Trust and Security in Virtual Communities Third Workshop — Trusted Services: Requirements and Prospects Andrew Martin eSI/OeRC/Oxford University Software Engineering Centre eSI 8th/9th July 2008 wiki.esi.ac.uk/Trust and Security Third Workshop Andrew Martin Trust and Security: Third Workshop Housekeeping wireless network dinner this evening refreshments toilets emergency exit other things? Andrew Martin Trust and Security: Third Workshop “Trusted Services: Requirements and Prospects” Objectives The First Theme Workshop sought to determine the Application-Led Agenda for Security in eScience, and the second workshop followed this up by exploring the most urgent issues raised: Usability and Interoperability in Authentication and Authorization. The aim of the Third Workshop is to move the agenda forward by considering application domains which have significant trust requirements, beyond those offered by current commodity (grid, cloud) computing models. In particular: 1 look for case studies matching emerging technologies with emerging needs 2 identify steps (possible projects?) towards trialing these Andrew Martin Trust and Security: Third Workshop Methodology 1 A number of invited speakers: each has a slot of up to an hour. Intention is to present their work, and have potentially substantial discussion following (or interspersed with) each talk. 2 Final plenary discussion, to identify emerging themes. 3 Written report to be produced. 4 Wiki should be used to capture as much information as possible. It’s always good to record concrete examples, as well as “broad brush” statements. Please upload your slides, or email them to me. Andrew Martin Trust and Security: Third Workshop Caveat We are assuming that what is said here can be in a widely-circulated report, and can be reported on the eSI wiki. If you say something which is not to be reported in this way, please make that clear. Security can be a touchy issue. If your comments can be reported but must be non-attributable, that’s ok too. Just make it clear. Andrew Martin Trust and Security: Third Workshop Proposed Timetable Tuesday 10.00am 11.00am 12noon 1pm Arrival, Registration, and Coffee Theme Introduction and workshop objectives Adel Taweel Experiences with developing ePCRN project Lunch 1.45pm 2.45pm 3.00pm 4.00pm Jens Jensen Coffee John Zic James Cheney Provenance and Security 7.30pm Dinner at Howies Andrew Martin Trust and Security: Third Workshop Proposed Timetable Wednesday 9.00am 10.00am Andy Cooper Towards a Trusted Grid Architecture Jun Ho Huh Trusted Logging for Grid Computing 11.00am Coffee 11.15am 12.15pm Po-Wah Yau Applying Trusted Computing to a workflow s Yonatan Zetuny Reputation-Policy Trust Model for Grid Re 1pm 1.45pm 3pm Lunch Discussion: Emerging Themes, Capabilities, Next Steps End of workshop Andrew Martin Trust and Security: Third Workshop First Workshop: Summary The Application-Led Agenda for Security in eScience Report identifies four emerging cross-cutting themes: Poor usability in Authentication and Authorization pioneers can make it work; for others it needs to be seamless Poor Interoperability pioneers can make it work; for others it needs to be seamless Need for detailed guidance (specifically in medical projects, or others with sensitive personal data) Growing requirements for trusted processing (trustworthy services) Good: Risk-based approach to security and planning seems to have become embedded in eScience. Bad: The quality of service (w.r.t. security) is insufficient for many applications. Many ad hoc solutions. Andrew Martin Trust and Security: Third Workshop Trusted/Trustworthy Services Numerous participants spoke of requirements to improve the evident trustworthiness of remote services. There is, for example, no possibility of using National Grid Service resources or even campus grid resources to process personal or medical data, because no suitable confidentiality guarantees are in place. We are aware of other projects which have prototyped the use of such tools, but for reasons of commercial value will not deploy data or code to shared resources. confidentiality of data/code/algorithms confidentiality of parameters integrity of results confidentiality of results reliability/reputation of service reliable semantics of service Andrew Martin Trust and Security: Third Workshop Trusted/Trustworthy Services provenance as a security issue security aspects of variations in QoS how to gain confidence that the service really encrypts data between remote hops? code quality issues licence compliance: for software, for data provision Andrew Martin Trust and Security: Third Workshop Second Workshop: Summary Usability and Interoperability in Authentication and Authorization PKI nonsense (end-user digital certificates) seems to be on the run except for international work quite a few barely-compatible alternatives; many ‘process’ problems (issue and revocation of credentials; manageability of quotas; VO management) participants identified need for best practice guide (to avoid ‘over-doing’ security; as well as avoiding its neglect) Andrew Martin Trust and Security: Third Workshop Second Workshop Open Question Security must always be “just good enough” for the application area and context. Clearly, there are some eScience projects with very high assurance needs (for sensitive personal data, for example), and many with almost trivial security requirements. What remains unclear is whether there is a continuum between these extremes (so that eScience is an ideal test-bed for trying out a range of progressively stronger security ideas), or whether there is a big step change at some point, where everything has to change. Andrew Martin Trust and Security: Third Workshop Second Workshop Open Question Security must always be “just good enough” for the application area and context. Clearly, there are some eScience projects with very high assurance needs (for sensitive personal data, for example), and many with almost trivial security requirements. What remains unclear is whether there is a continuum between these extremes (so that eScience is an ideal test-bed for trying out a range of progressively stronger security ideas), or whether there is a big step change at some point, where everything has to change. Resolving this seems to be a key to finding a strategy for advancing the state-of-the-art. Andrew Martin Trust and Security: Third Workshop Spectrum Individual Patient Records Climate Prediction Data financial modelling Census Data bioinformatics engineering collaborations Particle Physics Data high physical isolation fine-grained access control audited low generalpurpose grid in-house 'grid' supervised access 'sticky policies' DRM virtual organisation management (single dimension over-simplifies the issues) Andrew Martin Trust and Security: Third Workshop simple access controls Spectrum 1 want to elaborate the picture further 2 need realistic goals 3 identify strong feasible case studies 4 advancing the boundaries of what’s possible, piecemeal Andrew Martin Trust and Security: Third Workshop Trusted Services Don’t we already trust lots of services? yes, but should we? grounds for trust deserve to be made explicit (and where possible, quantified) many application domains regard the technologies of eScience as untrustworthy lack of explicit QoS very fat middleware: inherently large trusted computing base grid/cloud abstraction is at odds with accountability in some cases trust begins and ends with the contracts we sign Andrew Martin Trust and Security: Third Workshop Trusted Services And yet: simply keeping everything in house is not necessarily viable ethics (often backed by law and regulation) has a big impact: personal data has to be protected (“appropriate technical measures. . . ”) data integrity/results provenance becomes ever more critical threats and their likelihood vary by application domain, but are no longer in the realm of fantasy and high-grade espionage commercial value of digital assets continues to grow technology is not standing still, either To achieve the best science, we cannot afford inaction. Andrew Martin Trust and Security: Third Workshop Trust Trust is the subject of stacks of literature, in computing, in psychology, and so on. Dieter Gollman: Why Trust is Bad for Security Ken Thompson: Reflections on Trusting Trust US DoD: Trustorthy Systems Evaluation Criteria ... Andrew Martin Trust and Security: Third Workshop Trusted Systems Trusted systems are those upon whose correct (or predictable) operation we simply rely. If they fail to live up to our expectations, bad consequences will follow. Careful speakers distinguish trusted systems trustworthy systems — we could have either without it being the other. Andrew Martin Trust and Security: Third Workshop Steps to Trust Graeme Proudler says that it is safe to trust something when: 1 it can be unambiguously identified, and 2 it operates unhindered, and 3 the user has first-hand experience of consistent, good, behaviour or the users trusts someone who vouches for consistent, good, behaviour. “An entity can be trusted if it always behaves in the expected manner for the intended purpose. (TCG 2004)” Andrew Martin Trust and Security: Third Workshop RFC 2828 trust 1. (I) Information system usage: The extent to which someone who relies on a system can have confidence that the system meets its specifications, i.e., that the system does what it claims to do and does not perform unwanted functions. (See: trust level.) (C) "trusted vs. trustworthy": In discussing a system or system process or object, this Glossary (and industry usage) prefers the term "trusted" to describe a system that operates as expected, according to design and policy. When the trust can also be guaranteed in some convincing way, such as through formal analysis or code review, the system is termed "trustworthy"; this differs from the ABA Guidelines definition (see: trustworthy system). Andrew Martin Trust and Security: Third Workshop RFC 2828 trusted computer system (I) Multilevel security usage: "A system that employs sufficient hardware and software assurance measures to allow its use for simultaneous processing of a range of sensitive or classified information." [NCS04] (See: (discussion under) trust.) Andrew Martin Trust and Security: Third Workshop RFC 2828 trustworthy system (O) ABA usage: "Computer hardware, software, and procedures that: (a) are reasonably secure from intrusion and misuse; (b) provide a reasonably reliable level of availability, reliability, and correct operation; (c) are reasonably suited to performing their intended functions; and (d) adhere to generally accepted security principles." [ABA] This differs somewhat from other industry usage. (See: (discussion of "trusted vs. trustworthy" under) trust.) Andrew Martin Trust and Security: Third Workshop Trusted Computing The approach of the Trusted Computing Group, then, means building computer systems which . . . 1 strongly identify themselves 2 strongly identify their current configuration/running software 3 allow us to make rational decisions about the level of trust to invest in them. platform identity will be based on public-key cryptography software identity will be based on cryptographic hashes of program object code (in theory . . . ) Andrew Martin Trust and Security: Third Workshop TCG: The “BIG” Picture Virtualized Platform Mobile Phones Hardcopy Authentication Networking Storage Security Hardware Applications •Software Stack •Operating Systems •Web Services •Authentication •Data Protection Desktops & Notebooks Servers Copyright© 2005-2007 Trusted Computing Group - Other names and brands are properties of their respective owners. Andrew Martin Trust and Security: Third Workshop Slide #6 Trusted Infrastructure Research Delivering the low-level benefits via middleware; incremental benefits — moving the feasibility line strong platform identity including dynamic provisioning of hosts strong software identity; locked secrets Security Hardware Enhanced MyProxy (SHEMP) Daonity/Daoli secure migration of credentials in a VO trusted data centre? trustworthy cycle-stealing/high-throughput computing improved VPN/remote working capability Andrew Martin Trust and Security: Third Workshop Enabler of New Models “Digital Rights Management for all” DRM’s time is yet to come! Perhaps as ‘PRM’. Virtual Data Enclaves? Compare IBM’s virtual domains Processing of data from many sources, without giving up control Data which travels with its policy; how are policies combined? Andrew Martin Trust and Security: Third Workshop “Trusted Services: Requirements and Prospects” Objectives The First Theme Workshop sought to determine the Application-Led Agenda for Security in eScience, and the second workshop followed this up by exploring the most urgent issues raised: Usability and Interoperability in Authentication and Authorization. The aim of the Third Workshop is to move the agenda forward by considering application domains which have significant trust requirements, beyond those offered by current commodity (grid, cloud) computing models. In particular: 1 look for case studies matching emerging technologies with emerging needs 2 identify steps (possible projects?) towards trialing these Andrew Martin Trust and Security: Third Workshop Theme Future . . . depends on this workshop’s outcomes . . . will include a workshop on digital rights managment, sticky policies, etc. . . . see also the “Information Assurance for eScience” workshop at All Hands 2008 Andrew Martin Trust and Security: Third Workshop