310 likes | 465 Views
FY2001 ONR CIP/SW URI. Software Quality and Infrastructure Protection for Diffuse Computing. Principal Investigator: Andre Scedrov Institution: University of Pennsylvania URL: http://www.cis.upenn.edu/spyce. STARTED IN MAY 2001. The SPYCE Team. Cynthia Dwork* (Microsoft)
E N D
FY2001 ONR CIP/SW URI Software Quality and Infrastructure Protection for Diffuse Computing Principal Investigator: Andre Scedrov Institution: University of Pennsylvania URL:http://www.cis.upenn.edu/spyce STARTED IN MAY 2001
The SPYCE Team • Cynthia Dwork* (Microsoft) • Joan Feigenbaum (Yale) • Joseph Y. Halpern (Cornell) • Patrick D. Lincoln* (SRI) • John C. Mitchell (Stanford) • Andre Scedrov (U Penn) • Vitaly Shmatikov* (SRI) • Jonathan M. Smith (U Penn) • Paul Syverson* (NRL)
Project Coordination:Multi-Pronged Approach to Herding Research • Physical meetings (Dec ’01, Dec ’02) • Workshop on Economics and Information Security (May ’02) • Video conference (Oct ’01) • Teleconferences (joint, subgroups) • Email discussions • Organization and coordination centered at UPenn
Main Theme: Diffuse Computing Managing and maintaining a computational infrastucture, distributed among many heterogeneous nodes that do not trust each other completely and may have incentives (needs, priorities).
National CINC JFHQ Staff JF Component Service Component CIA STRATCOM JFLCC JFHQ CINC Plug NRO Other Agencies NCA DLA NRO Unified CINC NMCC JCS NIST JOC Prepare JISE ARFOR Element CINC IMO ONA JFHQ NSA SPACECOM JLRC Prepare JOC TCCC JWAC JISE JPRC IO Cell CONPLAN NSA 5.3.9 JWAC Theater JF HQ JLRC w/FDOs JFHQ JPRC Develop USMC Logistics USAF DIA NMJIC Navy Collaborative Planning Environment TRANSCOM DIA Support JFHQ JPG JRTOC SPSTF JCCC Army JFACC Support JPG external Sharpen Commands JCCC Theater JIC/JAC JFHQ MARFOR Element Functional ONA JIC Functional Inputs JIOC NSA Inputs JF HQ Mission 5.3.4 0.0 GNOSC Task 5.3.1 Compare Analysis JFHQ COE DISA Mission CINC MoE JFHQ Tactical 0.0 JFACC JFHQ STRATCOM RNOSC Assets RNOSC Revise NRO JISE/J2 Watch (JFACC) AFSPOC ONA JISE/J2 (JFMCC) JFHQ 5.3.4 ARSPOC JMOC SPOC JFHQ Compare Project NAVSPOC JAOC Develop MoP JCCC 5.3.5 Theater JIC/JAC Future 0.0 AFFOR Element JCCC JFHQ JFMCC COAE SPACECOM JFHQ JFHQ Operations NIMA JFMCC AOC End Analyze JMCG Determine State COAE 5.3.2 NOC 5.3.3 5.3.7 5.3.9 5.4 Desired TFCC CVIC/CDC Coast Guard Element CDR CDR CDR JFHQ JFHQ CINC End State TRANSCOM JCS Unified CINC Prepare Planning Select Command NOC AFFOR Element ETO Guidance COAE JCCC JISE/J2 (JSOTF) JFLCC NAVFOR Element NAVFOR Element NCA JCCC JSOTF JOC (JSOTF) JISE (JFLCC) CP Main JOC (JFLCC) SOCOM JSOTF POC MTACC/ACE COC CP Fwd Red Academia 0.0 MI TOC JPOTF Team Red Team Inputs NOC ACE NOC 5.3.6 DOCC 5.3.8 JFHQ OPFAC Interfaces in Wartime Scenario CDR JFHQ MARFOR Element ARFOR Element C4ISR Architecture
Diffuse Computing • Paradigm developing rapidly as a result of • commercial computing markets • now-recognized potential of peer-to-peer computing and grid computing • the need for distributed network-centric systems, • Raises challenges for • system design, • software production, • the development of mechanisms ensuring stable equilibria of diffuse systems
Smart devices diffuse into the environment…. Room ‘40s Desktop ‘80s Wearable ‘90s … with control and assurance Pervasive ‘00s SPYCE Objective:Scaleable High Assurance Develop fundamental understanding, models, algorithms, and network testbed, in order to reduce cost, improve performance, and provide higher reliability for networked operations across untrusted networks. Persistent Object Base CPU Mobile team Efficient Diffuse Multimedia Networking Incentive Compatibility Authorization Schemes CPU Secure Data Storage and Communication CPU CPU CPU Intelligent information processing
Software Quality and Infrastructure Protection for Diffuse Computing scedrov@saul.cis.upenn.edu Web URL: http://www.cis.upenn.edu/spyce/ URI, 2001 March, 2003 Smart devices diffuse into the environment…. URI Objective Algorithms to model diffuse computing and achieve scaleable high assurance DoD capabilities enhancedReduced cost, improved performance, and higher reliability for networked operations across untrusted networks Room ‘40s Desktop ‘80s Wearable ‘90s … with control and assurance Pervasive ‘00s • Scientific/technical approach • Computing and networking elements diffusing into the environment need: • Local incentive-compatibility in global distributed computing • Scaleable authorization mechanisms • Assured communication • Experimental evidence • Sample Accomplishments • Local conditions for stable routes in interdomain routing • Anonymous communication • SPAM reduction algorithms • Content transcoding for heterogeneous clients • Kerberos V protocol analysis • Logic for reasoning about digital rights
Conferences where we publish • Computer Security Foundations Workshop • Conference on Computer and Communication Security • International Information Security Conference • Workshop on Security and Privacy in Digital Rights Management • Conference on Electronic Commerce • Symposium on Principles of Distributed Computing • International Symposium on High-Performance Distributed Computing • Conference on Computer Communications • International Workshop on Web Content Caching and Distribution • International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems
Conferences where we publish • Computer Security Foundations Workshop • Conference on Computer and Communication Security • International Information Security Conference • Workshop on Security and Privacy in Digital Rights Management • Conference on Electronic Commerce • Symposium on Principles of Distributed Computing • International Symposium on High-Performance Distributed Computing • Conference on Computer Communications • International Workshop on Web Content Caching and Distribution • International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems Keywords Computer Security Distributed Communication
Project Themes July 2001 • Combines 4 complementary thrusts: • Incentive-compatibility in distributed computing • Authorization mechanisms • Secure data storage and retrieval • Communication protocols • Multi-institution experimental platform + systematic, formal treatment of underlying models, algorithms & data structures
Today SPYCE areas of concentration • Market-based computation (incentive-compatibility) • Communication and security protocols analysis • Authorization mechanisms (trust management) • Privacy and anonymity • Networking, experimental platform
Spyce Interaction Graph Andre John Cynthia Joan Vitaly Joe Jonathan Paul Patrick
Spyce Interaction Graph • Protocol Analysis Andre John Cynthia Joan Vitaly Joe Jonathan Paul Patrick
Spyce Interaction Graph • Protocol Analysis • Formal Methods for Cryptography Andre John Cynthia Joan Vitaly Joe Jonathan Paul Patrick
Spyce Interaction Graph • Protocol Analysis • Formal Methods for Cryptography • Anonymity Andre John Cynthia Joan Vitaly Joe Jonathan Paul Patrick
Spyce Interaction Graph • Protocol Analysis • Formal Methods for Cryptography • Anonymity • Privacy Andre John Cynthia Joan Vitaly Joe Jonathan Paul Patrick
Spyce Interaction Graph • Protocol Analysis • Formal Methods for Cryptography • Anonymity • Privacy • Algorithmic Mech Design Andre John Cynthia Joan Vitaly Joe Jonathan Paul Patrick
Spyce Interaction Graph • Protocol Analysis • Formal Methods for Cryptography • Anonymity • Privacy • Algorithmic Mech Design • Authorization Andre John Cynthia Joan Vitaly Joe Jonathan Paul Patrick
Spyce Interaction Graph • Protocol Analysis • Formal Methods for Cryptography • Anonymity • Privacy • Algorithmic Mech Design • Authorization • Decision Theory Andre John Cynthia Joan Vitaly Joe Jonathan Paul Patrick
Spyce Interaction Graph • Protocol Analysis • Formal Methods for Cryptography • Anonymity • Privacy • Algorithmic Mech Design • Authorization • Decision Theory • BGP Andre John Cynthia Joan Vitaly Joe Jonathan Paul Patrick
Spyce Interaction Graph • Protocol Analysis • Formal Methods for Cryptography • Anonymity • Privacy • Algorithmic Mech Design • Authorization • Decision Theory • BGP • Digital Rights Andre John Cynthia Joan Vitaly Joe Jonathan Paul Patrick
Presentations today • Feigenbaum Market-based computation • Halpern Communication and security protocols • Mitchell Authorization mechanisms • Everyone Poster Session • Lincoln Privacy and anonymity • Smith Networking
Summary of Project: Multidisciplinary Research • Software Quality and Infrastructure Protection for Diffuse Computing • Algorithms to model diffuse computing and achieve scaleable high assurance • Multi-institution experimental platform
FY2001 ONR CIP/SW URI Software Quality and Infrastructure Protection for Diffuse Computing Principal Investigator: Andre Scedrov Institution: University of Pennsylvania URL:http://www.cis.upenn.edu/spyce STARTED IN MAY 2001
Diffuse Computing • Diffuse computing is an emerging paradigm in which computational task are performed by aggregated computational services, distributed over a network. • This paradigm, developing rapidly as a result of commercial computing markets, the now-recognized potential of peer-to-peer systems, and the need for distributed network-centric systems, raises challenges for system design, software production, and the development of mechanisms ensuring stable equilibria of diffuse systems.
Project Meetings • URI kickoff meeting July 7 ‘01 (DC) • Video conference Oct 8 ’01 (Penn-SRI) • First board meeting Nov 5 ’01 (Penn) • Group meeting Dec ’01 (Calistoga, CA) • Workshop on Economics and Information Security May ’02 (Berkeley) • Second board meeting June 21 ’02 (Penn) • Third board meeting Sep 30 ’02 (Cape May) • Group meeting Dec ’02 (St. John,USVI) • Continuing visits among sites, teleconferences • Fourth board meeting Mar 31 ’03 (Penn)
Persistent Object Base CPU Mobile team CPU CPU CPU CPU Intelligent information processing Diffuse Computing