Secure Cloud Computing With Brokered Trusted Sensor...

33
Secure Cloud Computing With Brokered Trusted Sensor Networks Profs. Steven Myers, Apu Kapadia, XiaoFeng Wang and Geoffrey Fox School of Informatics and Computing Indiana University, Bloomington Monday, March 29, 2010

Transcript of Secure Cloud Computing With Brokered Trusted Sensor...

Page 1: Secure Cloud Computing With Brokered Trusted Sensor Networksdsc.soic.indiana.edu/presentations/TalkDayton.pdf · Cloud Computing Cloud Computing Cloud Computing Tower-mount Antenna

Secure Cloud Computing With Brokered Trusted

Sensor NetworksProfs. Steven Myers, Apu Kapadia, XiaoFeng Wang and

Geoffrey Fox

School of Informatics and ComputingIndiana University, Bloomington

Monday, March 29, 2010

Page 2: Secure Cloud Computing With Brokered Trusted Sensor Networksdsc.soic.indiana.edu/presentations/TalkDayton.pdf · Cloud Computing Cloud Computing Cloud Computing Tower-mount Antenna

Router

Router

Router

Router

Mini Computer Mini Computer Mini Computer Mini Computer

External Storage

External Storage

Router Router

Router

Router

Cloud Computing

Cloud Computing Cloud

Computing

Tower-mountAntenna

Tower-mountAntenna

Wireless Bridge

Computing & Network

Model

Monday, March 29, 2010

Page 3: Secure Cloud Computing With Brokered Trusted Sensor Networksdsc.soic.indiana.edu/presentations/TalkDayton.pdf · Cloud Computing Cloud Computing Cloud Computing Tower-mount Antenna

Sensor Model: (Not a Mote)•Android G1 Development Phone.•Version 1.6 Android OS•Sensors

•WiFi 802.11b/g•Bluetooth•Temperature/Thermometer•Accelerometer•GPS•Touch Screen•Camera (3.1 MP)•Audio

•QualComm 7201 528MHZ •64MB Ram•MicroSD Slow Storage•Currently NO SIM CHIPS

Monday, March 29, 2010

Page 4: Secure Cloud Computing With Brokered Trusted Sensor Networksdsc.soic.indiana.edu/presentations/TalkDayton.pdf · Cloud Computing Cloud Computing Cloud Computing Tower-mount Antenna

Router

Router

Router

Router

Mini Computer Mini Computer Mini Computer Mini Computer

External Storage

External Storage

Router Router

Router

Router

Cloud Computing

Cloud Computing Cloud

Computing

Tower-mountAntenna

Tower-mountAntenna

Wireless Bridge

Security Threats

1. Cloud or Grid

2. Communication Channels

3. Client

4. Sensor

5. Environment

Monday, March 29, 2010

Page 5: Secure Cloud Computing With Brokered Trusted Sensor Networksdsc.soic.indiana.edu/presentations/TalkDayton.pdf · Cloud Computing Cloud Computing Cloud Computing Tower-mount Antenna

Router

Router

Router

Router

Mini Computer Mini Computer Mini Computer Mini Computer

External Storage

External Storage

Router Router

Router

Router

Cloud Computing

Cloud Computing Cloud

Computing

Tower-mountAntenna

Tower-mountAntenna

Wireless Bridge

Security Threats1. Cloud or Grid

1. Information Theft

2. Malware

3. Covert Channels (shared CPU/Resrouces)

4. Proof of Computation?

Monday, March 29, 2010

Page 6: Secure Cloud Computing With Brokered Trusted Sensor Networksdsc.soic.indiana.edu/presentations/TalkDayton.pdf · Cloud Computing Cloud Computing Cloud Computing Tower-mount Antenna

Router

Router

Router

Router

Mini Computer Mini Computer Mini Computer Mini Computer

External Storage

External Storage

Router Router

Router

Router

Cloud Computing

Cloud Computing Cloud

Computing

Tower-mountAntenna

Tower-mountAntenna

Wireless Bridge

Security Threats

2. Communication Channels

1. Eavesdropping

2. Manipulation of packets

3. Denial/Delay Of Service

Monday, March 29, 2010

Page 7: Secure Cloud Computing With Brokered Trusted Sensor Networksdsc.soic.indiana.edu/presentations/TalkDayton.pdf · Cloud Computing Cloud Computing Cloud Computing Tower-mount Antenna

Router

Router

Router

Router

Mini Computer Mini Computer Mini Computer Mini Computer

External Storage

External Storage

Router Router

Router

Router

Cloud Computing

Cloud Computing Cloud

Computing

Tower-mountAntenna

Tower-mountAntenna

Wireless Bridge

Security Threats

3. Client

1. Malware

2. Human Predictability/Fallibility

Desktop PC

Monday, March 29, 2010

Page 8: Secure Cloud Computing With Brokered Trusted Sensor Networksdsc.soic.indiana.edu/presentations/TalkDayton.pdf · Cloud Computing Cloud Computing Cloud Computing Tower-mount Antenna

Router

Router

Router

Router

Mini Computer Mini Computer Mini Computer Mini Computer

External Storage

External Storage

Router Router

Router

Router

Cloud Computing

Cloud Computing Cloud

Computing

Tower-mountAntenna

Tower-mountAntenna

Wireless Bridge

Security Threats

4. Sensor

1. Malware/Viruses

2. Sensor data lost or stolen

3. Human Predictability/Fallibility

Monday, March 29, 2010

Page 9: Secure Cloud Computing With Brokered Trusted Sensor Networksdsc.soic.indiana.edu/presentations/TalkDayton.pdf · Cloud Computing Cloud Computing Cloud Computing Tower-mount Antenna

Router

Router

Router

Router

Mini Computer Mini Computer Mini Computer Mini Computer

External Storage

External Storage

Router Router

Router

Router

Cloud Computing

Cloud Computing Cloud

Computing

Tower-mountAntenna

Tower-mountAntenna

Wireless Bridge

Security Threats

5. Environment

1. Sensor stolen or repositioned

2. Environment modified to provide artificial sensor readings

Monday, March 29, 2010

Page 10: Secure Cloud Computing With Brokered Trusted Sensor Networksdsc.soic.indiana.edu/presentations/TalkDayton.pdf · Cloud Computing Cloud Computing Cloud Computing Tower-mount Antenna

Protecting Sensors From Environment

Monday, March 29, 2010

Page 11: Secure Cloud Computing With Brokered Trusted Sensor Networksdsc.soic.indiana.edu/presentations/TalkDayton.pdf · Cloud Computing Cloud Computing Cloud Computing Tower-mount Antenna

Goal: Prevent/Detect Theft or Movement of

Sensors

Monday, March 29, 2010

Page 12: Secure Cloud Computing With Brokered Trusted Sensor Networksdsc.soic.indiana.edu/presentations/TalkDayton.pdf · Cloud Computing Cloud Computing Cloud Computing Tower-mount Antenna

Idea: Use Sensor Information to

Determine Risk that Phone is misplaced/stolen

Monday, March 29, 2010

Page 13: Secure Cloud Computing With Brokered Trusted Sensor Networksdsc.soic.indiana.edu/presentations/TalkDayton.pdf · Cloud Computing Cloud Computing Cloud Computing Tower-mount Antenna

Examples

• If I have my phone in my office at 3pm vs 3am, what are the risks?

• If my phone knows my wife’s phone and my earpiece are present, what are the chances of theft?

• If the phone is in motion and gate of walker is equivalent to owners, what are the risks?

• Phone was authenticated to, and been in constant use since then.

Monday, March 29, 2010

Page 14: Secure Cloud Computing With Brokered Trusted Sensor Networksdsc.soic.indiana.edu/presentations/TalkDayton.pdf · Cloud Computing Cloud Computing Cloud Computing Tower-mount Antenna

Architecture

Overall Risk

EngineG

PS Risk

Blue

toot

hW

iFi

Gai

t Risk

Tem

p.Ri

sk

Usag

eAn

alys

is

Sensor Data

Final Risk Determination/Provenance

Data

•If final risk is low sensor data reported as is, possibly with Provenance Data.•If risk is high, force authentication of phone before reporting data or mark with high-risk provenance data.

Monday, March 29, 2010

Page 15: Secure Cloud Computing With Brokered Trusted Sensor Networksdsc.soic.indiana.edu/presentations/TalkDayton.pdf · Cloud Computing Cloud Computing Cloud Computing Tower-mount Antenna

Widget showing low risk

Monday, March 29, 2010

Page 16: Secure Cloud Computing With Brokered Trusted Sensor Networksdsc.soic.indiana.edu/presentations/TalkDayton.pdf · Cloud Computing Cloud Computing Cloud Computing Tower-mount Antenna

Widget showing high risk

Monday, March 29, 2010

Page 17: Secure Cloud Computing With Brokered Trusted Sensor Networksdsc.soic.indiana.edu/presentations/TalkDayton.pdf · Cloud Computing Cloud Computing Cloud Computing Tower-mount Antenna

GPS Sensor Risk

Monday, March 29, 2010

Page 18: Secure Cloud Computing With Brokered Trusted Sensor Networksdsc.soic.indiana.edu/presentations/TalkDayton.pdf · Cloud Computing Cloud Computing Cloud Computing Tower-mount Antenna

Record Phone’s Posn.

Youarehere

Monday, March 29, 2010

Page 19: Secure Cloud Computing With Brokered Trusted Sensor Networksdsc.soic.indiana.edu/presentations/TalkDayton.pdf · Cloud Computing Cloud Computing Cloud Computing Tower-mount Antenna

HOWAAA.....

(H)ome

(W)ork

(A)ux(O)ther

HOW

OWA

WAA

WAA

AAA

Location recorded every 30-Min. for 24 Hrs. producing the string

String is parses starting on each letter into triplets for 3rd order HMM

Convert to common location string for HMM Learning

Monday, March 29, 2010

Page 20: Secure Cloud Computing With Brokered Trusted Sensor Networksdsc.soic.indiana.edu/presentations/TalkDayton.pdf · Cloud Computing Cloud Computing Cloud Computing Tower-mount Antenna

0-2 3-5 6-8 9-11

12-14 15-17 18-20 21-23

A hierarchical HMM model is used to learn users schedules. At the outer layer we in essence have a node for each 3 hour block of time in the day.

Each node contains within it a 3rd order multi-state HMM to learn the schedule over the corresponding hours.

Tradeoff Learning Accuracy vs. Runtime Costs

Monday, March 29, 2010

Page 21: Secure Cloud Computing With Brokered Trusted Sensor Networksdsc.soic.indiana.edu/presentations/TalkDayton.pdf · Cloud Computing Cloud Computing Cloud Computing Tower-mount Antenna

On clicking Map It! (integrated with GoogleMaps)

Monday, March 29, 2010

Page 22: Secure Cloud Computing With Brokered Trusted Sensor Networksdsc.soic.indiana.edu/presentations/TalkDayton.pdf · Cloud Computing Cloud Computing Cloud Computing Tower-mount Antenna

Clicking “menu” will give an option to add the location

Monday, March 29, 2010

Page 23: Secure Cloud Computing With Brokered Trusted Sensor Networksdsc.soic.indiana.edu/presentations/TalkDayton.pdf · Cloud Computing Cloud Computing Cloud Computing Tower-mount Antenna

On Clicking “Add Location”

Monday, March 29, 2010

Page 24: Secure Cloud Computing With Brokered Trusted Sensor Networksdsc.soic.indiana.edu/presentations/TalkDayton.pdf · Cloud Computing Cloud Computing Cloud Computing Tower-mount Antenna

You can select Home, Work, etc

Monday, March 29, 2010

Page 25: Secure Cloud Computing With Brokered Trusted Sensor Networksdsc.soic.indiana.edu/presentations/TalkDayton.pdf · Cloud Computing Cloud Computing Cloud Computing Tower-mount Antenna

On clicking save, gives you a confirmation

Monday, March 29, 2010

Page 26: Secure Cloud Computing With Brokered Trusted Sensor Networksdsc.soic.indiana.edu/presentations/TalkDayton.pdf · Cloud Computing Cloud Computing Cloud Computing Tower-mount Antenna

Bluetooth Sensor Risk

Monday, March 29, 2010

Page 27: Secure Cloud Computing With Brokered Trusted Sensor Networksdsc.soic.indiana.edu/presentations/TalkDayton.pdf · Cloud Computing Cloud Computing Cloud Computing Tower-mount Antenna

Bluetooth Risk Idea

• Proximity of certain devices suggest low risk (Wife’s phone, my bluetooth earpiece, laptop, PS3, etc....)

• Proximity of certain devices suggest high risk (Enemy’s phone, competitor’s phone, device which has only questionable purposes)

Monday, March 29, 2010

Page 28: Secure Cloud Computing With Brokered Trusted Sensor Networksdsc.soic.indiana.edu/presentations/TalkDayton.pdf · Cloud Computing Cloud Computing Cloud Computing Tower-mount Antenna

Selection Menu

Monday, March 29, 2010

Page 29: Secure Cloud Computing With Brokered Trusted Sensor Networksdsc.soic.indiana.edu/presentations/TalkDayton.pdf · Cloud Computing Cloud Computing Cloud Computing Tower-mount Antenna

Bluetooth Menu

Monday, March 29, 2010

Page 30: Secure Cloud Computing With Brokered Trusted Sensor Networksdsc.soic.indiana.edu/presentations/TalkDayton.pdf · Cloud Computing Cloud Computing Cloud Computing Tower-mount Antenna

Scans and shows bluetooth currently around

Monday, March 29, 2010

Page 31: Secure Cloud Computing With Brokered Trusted Sensor Networksdsc.soic.indiana.edu/presentations/TalkDayton.pdf · Cloud Computing Cloud Computing Cloud Computing Tower-mount Antenna

Select appropriate list to add the bluetooth into

Monday, March 29, 2010

Page 32: Secure Cloud Computing With Brokered Trusted Sensor Networksdsc.soic.indiana.edu/presentations/TalkDayton.pdf · Cloud Computing Cloud Computing Cloud Computing Tower-mount Antenna

On Clicking “More >>” on the widget

Monday, March 29, 2010

Page 33: Secure Cloud Computing With Brokered Trusted Sensor Networksdsc.soic.indiana.edu/presentations/TalkDayton.pdf · Cloud Computing Cloud Computing Cloud Computing Tower-mount Antenna

Going Forward

• Calibrating Individual Sensor Risk

• Overall Risk Engine Structure (right now, simple expectation calc.)

• Other Sensors (phone call surfing patterns, accelerometer gait analysis).

Monday, March 29, 2010