed, GRID and Peer-to-Peer Technologies 4

File Redundancy Dynamic replica regeneration European Research Network on Foundations, Software Infrastructures and Applications File Redundancy Dynamic replica regeneration European Research Network on Foundations, Software Infrastructures and Applications for large scale distributed, GRID and Peer-to-Peer Technologies 5

File. Stamp – File Transfer Bit. Torrent Technology Moreover transfers can be interrupted and File. Stamp – File Transfer Bit. Torrent Technology Moreover transfers can be interrupted and restarted from the last transferred bytes European Research Network on Foundations, Software Infrastructures and Applications for large scale distributed, GRID and Peer-to-Peer Technologies 6

How to Express Requirements ? Specification language understandable by all the actors European Research How to Express Requirements ? Specification language understandable by all the actors European Research Network on Foundations, Software Infrastructures and Applications for large scale distributed, GRID and Peer-to-Peer Technologies 7

KAOS : Knowledge Acquisition in aut. Omated Specification Anti-Goal (Threats) Model Goal Model Responsibility KAOS : Knowledge Acquisition in aut. Omated Specification Anti-Goal (Threats) Model Goal Model Responsibility Model Operations Model http: //www. objectiver. com Constraints Model http: //faust. cetic. be Dardenne A. , Lamsweerde A. and Fickas S. , Goal-Directed Requirements Acquisition, Science of Computer Programming Vol. 20, North Holland, 1993, pp. 3 -50. http: //www. info. ucl. ac. be/Research/Publication/1993/SCP. ps. gz Lamsweerde A. , Elaborating Security Requirements by Construction of Intentional Anti-Models, Proceedings of ICSE’ 04, 26 th International Conference on Software Engineering, Edinburgh, May. 2004, ACM-IEEE , pp 148 -157. http: //www. info. ucl. ac. be/Research/Publication/2004/avl-Icse 04 -Anti. Goals. pdf European Research Network on Foundations, Software Infrastructures and Applications for large scale distributed, GRID and Peer-to-Peer Technologies 8

Goal Model European Research Network on Foundations, Software Infrastructures and Applications for large scale Goal Model European Research Network on Foundations, Software Infrastructures and Applications for large scale distributed, GRID and Peer-to-Peer Technologies 9

Responsibility Model European Research Network on Foundations, Software Infrastructures and Applications for large scale Responsibility Model European Research Network on Foundations, Software Infrastructures and Applications for large scale distributed, GRID and Peer-to-Peer Technologies 10

Operations Model European Research Network on Foundations, Software Infrastructures and Applications for large scale Operations Model European Research Network on Foundations, Software Infrastructures and Applications for large scale distributed, GRID and Peer-to-Peer Technologies 11

Constraints Model European Research Network on Foundations, Software Infrastructures and Applications for large scale Constraints Model European Research Network on Foundations, Software Infrastructures and Applications for large scale distributed, GRID and Peer-to-Peer Technologies 12

Overall Model European Research Network on Foundations, Software Infrastructures and Applications for large scale Overall Model European Research Network on Foundations, Software Infrastructures and Applications for large scale distributed, GRID and Peer-to-Peer Technologies 13

Refinement of Requirements Model European Research Network on Foundations, Software Infrastructures and Applications for Refinement of Requirements Model European Research Network on Foundations, Software Infrastructures and Applications for large scale distributed, GRID and Peer-to-Peer Technologies 14

Policy Templates European Research Network on Foundations, Software Infrastructures and Applications for large scale Policy Templates European Research Network on Foundations, Software Infrastructures and Applications for large scale distributed, GRID and Peer-to-Peer Technologies 15

Example Policy New replica of file is generated when an existing storage node is Example Policy New replica of file is generated when an existing storage node is failed European Research Network on Foundations, Software Infrastructures and Applications for large scale distributed, GRID and Peer-to-Peer Technologies 16

Further Treatment of the Derived Policies • Refinement of High level Policies into Operational Further Treatment of the Derived Policies • Refinement of High level Policies into Operational Policies – Determination of the resources that are needed to satisfy the requirements of the policy. – Translation of the high-level policies into operational policies that the system can enforce. – Verification that the lower level policies actually meet the requirements specified by the high level policies. • Implementation of Policies – Requires specific details of a particular system. – Formal representation techniques are employed. – Implemented in a specification language. European Research Network on Foundations, Software Infrastructures and Applications for large scale distributed, GRID and Peer-to-Peer Technologies 17

Conclusions • This work addresses issues related to formalizing Grid security requirements at the Conclusions • This work addresses issues related to formalizing Grid security requirements at the application level. • Our proposed technique is illustrated with the help of a case study of a data management system. • Results shows that formal security requirement models are not only helpful to derive security policies but also they can be employed for security rationale. • Our future directions include: – Refinement of security policies derived from the requirements model. – Work on negotiation protocols to assure service level security agreements. European Research Network on Foundations, Software Infrastructures and Applications for large scale distributed, GRID and Peer-to-Peer Technologies 18