首页> 外文学位 >Trusted data path protecting shared data in virtualized distributed systems.
【24h】

Trusted data path protecting shared data in virtualized distributed systems.

机译:受信任的数据路径可保护虚拟化分布式系统中的共享数据。

获取原文
获取原文并翻译 | 示例

摘要

While sharing data across distributed machines is critical for modern IT applications, it also raises issues of maintaining desired data privacy and protecting data from inappropriate disclosure. However, it is difficult to retain controls on the data that is being shared in environments where services can be composed and deployed dynamically across distributed providers. To protect sensitive information against potential risks of inappropriate disclosures, access rights of applications to data should not only depend on their functional characteristics, but also on their as well as the underlying systems' behaviors. Stated more explicitly, applications that are suspected of faulty, erroneous, or malicious behaviors, or that run on systems that may be compromised, should not be able to gain access to protected data or entrusted with the same data access rights as others.;There exist many sophisticated prevention-based mechanisms to eliminate risks of inappropriate disclosures. However, there are cases where such risks are associated with the core functionality of the system. This thesis tries to provide a remedy for scenarios where such risks cannot be directly eliminated. The idea is to detect existing risks, then evaluate whether it is tolerable to share certain information under such risks.;This thesis proposes a context flow model (CFC) that controls the information flow in a distributed system. Each service application along with its surrounding context in the distributed system is treated as a controllable principal. CFC defines an access control model that controls the information exchange between these principals. The access control model has three main parts. First, an online monitoring framework is used to evaluate the trustworthiness of context of the service applications and the underlining systems. Second, a trust-based access control (TBAC) specification determines the permitted information exchanges considering the active contexts of the service applications. Third, an external communication interception runtime framework enforces the above specification transparently for the entire distributed system. When there are multiple principals participating in the same information flow, the same TBAC specification is applied uniformly on all principals. In this way, we provide the protection guarantee throughout the entire information flow path, thus efficiently converting the path into a trusted data path (TDP).;The most important principle guiding the design and implementation of the CFC model is the integrity of the model itself. Since we do not trust the service applications and the underlying systems automatically, we place the risk evaluation and associated monitoring components of the CFC model into isolated domains, which are domains that are not subject to the same attacks or failures targeting applications and general purpose operating systems. We have implemented a prototype of trusted data paths leveraging virtualization technologies. The TDP software deploys online monitoring agents into privileged domains in platforms virtualized with the Xen hypervisor to assure the reliability of monitoring results. The TDP software also transparently intercepts communications between service applications, at the driver level in privileged domains. Using this technique, sensitive information that is not suitable for the current context can be automatically removed, without application involvement.;The TDP approach offers system support for protecting data access in environments where systems and services are subject to failures, programming errors, and attacks. It presents a system-level solution for fine-grained protection on data sharing in distributed systems. It particularly targets systems (1) that lack the extensibility to include context factors via built-in security mechanisms, such as legacy software; (2) that are subject to attack or are suspected of faulty behaviors themselves; (3) that wish to delegate context-based controls to external partners; and (4) that want to enforce context-based control ubiquitously instead of only at the source or sink. Applications that can benefit from the CFC-TBAC model range from web applications like search and knowledge management or digital content services, to healthcare information systems, to file sharing systems using mail servers or online storage systems.
机译:尽管在分布式计算机之间共享数据对于现代IT应用程序至关重要,但同时也带来了维护所需数据隐私和保护数据免于不适当披露的问题。但是,很难保留对在可以跨分布式提供程序动态组成和部署服务的环境中共享数据的控制。为了保护敏感信息免受不适当披露的潜在风险,应用程序对数据的访问权不仅应取决于其功能特征,还应取决于其以及底层系统的行为。更明确地说,怀疑有错误,错误或恶意行为的应用程序,或在可能受到威胁的系统上运行的应用程序,将无法获得对受保护数据的访问权限或与其他用户相同的数据访问权限。存在许多基于预防的复杂机制,以消除不当披露的风险。但是,在某些情况下,此类风险与系统的核心功能相关。本文试图为无法直接消除此类风险的情况提供一种补救措施。其思想是发现现有风险,然后评估在这种风险下是否可以共享某些信息。分布式系统中的每个服务应用程序及其周围环境都被视为可控制的主体。 CFC定义了访问控制模型,用于控制这些主体之间的信息交换。访问控制模型包含三个主要部分。首先,使用一个在线监视框架来评估服务应用程序和下划线系统的上下文的可信度。其次,基于信任的访问控制(TBAC)规范会考虑服务应用程序的活动上下文来确定允许的信息交换。第三,外部通信拦截运行时框架对整个分布式系统透明地强制执行上述规范。当有多个主体参与同一信息流时,将相同的TBAC规范统一应用于所有主体。这样,我们可以在整个信息流路径中提供保护保证,从而有效地将路径转换为可信数据路径(TDP)。指导CFC模型设计和实现的最重要原则是模型的完整性本身。由于我们不自动信任服务应用程序和基础系统,因此我们将CFC模型的风险评估和相关监视组件放置在隔离的域中,这些域不会遭受针对应用程序和通用操作的相同攻击或故障系统。我们已经利用虚拟化技术实现了可信数据路径的原型。 TDP软件将在线监视代理部署到使用Xen虚拟机管理程序虚拟化的平台中的特权域中,以确保监视结果的可靠性。 TDP软件还在特权域中的驱动程序级别透明地拦截服务应用程序之间的通信。使用此技术,可以自动删除不适合当前上下文的敏感信息,而无需应用程序参与。TDP方法提供了系统支持,以保护系统和服务遭受故障,编程错误和攻击的环境中的数据访问。它提供了一种系统级解决方案,可对分布式系统中的数据共享进行细粒度保护。它特别针对的系统(1)缺乏可扩展性,无法通过内置安全机制(例如旧版软件)将上下文因素包括在内; (二)遭受攻击或者怀疑自己有不良行为的; (3)希望将基于上下文的控件委派给外部合作伙伴; (4)希望无处不在地实施基于上下文的控制,而不仅仅是在源或宿处。可以从CFC-TBAC模型中受益的应用程序包括搜索和知识管理或数字内容服务之类的Web应用程序,医疗保健信息系统,使用邮件服务器或在线存储系统的文件共享系统。

著录项

  • 作者

    Kong, Jiantao.;

  • 作者单位

    Georgia Institute of Technology.;

  • 授予单位 Georgia Institute of Technology.;
  • 学科 Computer Science.
  • 学位 Ph.D.
  • 年度 2010
  • 页码 109 p.
  • 总页数 109
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类
  • 关键词

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号