Secure Cloud Computing With Brokered Trusted Sensor...

Preview:

Citation preview

Secure Cloud Computing With Brokered Trusted

Sensor NetworksProfs. Steven Myers, Apu Kapadia, XiaoFeng Wang and

Geoffrey Fox

School of Informatics and ComputingIndiana University, Bloomington

Monday, March 29, 2010

Router

Router

Router

Router

Mini Computer Mini Computer Mini Computer Mini Computer

External Storage

External Storage

Router Router

Router

Router

Cloud Computing

Cloud Computing Cloud

Computing

Tower-mountAntenna

Tower-mountAntenna

Wireless Bridge

Computing & Network

Model

Monday, March 29, 2010

Sensor Model: (Not a Mote)•Android G1 Development Phone.•Version 1.6 Android OS•Sensors

•WiFi 802.11b/g•Bluetooth•Temperature/Thermometer•Accelerometer•GPS•Touch Screen•Camera (3.1 MP)•Audio

•QualComm 7201 528MHZ •64MB Ram•MicroSD Slow Storage•Currently NO SIM CHIPS

Monday, March 29, 2010

Router

Router

Router

Router

Mini Computer Mini Computer Mini Computer Mini Computer

External Storage

External Storage

Router Router

Router

Router

Cloud Computing

Cloud Computing Cloud

Computing

Tower-mountAntenna

Tower-mountAntenna

Wireless Bridge

Security Threats

1. Cloud or Grid

2. Communication Channels

3. Client

4. Sensor

5. Environment

Monday, March 29, 2010

Router

Router

Router

Router

Mini Computer Mini Computer Mini Computer Mini Computer

External Storage

External Storage

Router Router

Router

Router

Cloud Computing

Cloud Computing Cloud

Computing

Tower-mountAntenna

Tower-mountAntenna

Wireless Bridge

Security Threats1. Cloud or Grid

1. Information Theft

2. Malware

3. Covert Channels (shared CPU/Resrouces)

4. Proof of Computation?

Monday, March 29, 2010

Router

Router

Router

Router

Mini Computer Mini Computer Mini Computer Mini Computer

External Storage

External Storage

Router Router

Router

Router

Cloud Computing

Cloud Computing Cloud

Computing

Tower-mountAntenna

Tower-mountAntenna

Wireless Bridge

Security Threats

2. Communication Channels

1. Eavesdropping

2. Manipulation of packets

3. Denial/Delay Of Service

Monday, March 29, 2010

Router

Router

Router

Router

Mini Computer Mini Computer Mini Computer Mini Computer

External Storage

External Storage

Router Router

Router

Router

Cloud Computing

Cloud Computing Cloud

Computing

Tower-mountAntenna

Tower-mountAntenna

Wireless Bridge

Security Threats

3. Client

1. Malware

2. Human Predictability/Fallibility

Desktop PC

Monday, March 29, 2010

Router

Router

Router

Router

Mini Computer Mini Computer Mini Computer Mini Computer

External Storage

External Storage

Router Router

Router

Router

Cloud Computing

Cloud Computing Cloud

Computing

Tower-mountAntenna

Tower-mountAntenna

Wireless Bridge

Security Threats

4. Sensor

1. Malware/Viruses

2. Sensor data lost or stolen

3. Human Predictability/Fallibility

Monday, March 29, 2010

Router

Router

Router

Router

Mini Computer Mini Computer Mini Computer Mini Computer

External Storage

External Storage

Router Router

Router

Router

Cloud Computing

Cloud Computing Cloud

Computing

Tower-mountAntenna

Tower-mountAntenna

Wireless Bridge

Security Threats

5. Environment

1. Sensor stolen or repositioned

2. Environment modified to provide artificial sensor readings

Monday, March 29, 2010

Protecting Sensors From Environment

Monday, March 29, 2010

Goal: Prevent/Detect Theft or Movement of

Sensors

Monday, March 29, 2010

Idea: Use Sensor Information to

Determine Risk that Phone is misplaced/stolen

Monday, March 29, 2010

Examples

• If I have my phone in my office at 3pm vs 3am, what are the risks?

• If my phone knows my wife’s phone and my earpiece are present, what are the chances of theft?

• If the phone is in motion and gate of walker is equivalent to owners, what are the risks?

• Phone was authenticated to, and been in constant use since then.

Monday, March 29, 2010

Architecture

Overall Risk

EngineG

PS Risk

Blue

toot

hW

iFi

Gai

t Risk

Tem

p.Ri

sk

Usag

eAn

alys

is

Sensor Data

Final Risk Determination/Provenance

Data

•If final risk is low sensor data reported as is, possibly with Provenance Data.•If risk is high, force authentication of phone before reporting data or mark with high-risk provenance data.

Monday, March 29, 2010

Widget showing low risk

Monday, March 29, 2010

Widget showing high risk

Monday, March 29, 2010

GPS Sensor Risk

Monday, March 29, 2010

Record Phone’s Posn.

Youarehere

Monday, March 29, 2010

HOWAAA.....

(H)ome

(W)ork

(A)ux(O)ther

HOW

OWA

WAA

WAA

AAA

Location recorded every 30-Min. for 24 Hrs. producing the string

String is parses starting on each letter into triplets for 3rd order HMM

Convert to common location string for HMM Learning

Monday, March 29, 2010

0-2 3-5 6-8 9-11

12-14 15-17 18-20 21-23

A hierarchical HMM model is used to learn users schedules. At the outer layer we in essence have a node for each 3 hour block of time in the day.

Each node contains within it a 3rd order multi-state HMM to learn the schedule over the corresponding hours.

Tradeoff Learning Accuracy vs. Runtime Costs

Monday, March 29, 2010

On clicking Map It! (integrated with GoogleMaps)

Monday, March 29, 2010

Clicking “menu” will give an option to add the location

Monday, March 29, 2010

On Clicking “Add Location”

Monday, March 29, 2010

You can select Home, Work, etc

Monday, March 29, 2010

On clicking save, gives you a confirmation

Monday, March 29, 2010

Bluetooth Sensor Risk

Monday, March 29, 2010

Bluetooth Risk Idea

• Proximity of certain devices suggest low risk (Wife’s phone, my bluetooth earpiece, laptop, PS3, etc....)

• Proximity of certain devices suggest high risk (Enemy’s phone, competitor’s phone, device which has only questionable purposes)

Monday, March 29, 2010

Selection Menu

Monday, March 29, 2010

Bluetooth Menu

Monday, March 29, 2010

Scans and shows bluetooth currently around

Monday, March 29, 2010

Select appropriate list to add the bluetooth into

Monday, March 29, 2010

On Clicking “More >>” on the widget

Monday, March 29, 2010

Going Forward

• Calibrating Individual Sensor Risk

• Overall Risk Engine Structure (right now, simple expectation calc.)

• Other Sensors (phone call surfing patterns, accelerometer gait analysis).

Monday, March 29, 2010

Recommended