Advanced Collaborative Environments Research Group Page 1 of 1 Advanced Collaborative Environments Research Group Agenda for GGF5 Session 1 z z Review merged security requirements document Areas covered: { AccessGrid environments { Tele-Immersive environments { Remote Visualization environments { Dynamic and Asynchronous environments Session 2 z z Discuss other areas relevant to ACE: { File transfer: William Allcock { Web services: Markus Lorch [mlorch@vt.edu] Fusion community- General Atomics to talk about their requirements for collaborative environments. file://C:\Documents%20and%20Settings\Jason%20Leigh\My%20Documents\Spiff\Grid%2... 7/2/2002 Application-specific Security Requirements of Advanced Collaborative Environments Final Template due May 13, 2002 Deb Agarwal, Brian Corrie, Yuri Demchenko, Jason Leigh, Markus Lorch, Bob Olson, Mike Papka, Mary Thompson, Jimmy Scott, Derek Simmel, Von Welch - - - - Authors of document Contact email address Short name of the scenario Description of the scenario (use diagrams where helpful) Intended community for the scenario What needs to be protected? o Access (read/write) to stored data o Access (execute/modify) to shared code o Communication channels (send/receive) Control channels Data channels o Mailing lists/addresses (read/send) o Special vulnerabilities for this scenario For each asset (data, code, communication, etc), estimate its value in terms of cost to recover it if lost, damaged, or compromised: o If sensitive information is inappropriately disclosed, what regulatory penalties may apply? What losses are anticipated in terms of intellectual property control? o If data is lost or damaged, what are the costs associated with recovering it? If preparations need to be made to detect such loss or damage, and allow recovery (i.e. backups, checkpoints, etc), what are the costs to deploy and operate such recoverability means? o What costs are expected in terms of time and effort to reschedule and reprocess data? What threats are expected? o Random hackers who want to disrupt something o Colleagues who have been explicitly excluded o Outsiders who want to steal software, data or compute cycles What Security features do you need and which of the protected items need them? o Integrity - messages and data can't be secretly modified o Confidentiality - protection from disclosure to unauthorized persons For how long Confidentiality of persistent data and data in transit o Authorization, access control - Unauthorized users are kept out Should all the collaborators know who is authorized or just the administrator o Authentication - assurance of identity of persons As individuals or just as a group members o Auditing - permanent log kept for accountability and possible error recovery o Non-repudiation - originator of data can't deny it later o Survivability - recovery from attack or failure o Availability – performance and access Template Designers: Mary Thompson (MRThompson@lbl.gov)– get the security jargon correct for us Derek Simmel (dsimmel@psc.edu) - best practices: will help find a security person who can describe known models- like ones in IETF – and ask them to volunteer to give a presentation Jason Leigh (spiff@evl.uic.edu), Brian Corrie (brian.corrie@newmic.com) - Teleimmersion Global Grid Forum Advanced Collaborative Environments Research Group Application-specific Security Requirements of ACEs Deb Agarwal (DAAgarwal@lbl.gov), Markus Lorch (mlorch@vt.edu) – Dynamic and asynch collaboration Bob Olson (olson@mcs.anl.gov) – Access Grid Mike Papka (papka@mcs.al.gov), Jimmy Scott (jcs@sgi.com) – Remote visualization Yuri Demchenko (demch@terena.nl) - European reviewer Global Grid Forum Advanced Collaborative Environments Research Group Application-specific Security Requirements of ACEs Summary of Security Requirements for Advanced Collaborative Environments Summary of Security Requirements for Advanced Collaborative Environments Global Grid Forum Draft July 1, 2002 June 26, 2002 8am AccessGrid Contributor Robert Olson Jason Leigh (olson@mcs.anl.gov (spiff@evl.uic.edu Argonne National Lab) Electronic Visualization Lab, UIC), Brian Corrie (brian.corrie@newmic.com New Media Innovation Center, Canada) Meetings over AG. Permanent & persistent Colleagues presenting meeting space that supports results to each other. collaborative discussion, Distribution of analysis, discovery using presentation files. tele-immersive technologies such as CAVEs, ImmersaDesks, ImmersaWalls. Audio/video 3 types of data- bulk communications is distributed data, via Multicast communication data Distributed (audio/video), state presentation uses data. TCP for control Central server keeps messages most recent state of Spatial metaphor persistent for scoping environment Description Assumptions Tele-Immersion Page 1 Remote Visualization Michael Papka (papka@mcs.anl.gov Argonne National Lab) Dynamic & Asynchronous Environments Deb Agarwal, (DAAgarwal@lbl.gov Lawrence Berkeley National Lab), Markus Lorch (mlorch@vt.edu Virginia Tech) Coupling of AG with On-going or ad hoc need to access remote data collaboration that spans servers that pass on data to time zones & involves a visualization servers, that changing set of participants then distribute the images & Grid resources to multiple collaboratorswho can steer the visualization. Similar to TeleNot necessarily a Immersion & AG persistent central See document for authority for details. collaboration. Set of authorized collaboratiors is larger than the set of currently logged in collaborators Both Summary of Security Requirements for Advanced Collaborative Environments for scoping sessions- Virtual Venues Multimedia server records raw media streams- hence server needs to be considered a particpant in the meeting. Community What needs to be protected? environment. Bulk data sets are downloaded, modified and infrequently synchronized with main server. Small state data are updated frequently. 3 types of communication channels- persistent connections, transient connections (e.g. each bulk data access), connectionless (e.g. video or avatar) Overhead must be low for interactive streams. See document for further details. collaborators. Both sets are changing dynamically over time. Collaboration uses wide variety of toolstext chat, audio, video, whiteboards, etc. Academic & industrial Academic & industrial users Mainly research users in many countries in many countries communities. Access to spatial venues Audio and video streams Presentation data files- but not control messages (e.g. for "next slide") Recorded sessions (open issue- see Access to venues (collaboration spaces) Access to bulk data sets Access to communication data (audio, video) Access to state data (may or may not need to be protected) Business community: Page 2 On-going & adhoc collaborations in business & academia Access to data sets 2 types of data: data Resulting images & about the image transmissions collaboration, & data Temporary data sets generated as a result that are created at of the collaboration. each stage of the Both need to be visualization protected. pipeline. Minimum expectation is only authorized users can read/write/create Summary of Security Requirements for Advanced Collaborative Environments document for details) What are expected threats? Disruption data should only be viewable & modifiable by authorized groups / individuals. Audio/video must always be encrypted. Academic community: Data may be sensitive in some cases (e.g. medical data). But for the most part data is publically viewable, but not modifiable. Audio/video need not be encrypted. Unauthorized Same as AG connections to specific comm ports that a distributed app uses Intrusion of unwanted media streams into session from outside users Intrusion of badlyformatted media streams that causes stability problems in distributed apps Intrusion of highb d id h di Page 3 data. Permission to delete data is limited to smaller set of users. Distributed data storage facilities. Audit trail needed to track changes in different versions of the same file. Same as AG Same as AG Summary of Security Requirements for Advanced Collaborative Environments bandwidth media streams that consime more bandwidth than is available Denial of Service attacks Privacy Access Data security What security features are needed? Integrity (messages & data cannot be secretly be modified) Confidentiality (protection from disclosure to unauthorized persons) Illegal snooping of Same as AG communications channels may occur Authorized & Same as AG unauthorized users may attempt to illegally read/modify presentation data or media streams Data may become Same as AG corrupted during intentional / accidental disruptions Desired to prevent spoofing of presentation data files. Not neecessarily needed for media streams, especially when participants are known to each other Needed mainly for corporate apps Academic may need to prevent accidental modifications Desired for privacy of media streams Potentially i df For corporate dataAlways For academic needed for duration of j Page 4 Same as AG Same as AG Same as AG Same as AG Same as AG Same as AG Likely to be minimal. Encryption & secure data storage is sufficient. Both for original & intermediate data Encrypted graphics streams should have l l Same as for Integrity. Length of time that data should remain fid i l i Summary of Security Requirements for Advanced Collaborative Environments required for presentation data files Authorization, access control (unauthorized users are kept out) Authentication (assurance of identity of persons) Auditing (log kept for accountability & error recovery) Desired that access to Venues is controlled when desired Required perhaps @ level of identification of participating sites Desired that multiple individuals @ AG nodes be able to authenticate to session, in order to implement finergrained access control or to allow credentials of an individual to give the AG node the necessary access to protected spaces Logging of identities may be good project Confidentiality for bulk data can use slower encryption schemes Streaming data should use fast schemes All collaborators should know who is part of the collaboration low latency confidential varies. For data & visualization resources Required. But also need to give limited access permissions to some participants. Corporate: Individual Same as for Authorization Initial authentication should authentication needed be minimal & access rights to track modifications are granted incrementally by individuals. Group during collaboration. authentication needed for "show & tell" for read-only data. Group authentication sufficient for academic. Crucial for corporate Not likely to be major (track when someone requirement has read / changed a document) Useful for academic to track hen a Page 5 Important. Audit needs to identify the entity participating & the entity that authorized participation. Summary of Security Requirements for Advanced Collaborative Environments to track when a change was made & by whom Non-repudiation Not an Issue (originator of data cannot deny it later) Not an Issue Survivability (recovery from attack/failure) Mainly in corporate Not an Issue applications for accountability. Nonrepudiation of what is in the audit log is important. Needed for both Same as AG Most likely covered by corporate & authorization / academic/scientific authentication services apps Prevent illegal messages or messages from unauthorized sources Not needed for minimal system. Perhaps enhanced system. Prevent Same as AG connections from unauthorized clients Prevent denial of service attacks Critical but should be flexible. Denial of unauthorized clients can sometimes discourage possible collaborations. Availability (performance & access) To dos: prioritization of security issues to address for each application identify Grid services that can be most easily used to achieve requirements identify Grid services still missing Page 6 Application Security Requirements of Access Grid Collaborations July 2, 2002 Robert Olson olson@mcs.anl.gov Scenario: An Access Grid meeting Description A meeting of geographically distributed collaborators each using an Access Grid node. Several collaborators are presenting results to their colleagues using a distributed presentation application. This application requires the distribution of a presentation data file to each participating site. Meetings may be recorded by a multimedia server for later playback. [Scope question: do we want to discuss web services-based models? how much detail are we looking for here; my understanding at the moment is that these are high-level scenarios] Assumptions - Communication between AG node users is via multicast audio and video. - The distributed presentation application uses TCP connections between the sites to exchange control messages. - The Access Grid utilizes a strong spatial metaphor for the scoping of sessions. This metaphor is implemented by a central Venues Server. - The multimedia server records the raw media streams. This implies the server needs to be an active participant in the meeting (from the point of view of the other participants and of the infrastructure providing the mechanisms implementing the spatial metaphor.) Community The Access Grid community includes both academic and industrial users in many countries. What needs to be protected? To maintain the spatial metaphor, it is desirable that at all times it is well-known who the participants in an Access Grid meeting are. Due to the nature of IP multicast routing, it is possible, knowing the underlying multicast addresses used by a particular Access Grid session, to snoop on an unencrypted audio or video session without the participants in the session knowing. This is a serious breach of the metaphor, and can lead to the detrimental leakage of information from the session. Therefore, to enforce the strict spatial metaphor, encryption of the audio and video streams is also desirable. (However, there are uses of the Access Grid where strict adherence to the spatial metaphor is not required, and the multicast addresses of the media sessions are widely disseminated. This scenario does not address this situation). Presentation data files need to be distributed to the sites involved in the collaboration. As the distribution of these files can be accomplished by means which are not as easily snooped as the multicast media traffic, protection of the files is not necessarily required. However if the data in the files is sensitive, the owners of the files may determine that they should be protected from unauthorized viewing. Global Grid Forum Advanced Collaborative Environments Research Group Application-specific Security Requirements of ACEs The control connections used in the distributed presentation application need not necessarily be protected, as sensitive data is not transferred over them. However, it may be the case that protection is required to prevent disruption of a distributed presentation by a third party. The recorded session (on the multimedia recording server) must be protected from unauthorized examination. An as-yet-open issue here is the management of the session data. Options include • Saving the data as it was presented on the wire. If it was encrypted, this implies the session encryption key(s) are stored somewhere for the long term. It also implies that the server need not know what the keys are. • Decrypting the data as it arrives, storing it as cleartext, and re-encrypting upon playback with the appropriate session key. This poses the risk where the data may be vulnerable while in storage. • Decrypting the data arrives, and re-encrypting it for storage with a different session key. - For each asset (data, code, communication, etc), estimate its value in terms of cost to recover it if lost, damaged, or compromised: o If sensitive information is inappropriately disclosed, what regulatory penalties may apply? What losses are anticipated in terms of intellectual property control? o If data is lost or damaged, what are the costs associated with recovering it? If preparations need to be made to detect such loss or damage, and allow recovery (i.e. backups, checkpoints, etc), what are the costs to deploy and operate such recoverability means? o What costs are expected in terms of time and effort to reschedule and reprocess data? What threats are expected? - - Disruption o Unauthorized connections to specific communication ports that the distributed presentation application uses. o Intrusion of unwanted media streams into the session from outside users. o Intrusion of badly-formatted media streams that may cause stability problems with the media tools. o Intrusion of high-bandwidth media streams that consume more bandwidth than is available. o Denial of service attacks Privacy o Illegal snooping of communications channels may occur. Access o Authorized and unauthorized users may attempt to illegally read or modify presentation data or media streams. Data security o Data may become corrupted during intentional or accidental disruptions. What security features are needed? - - Integrity (messages and data can't be secretly modified) o Desired to prevent the spoofing of presentation data files. o Not necessarily required for media streams, especially in the case of sessions where the participants are known to each other. Confidentiality (protection from disclosure to unauthorized persons) o Desired for privacy of media streams. o Potentially required for presentation data files. Authorization, access control (Unauthorized users are kept out) o Desired that access to Venues is controlled when desired. Authentication (assurance of identity of persons) Global Grid Forum Advanced Collaborative Environments Research Group Application-specific Security Requirements of ACEs Required that a certain degree of authentication (perhaps just at the level of identification of participating site) exists in order to maintain the spatial metaphor. o Desired that multiple individuals at Access Grid nodes be able to authenticate to the session, in order to implement finer-grained access control or to allow the credentials of an individual give the AG Node the necessary access to protected spaces. Auditing (permanent log kept for accountability and possible error recovery) o Logging of the identities of participants may be desired. Non-repudiation (originator of data can't deny it later) o Survivability (recovery from attack or failure) o Needed for both corporate and academic/scientific applications. o Prevent illegal messages or messages from unauthorized sources. Availability (performance and access) o Prevent connections from unauthorized clients. o Prevent denial of service attacks. o - Global Grid Forum Advanced Collaborative Environments Research Group Application-specific Security Requirements of ACEs Application Security Requirements of Tele-immersive Environments July 2, 2002 Jason Leigh, Brian Corrie spiff@evl.uic.edu Brian.Corrie@newmic.com Scenario: A tele-immersive meeting Description A permanent and persistent meeting space that supports collaborative discussion, analysis, and discovery using tele-immersion technologies such as CAVEs, and ImmersaDesks. Assumptions - Communication between users of the space is supported through audio, video, application, and interaction data being exchanged. - Data is of 3 types: bulk data (such as 3D models or data sets), communication data (such as audio/video), state data (such as the position of an object in an environment). - Central server keeps the most recent state of the collaboration and holds the most committed version of the environment. - For bulk data sets: All clients may download a version of the data to work with collaboratively. Edits are done locally first and commits are done infrequently. - For smaller state information, edits are done locally and then state info is synched almost immediately with the central server for broadcast. - Peer to peer solutions are possible but in this scenario we assume a centralized solution. - In some cases it is important to track when an update was performed and by whom. - Data from each user in the collaboration is typically (but not necessarily) sent to all other participating users (ie broadcast may be selective.) - Data may be restricted to users with specific privileges. - Persistent data is maintained as part of the space. Persistent data typically consists of application data, archived meeting data (to support asynchronous collaboration), and user data. - Types of Communication Channels: o Persistent connections- connections for delivering reliable state information o Transient connections- connections where bulk data files are transferred. Usually performed by opening and closing one or many TCP connections. o Connectionless- audio and video that are transmitted via multicast or unicast UDP - Critical to the success of the collaboration is the interactive nature of the collaboration data that is exchanged. The overhead involved in encryption and decryption of interactive data will add significantly to the communication latencies for that data and therefore security concerns must be carefully balanced with performance. There are two main types of data that exist in such an environment, persistent data and transient data. Persistent Data The persistent data is data that is retained for long periods of time and is the data that is critical to the application area. Persistent data might consist of one or more data sets (possibly a large database of data sets), user data for the users that have access to the space, and asynchronous collaboration data that has been archived for playback and exploration by other users in the system. This data is mission critical in nature and needs most of the security features discussed below. Transient Data Transient data is data that is either extracted from the persistent data or it is data that is generated to support the collaboration. Transient data would typically consist of application, application control, audio, video, and interaction (avatar positions, user actions, etc.) data. Transient data can be made into Global Grid Forum Advanced Collaborative Environments Research Group Application-specific Security Requirements of ACEs persistent data as required. Transient data is typically used in the collaboration, and it is this data that needs to be balanced between the performance requirements of the collaboration and the security requirements of the application. Various levels of data encryption (ranging from no encryption through to high levels of encryption) and their associated impact on performance need to be understood and be able to be applied to the data streams as required by the application. Community This application is intended for the academic/scientific and business community where immersion and collaboration are both critical to the success of the problem solving process. What needs to be protected? Business Community - Data should only be viewable and modifiable by authorized groups or individuals. - Audio and video must be encrypted. Academic Community - Data may be as sensitive as those in the business community (for example in medical applications involving sensitive patient data). But for the most part it is ok for data to be publicly viewable. Data should not be publically modifiable. - Audio and video need not be encrypted. - For each asset (data, code, communication, etc), estimate its value in terms of cost to recover it if lost, damaged, or compromised: o If sensitive information is inappropriately disclosed, what regulatory penalties may apply? What losses are anticipated in terms of intellectual property control? o If data is lost or damaged, what are the costs associated with recovering it? If preparations need to be made to detect such loss or damage, and allow recovery (i.e. backups, checkpoints, etc), what are the costs to deploy and operate such recoverability means? o What costs are expected in terms of time and effort to reschedule and reprocess data? What threats are expected? - - Disruption o Unauthorized connections to specific communication ports that the server normally listens to. o Illegal connectionless messages that the server and clients do not know how to handle and therefore causing the server/clients to crash. o Denial of service attacks Privacy o Illegal snooping of communications channels may occur. Access- Authorized and unauthorized users may attempt to illegally read or modify the data. Data security o Data may become corrupted during intentional or accidental disruptions. o Data may be intentionally or accidentally erased by external entities. What security features are needed? - Integrity (messages and data can't be secretly modified) o Needed mainly for corporate applications. o Academic/scientific applications may need to prevent accidental modifications. Confidentiality (protection from disclosure to unauthorized persons) o For persistent data – for corporate users, this is needed always. For academic/scientific users, this may only be needed for the duration of the project. Global Grid Forum Advanced Collaborative Environments Research Group Application-specific Security Requirements of ACEs Transient data – for corporate users, this is needed always. For sensitive meetings, academic/scientific users will also need this. o Confidentiality of bulk data sets may use slower encryption schemes. o Confidentiality of transient data should use faster encryption/decryption schemes due to the time sensitivity of data. (ie latency must be kept to a minimum) Authorization, access control (Unauthorized users are kept out) o Should all the collaborators know who is authorized or just the administrator- all collaborators should know who is part of the collaboration. Authentication (assurance of identity of persons) o As individuals or just as a group members – in corporate applications both group and individual authentication is needed. Individual authentication is needed to track modifications by individuals. Group authentication is needed to allow for “show and tell” demonstrations where data is used mainly in a read-only state. In academic/scientific applications group authentication should suffice. Auditing (permanent log kept for accountability and possible error recovery) o crucial for corporate applications (ie track when someone has read or changed a piece of data). o In academic/scientific applications, tracking when a change was made and by whom is useful. Non-repudiation (originator of data can't deny it later) o mainly important in corporate applications. Non-repudiation of what is in the audit log is important. Survivability (recovery from attack or failure) o Needed for both corporate and academic/scientific applications. o Prevent illegal messages or messages from unauthorized sources. Availability (performance and access) o Prevent connections from unauthorized clients. o Prevent denial of service attacks. o - - - Brian’s notes: Persistent data typically requires high levels of security and relatively low levels of performance compared to transient data. Thus there is no reason not to provide a full range of security services for this data. These services include data integrity, confidentiality, authorization, authentication, auditing, non-repudiation, survivability and availability. All of these services may not be necessary for each application but there is no reason why they cannot be supported. The transient data in a tele-immersive collaboration is time critical and therefore there is a potential conflict between having high levels of security at the same time as having low latency interaction between users. Authorization and authentication are two critical components to providing security to transient data. If unauthorized users cannot get access to the collaborative space then they cannot circumvent the security through direct access. Thus the only other security risk is passive interception of data that is being communicated during the collaboration. Global Grid Forum Advanced Collaborative Environments Research Group Application-specific Security Requirements of ACEs Application-specific Security Requirements of Advanced Collaborative Environments Remote Visualization Michael E. Papka, Jason Leigh papka@mcs.anl.gov, spiff@evl.uic.edu Description: There are multiple scenarios for remote visualization, some of which have similarity to other application areas such as Tele-Immersion. Presented below are 4 such scenarios- some of which include technologies (such as the AccessGrid) whose security requirements have already been specified in a separate document, and so will only be referenced. Scenario 1: Data and visualization server are collocated at some remote site, users’ wants to access the visualization server and data, and then view the results from an Access Grid node or desktop. Figure 1 Basic remote visualization server with access from access grid or desktop system. Data and visualization server are collocated. Scenario 2: Data and visualization pipeline are distributed across multiple sites, users’ wants to access the visualization pipeline and data, and then view the results from an Access Grid node or desktop. Figure 2 More complicated remote visualization server with different pieces of the visualization pipeline distributed across sites. Scenario 3: Collaborative visualization using multiple special purpose displays with both real video and synthetic video shared with remote users. Figure 1 Visualization sessions shared across multiple sites using a mix of advanced display devices, with output shared to others via Access Grid or desktop. Assumptions Security needed for shared sessions as mentioned in scenario 3 discussed in teleimmersion document and security associated with all 3 scenarios on Access Grid or desktop addressed in Access Grid document. Community These scenarios are intended to support work going on in the research community but is by no means limited to that space. What needs to be protected? Access to datasets needs to be protected both locally (standard file permissions and remotely access to machines), as the data is transmitted to the location where the data is converted from raw values into images, and transmission of the images to the user. It is also possible for the visualization pipeline to be distributed; therefore temporary datasets that are created by one stage of the pipeline need to be protected also. What threats are expected? Disruption, unauthorized access, privacy, corruption of data, unauthorized creation and deletion of data. What Security features do you need and which of the protected items need them? - Integrity (messages and data can't be secretly or accidentally modified) - Confidentiality (protection from disclosure to unauthorized persons) o Both for original data and intermediate data o Encrypted streams are needed- some streams are latency sensitive. In general these are streams involving realtime remote visualization and steering. Hence latencies that are accumulated as a result of encryption and decryption should be minimized. For playback of pre-rendered data or raw data that needs to be distributed apriori to the collaborating sites, the streams are not latency sensitive. - Authorization, access control (Unauthorized users are kept out) - o For data and access to visualization resources Authentication (assurance of identity of persons) o For access to data and access to visualization resources Auditing (permanent log kept for accountability and possible error recovery) o Most likely not a major requirement Survivability (recovery from attack or failure) o Most likely covered by authorization and authentication services Availability (performance and access) Security Requirements of Dynamic and Asynchronous Collaborative Environments Template Draft July 2, 2002 Deb Agarwal (DAAgarwal@lbl.gov), Markus Lorch (mlorch@vt.edu) Scenario – An on-going or ad hoc collaboration that spans time zones and involves a changing set of participants Description This scenario describes a collaboration where the participants and duration are not necessarily known in advance and the set of participants is changing often. It also describes situations where the collaborators are often unable to interact in real time. An example for such a collaborative scenario is a high level grid programming and execution environment through which collaborators can combine their grid resources (e.g. data files and executables) to create, execute and control a shared grid meta program. This system could consist of a shared workspace within which the meta programs are created following the visual programming approach and a set of tools that provide the user with other collaborative services for example for communication (chat) and data transfer. It is possible for users to collaborate synchronously by viewing and modifying the shared workspace and interacting through a chat window at the same time or asynchronously through the sharing of saved meta program components, whole meta programs or simply by exchanging email or voice messages. Assumptions There is not necessarily a persistent central authority for the collaboration. The set of authorized collaborators is larger than the set of currently logged in collaborators. Both these sets are changing dynamically over time. Collaborative interactions take place using a wide variety of tools including chat, audio, shared applications, white boards, etc. Community This scenario is intended to support on-going and ad hoc collaborations in the business and academic community. What needs to be protected? We anticipate that this type of collaboration will have both temporary and long-term data. This data will be divided into the data about the collaboration itself (e.g. user lists, locations, tools in use, etc), the data produced by the collaboration (e.g. conversation archives, activity logs, etc.), and data that is the subject of the collaboration (e.g. shared files, drawings, etc.). We expect that all of this data will need to be protected. The minimum level of protection expected is that only users authorized to access the collaboration can read, write, and create this data. Permission to delete the data is likely restricted to a smaller set of users particularly in the case of data about the collaboration and produced by the collaboration. At an enhanced level of security, a user creating any particular data could specify more restrictive access rights to that data. This collaboration scenario will likely use a combination of secure and insecure data transmission. Ideally this can be decided per data transmission with a settable default for the collaboration. In most collaborations, the data most likely to need protection during transmission is data that is the subject of the collaboration. Some collaborations will, however, want all forms of collaboration data sent securely over the Internet. This collaboration scenario will also likely use distributed data storage capabilities rather than centralized servers. Data may be stored in multiple locations. In an enhanced security environment, an audit trail for Global Grid Forum Advanced Collaborative Environments Research Group Application-specific Security Requirements of ACEs each data file would need to be kept in a secure way so that different versions of the same file are recognizable and their history, authenticity, and modifications can be identified and verified. What threats are expected? Similar to the AG scenario – Disruption, unauthorized access, privacy, corruption of data, unauthorized creation and deletion of data. What Security features do you need and which of the protected items need them? o Integrity - Our requirements here are likely minimal. It is expected that if this is an issue that encrypted channels will be used for transmission and data storage locations will be secured. o Confidentiality - Our requirements here are also likely minimal. Again, it is likely that encrypted channels and secure data storage locations will provide an adequate solution here. Length of time that data should remain confidential, is likely to vary by collaboration. o Authorization, access control – Authorization access control is required in this scenario but the mechanisms need to allow unauthorized users some limited access to request further access and to accommodate cases where the user does not have their normal authorization mechanisms available but needs to participate. Each authorized collaborator should be able determine who is authorized in the collaboration. In order to support ad-hoc, dynamic collaboration it is important to have privilege management mechanisms in place that allow authoritative users to assign access privileges to new collaborators without the need for system administrator intervention. For example the host of a specific collaboration needs to be able to manage the collaborative environment and assign fine grained privileges to participants. Furthermore the owner of a shared object should be able to delegate access permissions to his object to other users directly. This provides for incremental trust relationships that require a low amount of trust to establish a collaboration. The administrative cost associated with such privilege management should be kept as low as possible to make dynamic and short lived scenarios feasible. In order to support the use of fine grained access privileges adequate enforcement mechanisms are required that can efficiently and securely make access control decisions. o Authentication – Ideally, the initial authentication required to join the collaboration is minimal and that instead access rights are built based on some incremental mechanisms that allow much of the trust to be built through interactions. o Auditing – It is important that a permanent log be kept for accountability and possible error recovery. It is also important to be able to distinguish the identity of the entity taking part in a collaboration from the identity that authorized the access to the collaboration. o Non-repudiation – is likely not an issue. o Survivability – In an enhanced system, it would be designed for recovery from attack or failure. But this is likely not available in a minimal system. o Availability – The performance and access to the collaboration are critical. The collaboration will only function well if collaborators are able to collaborate freely and never encounter denial of service due to failure of the security mechanisms. This is likely unrealistic but each failure of the security system to authorize a legitimate user risks the rejection of the collaboration itself. Global Grid Forum Advanced Collaborative Environments Research Group Application-specific Security Requirements of ACEs