software quality and infrastructure protection for diffuse computing fy2001 onr cip/sw uri principal...

31
Software Quality and Infrastructure Protection for Diffuse Computing FY2001 ONR CIP/SW URI Principal Investigator: Andre Scedrov Institution: University of Pennsylvani URL: http://www.cis.upenn.edu/spyce STARTED IN MAY 2001

Upload: timothy-copeland

Post on 02-Jan-2016

219 views

Category:

Documents


0 download

TRANSCRIPT

Software Quality and Infrastructure Protection

for Diffuse Computing

FY2001 ONR CIP/SW URI

Principal Investigator: Andre ScedrovInstitution: University of Pennsylvania

URL: http://www.cis.upenn.edu/spyce

STARTED IN MAY 2001

The SPYCE Team Cynthia Dwork* (Microsoft)

Joan Feigenbaum (Yale)

Joseph Y. Halpern (Cornell)

Patrick D. Lincoln* (SRI)

John C. Mitchell (Stanford)

Andre Scedrov (U Penn)

Vitaly Shmatikov* (SRI)

Jonathan M. Smith (U Penn)

Paul Syverson* (NRL)

Project Coordination: Multi-Pronged Approach to Herding Research

Physical meetings (Dec ’01, Dec ’02)- Workshop on Economics and Information

Security (May ’02) Video conference (Oct ’01) Teleconferences (joint, subgroups) Email discussions

Organization and coordination centered at UPenn

Main Theme: Diffuse Computing

Managing and maintaining a Managing and maintaining a computational infrastucture, computational infrastucture, distributed among many distributed among many heterogeneous nodes that do heterogeneous nodes that do not trust each other completely not trust each other completely and may have incentives (needs, and may have incentives (needs, priorities).priorities).

MissionAnalysis

5.3.1

JFHQ

DevelopCOAE

5.3.4

JFHQ

PlanningGuidance

5.3.2

CDR

EndState 5.3.3

CDR

AnalyzeCOAE

5.3.5

JFHQ

RedTeamInputs

0.0

RedTeam

SelectCOAE

5.3.7

CDR

PrepareETO

5.3.9

JFHQ

JFHQFunctional

Inputs 5.3.4

JFHQ

Collaborative Planning Environment

externalFunctional

Inputs0.0

COE

ReviseONA JFHQ

TaskMission CINC

PrepareONA JFHQ

PrepareCONPLAN

w/FDOs5.3.9JFHQ

DetermineDesired

End StateCINC

SharpenONA JIC

DevelopLogisticsSupport JFHQ

Command

5.4

JFHQ

ProjectFuture

OperationsJFHQ

CompareMoE

0.0

JFHQ

CompareMoP 0.0

JFHQ

5.3.6

JFHQ

5.3.8

CDR

JPOTF

DIA

NAVFOR Element

MARFOR Element

JF HQ

JPG

AFFOR Element

ARFOR Element

JFACC

JFLCC

DOCC

JFMCC

JSOTF

POC

JCSNMCC

SPSTF

COC

Theater JIC/JAC

NMJIC

NCAUnified CINC

USAF

SupportCommands

Theater

USMC

Navy

Army

JCCC

JLRC

JOCJISE

JPRC

JPRC

ACE

JISE (JFLCC)

JISE/J2 (JSOTF)

JISE/J2 Watch (JFACC)

MTACC/ACE

JFHQ OPFAC Interfaces in Wartime Scenario

TRANSCOM

SPACECOM

STRATCOM

SPOC

JIOC

JWAC

AFSPOC

ARSPOC

NAVSPOC

MI

CP Main

CP Fwd

CINC IMO

JCCCJCCC

NOC

NOCNOC

NOC

TCCCIO Cell

DISAGNOSC

RNOSC RNOSC

Other AgenciesNRO

NSA

NSA

JMCGAOC

JAOC

JISE/J2 (JFMCC)JMOC

CVIC/CDCTFCC

JCCC

JOC (JFLCC)

JCCC

TOC

JRTOC

JOC

JLRC

JPGJCCC

JISENIST

NRO

JOC (JSOTF)

JF HQ

JFLCC

JFMCC

JFACC

Unified CINC

AFFOR Element

MARFOR Element

NAVFOR Element

ARFOR Element

JSOTF

Theater JIC/JAC

National CINC JFHQ Staff JF Component Service Component

NCA

DIA

NRO

NSA

JCS

NIMA

SOCOM

TacticalAssets

TRANSCOM

SPACECOM

STRATCOM

JWAC

DLA

CIA

Academia

Coast Guard Element

JFHQ CINC Plug

C4ISR Architecture

Diffuse Computing

Paradigm developing rapidly as a result of - commercial computing markets - now-recognized potential of

peer-to-peer computing and grid computing- the need for distributed network-centric

systems, Raises challenges for

- system design, - software production, - the development of mechanisms ensuring

stable equilibria of diffuse systems

SPYCE Objective:Scaleable High Assurance

Develop fundamental understanding, models, algorithms, and network testbed, in order to reduce cost, improve performance, and provide higher reliability for networked operations across untrusted networks.

Incentive Compatibility

Efficient Diffuse Multimedia Networking

Secure Data Storage and Communication

Authorization Schemes

Smart devices diffuse into the environment….

… with control and assurance

Desktop ‘80s

Room ‘40s

Wearable ‘90s

Pervasive ‘00s

CPU

CPUCPU

CPUCPU

Mobile team

Persistent Object Base

Intelligent information processing

URI Objective Algorithms to model diffuse computing and achieve scaleable high assurance

DoD capabilities enhanced Reduced cost, improved performance, and higher reliability for networked operations across untrusted networks

Scientific/technical approach Computing and networking elements diffusing into the environment need: -Local incentive-compatibility in global distributed computing-Scaleable authorization mechanisms-Assured communication-Experimental evidence

Sample Accomplishments• Local conditions for stable routes in

interdomain routing

• Anonymous communication

• SPAM reduction algorithms

• Content transcoding for heterogeneous clients

• Kerberos V protocol analysis

• Logic for reasoning about digital rights

URI, 2001 March, 2003

Software Quality and Infrastructure Protection for Diffuse Computing

Smart devices diffuse into the environment….

… with control and assurance

Desktop ‘80s

Room ‘40s

Wearable ‘90s

Pervasive ‘00s

[email protected] Web URL: http://www.cis.upenn.edu/spyce/

Conferences where we publish Computer Security Foundations Workshop Conference on Computer and Communication Security International Information Security Conference Workshop on Security and Privacy in Digital Rights

Management Conference on Electronic Commerce Symposium on Principles of Distributed Computing International Symposium on High-Performance Distributed

Computing

Conference on Computer Communications International Workshop on Web Content Caching and

Distribution International Symposium on Modeling, Analysis and

Simulation of Computer and Telecommunication Systems

Conferences where we publish Computer Security Foundations Workshop Conference on Computer and Communication Security International Information Security Conference Workshop on Security and Privacy in Digital Rights

Management Conference on Electronic Commerce Symposium on Principles of Distributed Computing International Symposium on High-Performance Distributed

Computing

Conference on Computer Communications International Workshop on Web Content Caching and

Distribution International Symposium on Modeling, Analysis and

Simulation of Computer and Telecommunication Systems

KeywordsComputerSecurityDistributedCommunication

Project Themes

Combines 4 complementary thrusts:- Incentive-compatibility in distributed

computing- Authorization mechanisms- Secure data storage and retrieval- Communication protocols

Multi-institution experimental platform + systematic, formal treatment of underlying models, algorithms & data structures

July 2001

SPYCE areas of concentration

Market-based computation (incentive-compatibility)

Communication and security protocols analysis

Authorization mechanisms (trust management)

Privacy and anonymityNetworking, experimental platform

Today

Spyce Interaction Graph

CynthiaAndre

JonathanJoe

Patrick

John

VitalyJoan

Paul

Spyce Interaction Graph

- Protocol Analysis

CynthiaAndre

JonathanJoe

Patrick

John

VitalyJoan

Paul

Spyce Interaction Graph

- Protocol Analysis- Formal Methods

for Cryptography

CynthiaAndre

JonathanJoe

Patrick

John

VitalyJoan

Paul

Spyce Interaction Graph

- Protocol Analysis- Formal Methods

for Cryptography

- Anonymity

CynthiaAndre

JonathanJoe

Patrick

John

VitalyJoan

Paul

Spyce Interaction Graph

- Protocol Analysis- Formal Methods

for Cryptography

- Anonymity- Privacy

CynthiaAndre

JonathanJoe

Patrick

John

VitalyJoan

Paul

Spyce Interaction Graph

- Protocol Analysis- Formal Methods

for Cryptography

- Anonymity- Privacy- Algorithmic

Mech Design

CynthiaAndre

JonathanJoe

Patrick

John

VitalyJoan

Paul

Spyce Interaction Graph

- Protocol Analysis- Formal Methods

for Cryptography

- Anonymity- Privacy- Algorithmic

Mech Design- Authorization

CynthiaAndre

JonathanJoe

Patrick

John

VitalyJoan

Paul

Spyce Interaction Graph

- Protocol Analysis- Formal Methods

for Cryptography

- Anonymity- Privacy- Algorithmic

Mech Design- Authorization- Decision Theory

CynthiaAndre

JonathanJoe

Patrick

John

VitalyJoan

Paul

Spyce Interaction Graph

- Protocol Analysis- Formal Methods

for Cryptography

- Anonymity- Privacy- Algorithmic

Mech Design- Authorization- Decision Theory- BGP

CynthiaAndre

JonathanJoe

Patrick

John

VitalyJoan

Paul

Spyce Interaction Graph

- Protocol Analysis- Formal Methods

for Cryptography

- Anonymity- Privacy- Algorithmic

Mech Design- Authorization- Decision Theory- BGP- Digital Rights

CynthiaAndre

JonathanJoe

Patrick

John

VitalyJoan

Paul

Presentations today

Feigenbaum Market-based computation Halpern Communication and security

protocols Mitchell Authorization mechanisms Everyone Poster Session Lincoln Privacy and anonymity Smith Networking

Summary of Project:Multidisciplinary Research

Software Quality and Infrastructure Protection for Diffuse Computing

Algorithms to model diffuse computing and achieve scaleable high assurance

Multi-institution experimental platform

Software Quality and Infrastructure Protection

for Diffuse Computing

FY2001 ONR CIP/SW URI

Principal Investigator: Andre ScedrovInstitution: University of Pennsylvania

URL: http://www.cis.upenn.edu/spyce

STARTED IN MAY 2001

Diffuse Computing

Diffuse computing is an emerging paradigm in which computational task are performed by aggregated computational services, distributed over a network.

This paradigm, developing rapidly as a result of commercial computing markets, the now-recognized potential of peer-to-peer systems, and the need for distributed network-centric systems, raises challenges for system design, software production, and the development of mechanisms ensuring stable equilibria of diffuse systems.

Project Meetings URI kickoff meeting July 7 ‘01 (DC) Video conference Oct 8 ’01 (Penn-SRI) First board meeting Nov 5 ’01 (Penn) Group meeting Dec ’01 (Calistoga, CA)

- Workshop on Economics and Information Security

May ’02 (Berkeley) Second board meeting June 21 ’02 (Penn) Third board meeting Sep 30 ’02 (Cape May) Group meeting Dec ’02 (St. John,USVI) Continuing visits among sites, teleconferences Fourth board meeting Mar 31 ’03 (Penn)

Diffuse Computing

CPU

CPUCPU

CPUCPU

Mobile team

Persistent Object Base

Intelligent information processing