My Private Cloud Overview

              David W Chadwick, Matteo Casenove,
                Stijn F Lievens, Jerry I den Hartog,
               Andreas Pashalidis, Joseph Alhadeff


5 July 2011                  IEEE Cloud 2011           1
Project Objectives
       • Migrate the trust, security and privacy preserving
         infrastructure from the EC TAS3 project to cloud
         services.
       • The TSP infrastructure relies on trusted cloud
         providers to operate in good faith but this can be
         checked – trust but verify
       • Infrastructure is built from legal agreements and open
         source software services
       • Software services include: trust and reputation
         management, sticky policies with fine grained access
         controls, privacy preserving delegation of authority,
         federated identity management, different levels of
         assurance and configurable audit trails
5 July 2011                     IEEE Cloud 2011                   2
Legend
IdP=Identity Provider
                               Architectural Components
AA=Attribute Authority
                                        IdP                     Service
DS=Delegation Service
Authn=Authentication                                           Directory
                                  AA
         Service                                DS
P/S=Publish-Subscribe                                                       Audit
     Service                           Authn                               Service
CSP=Cloud Service                                         P/S
      Provider
PEP=Policy
    Enforcement Point           Trust and
                                                      Trust
PDP= Policy Decision           Reputation
                                                     Network
      Point                      Service
Authz=Authorisation                                                  CSP
                         WSC
       Infrastructure
Appln=Application Code                 Dash                       Appln
                                                               P
WSC=Web Services                                                            Audit
                                                               E Authz
      Client
                                                               P Infr
Dash=User’s dashboard
       service                     TAAS
                                                                  PDP      DS
TAAS=Trusted Attribute
   Aggregation Service

5 July 2011                       IEEE Cloud 2011                                    3
Progress To Date
       • Have defined and implemented APIs (in php)
         for
       • Federated Identity Management with different
         Levels of Assurance
       • Privacy Preserving Delegation of Authority
       • Granting of Access Rights to Other Account
         Holders
       • And built these into a front end Proxy Service
         to Amazon/Eucalyptus S3 service

5 July 2011                 IEEE Cloud 2011               4
UK AMF
 Authz Database
                                                                        IdP 1
                           Account
                             DB

    Authz API                                                           IdP 2
                                         WAYF                            …
                          Simple
                         SAMLphp                                        IdP n
           Authn           Proxy
            API             IdP
 Cloud
          (Simple
Service
           SAML                                                     Other IdPs
          phpSP)
                     CVS                   OpenID   Facebook   Google      Twitter
                                  Org
                                 LDAP
 Delegation API

                                                         LEGEND
                    Delegation Issuing              = Cloud API Security Services
                      Web Service                   = External Services
                                                    = Locally Provided Services
Welcome Screen




5 July 2011       IEEE Cloud 2011   6
Login Redirects to Proxy IdP




5 July 2011              IEEE Cloud 2011     7
User Logs In via chosen IdP




5 July 2011             IEEE Cloud 2011     8
User is shown all the Accounts that his Attributes give
   him Ownership of, and Opens (or Creates) one




5 July 2011             IEEE Cloud 2011               9
User is shown Account Details of Opened Account




                                             List of Your Delegates




                                           List of Buckets You Own


                            List of Buckets and Files that other
                            Account Owners have shared with you
5 July 2011              IEEE Cloud 2011                              10
User Opens a Bucket




              Can view/alter Access Rights        Can upload/download files


5 July 2011                     IEEE Cloud 2011                           11
Showing Permissions that You have Granted to Others




                   Permissions given to other Account Holders
                          Permissions given to Contacts
                                Give New Permissions to Others




5 July 2011            IEEE Cloud 2011                      12
Granting Permissions To Others


                                            Granting Public access




                                             Granting access to other
                                             Account Holders



                                                Granting access
                                                to Contacts/Delegates

5 July 2011               IEEE Cloud 2011                            13
Adding a New Contact




5 July 2011          IEEE Cloud 2011   14
Next Steps
       • Define an API for secure auditing and
         integrate this into system
       • Implement existing APIs in other cloud
         services
       • Define APIs for trust and reputation
         management




5 July 2011                 IEEE Cloud 2011       15
Acknowledgements
       • This research has received funding from
       • EC’s FP7 under grant agreement n° 216287
         (Trusted Architecture for Securely Shared
         Services) and
       • UK’s EPSRC under grant ref. n° EP/1034181/1
         (My Private Cloud)




5 July 2011                IEEE Cloud 2011             16

More Related Content

PPT
Best Practices for testing of SOA-based systems - with examples of SOA Suite 11g
PDF
Oracle SOA Suite Overview - Integration in a Service-Oriented World
PDF
Implementing Applications with SOA and Application Integration Architecture
PDF
Developing Url Shortener With Dynamic Behaviour Using AWS Lambda
PDF
Blaze Ds Slides
PDF
How to Choose A SOA Gateway from Layer 7
PDF
Layer 7 and Oracle -
PPTX
Identity Manager in Cloud with Openflow Switches
Best Practices for testing of SOA-based systems - with examples of SOA Suite 11g
Oracle SOA Suite Overview - Integration in a Service-Oriented World
Implementing Applications with SOA and Application Integration Architecture
Developing Url Shortener With Dynamic Behaviour Using AWS Lambda
Blaze Ds Slides
How to Choose A SOA Gateway from Layer 7
Layer 7 and Oracle -
Identity Manager in Cloud with Openflow Switches

Similar to My private cloud overview (20)

PPTX
Seasonal Burst Handling Using Hybrid Cloud Infrastructure from Cloud Security...
PPTX
Enterprise API Security & Data Loss Prevention - Intel
PPTX
Monetizing the Enterprise: Borderless Networks
PDF
Layer 7: The Importance of Standards for Enterprise SOA and Cloud Security
PDF
OpenStack Security
PDF
Smart Cards & Devices Forum 2012 - Securing Cloud Computing
PDF
A Single Strong Authentication Platform for Cloud and On-Premise Applications
PDF
Cloud Security - Made simple
PPTX
Enterprise Access Control Patterns for REST and Web APIs Gluecon 2011, Franco...
PDF
SaaS as a Security Hazard - Google Apps Security Example
PPTX
Criticality of identity
PDF
Standardizing Identity Provisioning with SCIM
PDF
Anil saldhana cloudidentitybestpractices
PDF
Debashis banerjee cloud_is_as_secure
PDF
Enterprise Strategy for Cloud Security
PPTX
Building a Secure Cloud with Identity Management
PDF
Oded Tsur - Ca Cloud Security
PDF
Cloud security - The Cloud is as Secure as you want it to be! - Indicthreads ...
PDF
Projecting Enterprise Security Requirements on the Cloud
PDF
FederatedAccessOpenStack.pdf
Seasonal Burst Handling Using Hybrid Cloud Infrastructure from Cloud Security...
Enterprise API Security & Data Loss Prevention - Intel
Monetizing the Enterprise: Borderless Networks
Layer 7: The Importance of Standards for Enterprise SOA and Cloud Security
OpenStack Security
Smart Cards & Devices Forum 2012 - Securing Cloud Computing
A Single Strong Authentication Platform for Cloud and On-Premise Applications
Cloud Security - Made simple
Enterprise Access Control Patterns for REST and Web APIs Gluecon 2011, Franco...
SaaS as a Security Hazard - Google Apps Security Example
Criticality of identity
Standardizing Identity Provisioning with SCIM
Anil saldhana cloudidentitybestpractices
Debashis banerjee cloud_is_as_secure
Enterprise Strategy for Cloud Security
Building a Secure Cloud with Identity Management
Oded Tsur - Ca Cloud Security
Cloud security - The Cloud is as Secure as you want it to be! - Indicthreads ...
Projecting Enterprise Security Requirements on the Cloud
FederatedAccessOpenStack.pdf
Ad

Recently uploaded (20)

PDF
Hybrid horned lizard optimization algorithm-aquila optimizer for DC motor
PDF
Getting started with AI Agents and Multi-Agent Systems
PPTX
The various Industrial Revolutions .pptx
PPTX
Benefits of Physical activity for teenagers.pptx
PDF
A review of recent deep learning applications in wood surface defect identifi...
PDF
Improvisation in detection of pomegranate leaf disease using transfer learni...
DOCX
search engine optimization ppt fir known well about this
PDF
The influence of sentiment analysis in enhancing early warning system model f...
PDF
CloudStack 4.21: First Look Webinar slides
PDF
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
PDF
Produktkatalog für HOBO Datenlogger, Wetterstationen, Sensoren, Software und ...
PPT
Module 1.ppt Iot fundamentals and Architecture
PPTX
TEXTILE technology diploma scope and career opportunities
PDF
UiPath Agentic Automation session 1: RPA to Agents
PDF
A proposed approach for plagiarism detection in Myanmar Unicode text
PDF
Credit Without Borders: AI and Financial Inclusion in Bangladesh
PPTX
GROUP4NURSINGINFORMATICSREPORT-2 PRESENTATION
PDF
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
PPT
Geologic Time for studying geology for geologist
PDF
NewMind AI Weekly Chronicles – August ’25 Week III
Hybrid horned lizard optimization algorithm-aquila optimizer for DC motor
Getting started with AI Agents and Multi-Agent Systems
The various Industrial Revolutions .pptx
Benefits of Physical activity for teenagers.pptx
A review of recent deep learning applications in wood surface defect identifi...
Improvisation in detection of pomegranate leaf disease using transfer learni...
search engine optimization ppt fir known well about this
The influence of sentiment analysis in enhancing early warning system model f...
CloudStack 4.21: First Look Webinar slides
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
Produktkatalog für HOBO Datenlogger, Wetterstationen, Sensoren, Software und ...
Module 1.ppt Iot fundamentals and Architecture
TEXTILE technology diploma scope and career opportunities
UiPath Agentic Automation session 1: RPA to Agents
A proposed approach for plagiarism detection in Myanmar Unicode text
Credit Without Borders: AI and Financial Inclusion in Bangladesh
GROUP4NURSINGINFORMATICSREPORT-2 PRESENTATION
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
Geologic Time for studying geology for geologist
NewMind AI Weekly Chronicles – August ’25 Week III
Ad

My private cloud overview

  • 1. My Private Cloud Overview David W Chadwick, Matteo Casenove, Stijn F Lievens, Jerry I den Hartog, Andreas Pashalidis, Joseph Alhadeff 5 July 2011 IEEE Cloud 2011 1
  • 2. Project Objectives • Migrate the trust, security and privacy preserving infrastructure from the EC TAS3 project to cloud services. • The TSP infrastructure relies on trusted cloud providers to operate in good faith but this can be checked – trust but verify • Infrastructure is built from legal agreements and open source software services • Software services include: trust and reputation management, sticky policies with fine grained access controls, privacy preserving delegation of authority, federated identity management, different levels of assurance and configurable audit trails 5 July 2011 IEEE Cloud 2011 2
  • 3. Legend IdP=Identity Provider Architectural Components AA=Attribute Authority IdP Service DS=Delegation Service Authn=Authentication Directory AA Service DS P/S=Publish-Subscribe Audit Service Authn Service CSP=Cloud Service P/S Provider PEP=Policy Enforcement Point Trust and Trust PDP= Policy Decision Reputation Network Point Service Authz=Authorisation CSP WSC Infrastructure Appln=Application Code Dash Appln P WSC=Web Services Audit E Authz Client P Infr Dash=User’s dashboard service TAAS PDP DS TAAS=Trusted Attribute Aggregation Service 5 July 2011 IEEE Cloud 2011 3
  • 4. Progress To Date • Have defined and implemented APIs (in php) for • Federated Identity Management with different Levels of Assurance • Privacy Preserving Delegation of Authority • Granting of Access Rights to Other Account Holders • And built these into a front end Proxy Service to Amazon/Eucalyptus S3 service 5 July 2011 IEEE Cloud 2011 4
  • 5. UK AMF Authz Database IdP 1 Account DB Authz API IdP 2 WAYF … Simple SAMLphp IdP n Authn Proxy API IdP Cloud (Simple Service SAML Other IdPs phpSP) CVS OpenID Facebook Google Twitter Org LDAP Delegation API LEGEND Delegation Issuing = Cloud API Security Services Web Service = External Services = Locally Provided Services
  • 6. Welcome Screen 5 July 2011 IEEE Cloud 2011 6
  • 7. Login Redirects to Proxy IdP 5 July 2011 IEEE Cloud 2011 7
  • 8. User Logs In via chosen IdP 5 July 2011 IEEE Cloud 2011 8
  • 9. User is shown all the Accounts that his Attributes give him Ownership of, and Opens (or Creates) one 5 July 2011 IEEE Cloud 2011 9
  • 10. User is shown Account Details of Opened Account List of Your Delegates List of Buckets You Own List of Buckets and Files that other Account Owners have shared with you 5 July 2011 IEEE Cloud 2011 10
  • 11. User Opens a Bucket Can view/alter Access Rights Can upload/download files 5 July 2011 IEEE Cloud 2011 11
  • 12. Showing Permissions that You have Granted to Others Permissions given to other Account Holders Permissions given to Contacts Give New Permissions to Others 5 July 2011 IEEE Cloud 2011 12
  • 13. Granting Permissions To Others Granting Public access Granting access to other Account Holders Granting access to Contacts/Delegates 5 July 2011 IEEE Cloud 2011 13
  • 14. Adding a New Contact 5 July 2011 IEEE Cloud 2011 14
  • 15. Next Steps • Define an API for secure auditing and integrate this into system • Implement existing APIs in other cloud services • Define APIs for trust and reputation management 5 July 2011 IEEE Cloud 2011 15
  • 16. Acknowledgements • This research has received funding from • EC’s FP7 under grant agreement n° 216287 (Trusted Architecture for Securely Shared Services) and • UK’s EPSRC under grant ref. n° EP/1034181/1 (My Private Cloud) 5 July 2011 IEEE Cloud 2011 16