300 likes | 511 Views
Umme Habiba , March 17, 2014. Cross-domain IDMS for Cloud Environment. Healthcare as a C ase-study Thesis Final Defense. Agenda. Introduction Motivation Contributions Research Methodology Implementation Demonstration Future Directions References. Identity: Core of Every Service.
E N D
Umme Habiba, March 17, 2014 Cross-domain IDMS for Cloud Environment Healthcare as a Case-study Thesis Final Defense
Agenda • Introduction • Motivation • Contributions • Research Methodology • Implementation • Demonstration • Future Directions • References
Identity: Core of Every Service • User Provisioning & De-provisioning • Authn & Authz • Federated Identity Management • Single-Sign-On • Self-service • Access Right Delegation • Identity Info. Synchronization • Auditing and Reporting
Challenges for IDMSs in Cloud Authentication Self-Service Access Right Delegation Synchronization Authorization Interoperability Identity Management System
Literature Review - State-of-the-Art Industrial Perspective Security Perspective • Conference & Journal papers • Cloud Identity Management • Pressing Need of securing Identity credentials at Cloud • International IDMS Security Standards • Emerging Security Trends • Widely Adopted Security Standards • Best Practices • State-of-the-art Technologies • UnboundID • Hitachi ID • ORACLE Identity Management • Ping Identity • RSA- Secure ID • Kantara Initiative • Okta • Symplified - The Cloud Security Experts
Problems Assessment criterion for Cloud IDMSs Cloud IDMS Security Issues & Solutions: A Taxonomy Cross-domain IDMS for Cloud Con’t Research Methodology
Problem Statement In order to address the security, interoperability, and privacy concerns in Cloud domain there is a need for cross-domain Identity Management System for Cloud environment that can ensure seamless integration and utilization of identity credentials. In addition to basic identity management features, it must provide advanced security features including access right delegation, synchronization and self-service in Cloud computing scenarios.
Contribution Our Contribution is twofold, which includes: • Establishment of a benchmark to ensure the security of Identity credentials at Cloud. • Design and implementation of cross-domain Identity Management System for Cloud, in particular enhancing SCIM open source protocol.
Research Perspective • Survey Paper ( Status - Published) • UmmeHabiba, A. GhafoorAbbasi, RahatMasood, M. AwaisShibli, “Assessment Criteria for Cloud Identity Management Systems”, Proceedings of The 19th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC-2013), Vancouver, BC, Canada, December 2-4, 2013 • Conceptual Paper ( Status - Accepted Only) • UmmeHabiba, RahatMasood, M. AwaisShibli, “Cross-domain Identity Management Systems for Cloud”, In the proceedings of 22nd Euromicro International Conference on Parallel, Distributed and Network-based Processing (PDP-2014), Turin , Italy, February 12-14, 2014. • Journal Paper ( Status – Under Review) • Umme Habiba, RahatMasood, M. AwaisShibli, Yumna Ghazi, “Cloud Identity Management Security Issues & Solutions: A Taxonomy”, Under Review at IEEE Transactions on Cloud Computing (TCC-SI), Submitted on January 15, 2014
Implementation Perspective Implement a secure Identity management system based on underlying SCIM protocol to ensure: • Credentials Synchronization across CSPs. • User-centricity • Communication level security.
Why UnbounID SCIM SDK ? • Open Source • Widely adopted • Customizable • User Friendly • Generic
Development Toolkit • Netbeans IDE 7.3.1 (JAVA) • MySQL Workbench 5.2 CE • Apache Maven 3.0.5 • Jetty web Server • UnboundID SCIM SDK • Crypto Java API • RESTful Architecture Style • JSON (Data Exchange Format) • Log4j API
MySQL DB Decrypt Unmarshaller SCIM Method Domain 1 Domain 2 REST based SCIM Endpoint SCIM SDK Response Detailed Work flow SCIM Service CSP1 CSP2 SCIM Endpoint //localhost:8080 //localhost:8081 MySQL DB Jetty Server Jetty Server CSC
Goals - IDMS perspective • Interoperability • Credentials sync. across CSPs. • User-centricity (Privacy) • Communication level security
Protocol Enhancements Unbound SCIM SDK Enhanced SCIM GUI Encryption JSON Marshaller/Unmarshaller RESTful Architecture style Dual SCIM Endpoint Synchronization • Single SCIM Endpoint • SCIM Schema • SDK for CRUD
Evaluation Security Evaluation Functionality
Functionality Perspective • Aspects of Evaluation • Correctness and Effectiveness • Leading Versus Lagging Indicators • Organizational Security Objectives • Qualitative and Quantitative Properties • Measurements of the Large VersusSmall
Con’t.. • Security Guidance for Critical Areas Of Focus In Cloud Computing - V3.0 • Domain 1 : Cloud Computing Architectural Framework Governing in the Cloud • Domain 2 : Governance and Enterprise Risk Management • . • . • . • Domain 10 : Application Security • Domain 11 : Encryption and Key Management • Domain 12 : Guidance for Identity and Access Management (IAM) • Domain 13 : Virtualization • Domain 14 : Security as a Service
Enhanced SCIM Protocol – Healthcare as a Case-study Application Layer Business LogicLayer Posted to CSP2 StorageLayer SCIM Doctor Interface MySQL DB Encryption SCIM SDK Encryption/ Decryption Module V/U My Profile V/U Patient Details SCIM Administrator Interface User Provisioning , De-provisioning, A/C Management Decryption Key Key Management Server SCIM Patient Interface V/U My Profile
Future Research Directions • Access Right Delegation is among our main system components. However, in the presented system we have not considered the concept of delegation chaining which is typically required in the real world environments thus is one of the possible future research directions in the field of cross-domain identity management. • Encryption of identity credentials raises the concerns of key management and storage issues which need to be addressed. Future research should focus on defining proper key generation and management mechanisms. • Sharing and storage of sensitive identity information at third party provided CSPs raises issues like lack of trusted security and privacy mechanisms, therefore requires some trust establishment technique. Integration of trust establishment module in the proposed system is yet another significant research direction that should be explored in detail.
References • Antonio Celesti, Francesco Tusa, Massimo Villari and Antonio Puliafito, “Security and Cloud Computing: InterCloud Identity Management Infrastructure” , Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises, Larissa- Greece 2010. • Liang Yan, ChunmingRong, and Gansen Zhao, "Strengthen Cloud Computing Security with Federal Identity Management Using Hierarchical Identity-Based Cryptography", Springer 1st International Conference on Cloud Computing, Beijing-China 2009. • Il Kon Kim, Zeeshan Pervez, AsadMasoodKhattak and Sungyoung Lee, “Chord Based Identity Management for e-Healthcare Cloud Applications”, 10th Annual International Symposium on Applications and the Intern IEEE, Seoul-Korea 2010. • David W Chadwick and MatteoCasenove, “Security APIs for My Private Cloud Granting access to anyone, from anywhere at any time”, Third IEEE International Conference on Coud Computing Technology and Science, Athens-Greece 2011. • AnuGopalakrishnan, "Cloud Computing Identity Management", SETLabs Briefings VOL 7 NO 7, Business Innovation through Technology, 2009. • Yang Zhang and Jun-Liang Chen, “A Delegation Solution for Universal Identity Management in SOA”, IEEE Transactions On Services Computing, Vol. 4, No. 1, January-March 2011 • R. Sánchez et al., “Enhancing Privacy and Dynamic Federation in IdM for Consumer Cloud Computing”, IEEE Transactions on Consumer Electronics, Vol. 58, No. 1, February 2012 • RohitRanchal, Bharat Bhargava, Lotfi Ben Othmane and LeszekLilien, “Protection of Identity Information in Cloud Computing without Trusted Third Party”, Published in 29th IEEE International Symposium on Reliable Distributed Systems, New Delhi-India 2010.
Cont.. • Mika¨elAtes, Serge Ravet, AbakarMohamatAhmat and Jacques Fayolle, “An Identity-Centric Internet: Identity in the Cloud,Identity as a Service and other delights”, Sixth International Conference on Availability, Reliability and Security, Vienna-Austria 2011. • Mohammad M. R. Chowdhury, Josef Noll, “Distributed Identity for Secure Service Interaction”, Proceedings of the Third International Conference on Wireless and Mobile Communications (ICWMC'07), Guadeloupe 2007. • AmlanJyotiChoudhury, Pardeep Kumar, MangalSain, Hyotaek Lim and Hoon Jae-Lee, “A Strong User Authentication Framework for Cloud Computing” , IEEE Asia -Pacific Services Computing Conference, Jeju Island-South Korea 2011. • Albeshri, A, and W Caelli. "Mutual Protection in a Cloud Computing Environment", IEEE 12th International Conference on High Performance Computing and Communications, 2010. • Yuan Cao, , and Lin Yang. "A Survey of Identity Management Technology", IEEE International Conference on Information Theory and Information Security, 2010. • Song Luo, Jianbin Hu* and Zhong Chen, “An Identity-Based One-Time Password Scheme with Anonymous Authentication”, International Conference on Networks Security, Wireless Communications and Trusted Computing, Wuhan, Hubei –China 2009. • Yang Zhang Jun-Liang Chen, “Universal Identity Management Model Based on Anonymous Credentials”, IEEE International Conference on Services Computing, Miami-Florida 2010 • PelinAngin, Bharat Bhargava, Mark Linderman and LeszekLilien,"An Entity-centric Approach for Privacy and Identity Management in Cloud Computing", 29th IEEE International Symposium on Reliable Distributed Systems, New Delhi-India 2010.