maftia - webhost.laas.fr

8
MAFTIA’s Privacy Preserving Authorization Scheme Yves Deswarte [email protected] LAAS-CNRS Toulouse, France MAFTIA: Malicious- and Accidental-Fault Tolerance for Internet Applications ! Systematic investigation of the ‘tolerance paradigm’ for constructing large-scale dependable distributed applications. ! Comprehensive approach for tolerating both accidental faults and malicious intrusions in such systems, including intrusions by external hackers and by corrupt insiders.

Upload: others

Post on 19-Jun-2022

1 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: MAFTIA - webhost.laas.fr

MAFTIA’sPrivacy Preserving

Authorization Scheme

Yves [email protected]

LAAS-CNRSToulouse, France

MAFTIA:Malicious- and Accidental-FaultTolerance for Internet Applications

! Systematic investigation of the ‘tolerance paradigm’for constructing large-scale dependable distributedapplications.

! Comprehensive approach for tolerating bothaccidental faults and malicious intrusions in suchsystems, including intrusions by external hackers andby corrupt insiders.

Page 2: MAFTIA - webhost.laas.fr

Contract Details

!Project Start Date: 1st Jan 2000!Duration: 3 years!Requested Funding: 2.5 M!!No. of person years: 55

Partners

!Newcastle University (GB) (coordinator)Brian Randell, Robert Stroud

!DERA, Malvern (GB)Sadie Crees (QinetiQ), Tom McCutcheon (DSTL)

!IBM, Zurich (CH)Marc Dacier, Michael Waidner

!LAAS-CNRS, Toulouse (F)Yves Deswarte, David Powell

!Universität des Saarlandes (D)André Adeslbach, Birgit Pfitzmann (now Michael Steiner)

!Universidade de Lisboa (P)Nuno Neves, Paulo Veríssimo

Page 3: MAFTIA - webhost.laas.fr

Industrial Advisory Board

!Andrew Izon (North Durham NHS Trust, GB)!Jean-Claude Lebraud (Rockwell-Collins, F)!Derek Long (CISA Ltd., GB)!Joachim Posegga (SAP Systems, D)!Carlos Quintas (Easyphone, P)!Gilles Trouessin (Ernst & Young Audit, F)!Gritta Wolf (Credit Suisse, CH)

Objectives

!Architectural framework and conceptualmodel (WP1)

!Mechanisms and protocols:o dependable middleware (WP2)o large scale intrusion detection systems (WP3)o dependable trusted third parties (WP4)o distributed authorization (WP5)

!Validation and assessment techniques (WP6)

Page 4: MAFTIA - webhost.laas.fr

!Architectural framework and conceptualmodel (WP1)

!Mechanisms and protocols:o dependable middleware (WP2)o large scale intrusion detection systems (WP3)o dependable trusted third parties (WP4)o distributed authorization (WP5)

!Validation and assessment techniques (WP6)

Objectives

!Contributes to protection:o Error detection/confinemento Intrusion prevention/confinement

!For Internet applications:o More flexible than “client-server” paradigmo Contributes to privacy:

" personal information is disclosed only on a ”need-to-know”basis

" Operations are granted/denied according to proofs ofauthorization (capabilities, vouchers) rather than toclient’s identity

Authorization

Page 5: MAFTIA - webhost.laas.fr

State-of-the art: client-server

!Server grants or denies privileges to client,according to client’s claimed identity

!Personal data must be recorded:-> evidence in case of dispute:

"log everything"… but they may be abused

This paradigm is obsolete

!Internet transactions involve more than 2parties (e.g., customer, merchant, credit cardcompany, banks, delivery company, …)

!The parties have different, competinginterests=> mutually suspicious

Page 6: MAFTIA - webhost.laas.fr

Need-to-know principle

! A merchant does not need to know the real identityof a customer, only the validity of the money order

! The customer’s bank does not need to know theidentity of the merchant, only the reference of hisbank account

! Etc.

… of course

!Real identities would be disclosed to a judgein case of dispute, or on request by judicialauthorities (to prevent money laundering, forinstance)

Page 7: MAFTIA - webhost.laas.fr

Authorization Scheme

! Distributed, multi-party transactions: O-O

! Elementary operations are granted or deniedaccording to proofs of authorization (~capabilities)o Need-to-know principle

! Groups of capabilities are delivered for each high-level operation by an authorization servero Capabilities and “vouchers”o Least privilege principle

Authorization Server

SecurityKernel

Authorization Scheme for DOOS

[Nicomette & Deswarte, 1997]

O1 O2 O3

AuthorizationRequest

Capabilities& Vouchers

invocations

Page 8: MAFTIA - webhost.laas.fr

Authorization Server

fs2

f3

ps1 p4u

JavaCard

Securitykernel

Securitykernel

Securitykernel

FTI

http://www.research.ec.org/maftia/