23
Emerging Research Dimensions in IT Security Dr. Salar H. Naqvi [email protected] Senior Member IEEE Research Fellow, CoreGRID Network of Excellence European Research Consortium for Informatics and Mathematics

Emerging Research Dimensions in IT Security Dr. Salar H. Naqvi [email protected] Senior Member IEEE Research Fellow, CoreGRID Network of Excellence European

  • View
    215

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Emerging Research Dimensions in IT Security Dr. Salar H. Naqvi snaqvi@ieee.org Senior Member IEEE Research Fellow, CoreGRID Network of Excellence European

Emerging Research Dimensions in IT Security

Dr. Salar H. [email protected]

Senior Member IEEEResearch Fellow, CoreGRID Network of Excellence

European Research Consortium for Informatics and Mathematics

Page 2: Emerging Research Dimensions in IT Security Dr. Salar H. Naqvi snaqvi@ieee.org Senior Member IEEE Research Fellow, CoreGRID Network of Excellence European

Research Context

Page 3: Emerging Research Dimensions in IT Security Dr. Salar H. Naqvi snaqvi@ieee.org Senior Member IEEE Research Fellow, CoreGRID Network of Excellence European

Evolution of Computing Paradigm

• Static Cooperation– Electronic Data Interchange (EDI)

• Dynamic Cooperation– Internet

• Dynamic Collaboration– Peer-to-Peer (P2P), Web Services (WS)

• Dynamic Resource Sharing– Computational Grid

ComputerComputer ComputerComputer

CustomerCustomer VendorVendorOrders, Payments

Invoice, Pricenotices, updates

Page 4: Emerging Research Dimensions in IT Security Dr. Salar H. Naqvi snaqvi@ieee.org Senior Member IEEE Research Fellow, CoreGRID Network of Excellence European

New Challenges

• Very large scales– million of entities

• Dynamic– entities join, leave, move, change behavior

• Heterogeneous– capability, connectivity, reliability, guarantees, QoS

• Unreliable– components, communication

• Lack of common/complete knowledge– number, type, location, availability, connectivity,

protocols, semantics, etc.

Page 5: Emerging Research Dimensions in IT Security Dr. Salar H. Naqvi snaqvi@ieee.org Senior Member IEEE Research Fellow, CoreGRID Network of Excellence European

Security – Challenges

• Computational Grids– Interoperability, Trust, Usability, Robustness/Resilience,

Delegation, Bootstrapping, Mobility

• Clusters– Integration of different security solutions, automated security

management

• Peer-to-Peer Systems– Setting up uniform security policy, Trust management, storage of

authentication tokens and user identities

• Pervasive/Ubiquitous Computing– Privacy, Scalability, Heterogeneity, Integration, Invisibility

• Mobile Computing– Dependability, Disconnections, Context and State Management

Page 6: Emerging Research Dimensions in IT Security Dr. Salar H. Naqvi snaqvi@ieee.org Senior Member IEEE Research Fellow, CoreGRID Network of Excellence European

New IT Security Research Dimensions

Page 7: Emerging Research Dimensions in IT Security Dr. Salar H. Naqvi snaqvi@ieee.org Senior Member IEEE Research Fellow, CoreGRID Network of Excellence European

Classical Planes

Physical

Logical

Page 8: Emerging Research Dimensions in IT Security Dr. Salar H. Naqvi snaqvi@ieee.org Senior Member IEEE Research Fellow, CoreGRID Network of Excellence European

Novel Planes

Quantum

Physical

Logical

Virtual

Page 9: Emerging Research Dimensions in IT Security Dr. Salar H. Naqvi snaqvi@ieee.org Senior Member IEEE Research Fellow, CoreGRID Network of Excellence European

Virtualization• The secure interoperability between VOs demands interoperable

solutions using heterogeneous systems.

• Virtualization permits each participating end-point to express the policy it wishes to see applied when engaging in a secure conversation with another end-point.

• Policies can specify supported authentication mechanisms, required integrity and confidentiality, trust policies, privacy policies, and other security constraints.

Page 10: Emerging Research Dimensions in IT Security Dr. Salar H. Naqvi snaqvi@ieee.org Senior Member IEEE Research Fellow, CoreGRID Network of Excellence European

Pluggability/Configurability

• Pluggable Security Services (PSS) requirements include:

– Definition of standard and flexible interfaces– Integration at application layer– Coordinated invocation of services– Usable by users and services– Simultaneous use of multiple services– Support for future enhancement– Optimization for various communication links– Provision of real-time invocation features– Use of standard programming interfaces

Page 11: Emerging Research Dimensions in IT Security Dr. Salar H. Naqvi snaqvi@ieee.org Senior Member IEEE Research Fellow, CoreGRID Network of Excellence European

PSS Architectural Overview

Page 12: Emerging Research Dimensions in IT Security Dr. Salar H. Naqvi snaqvi@ieee.org Senior Member IEEE Research Fellow, CoreGRID Network of Excellence European
Page 13: Emerging Research Dimensions in IT Security Dr. Salar H. Naqvi snaqvi@ieee.org Senior Member IEEE Research Fellow, CoreGRID Network of Excellence European

• Application/Client Interface– Authenticates user/application– Facilitate communications

• Configuration Daemon– Accepts machine independent,

abstract configuration request– Interacts with the coordination

service

• Security Services Handler– Absorbs the diversity of security

mechanisms

• Protocol Mapping– Contains the list of supported

protocols

• Security Architecture Interface– Consists of socket modules to plug various security services.

Page 14: Emerging Research Dimensions in IT Security Dr. Salar H. Naqvi snaqvi@ieee.org Senior Member IEEE Research Fellow, CoreGRID Network of Excellence European

SEINIT: Security Expert Initiative

• IST Integrated Project– IST-2002-001929-SEINIT

• Duration: December 2003 – November 2005– Extended till February 2006

• Budget– Total cost: 8 M€– EU Contribution: 3.9 M€

• Objectives– Ensure a trusted and dependable security framework, ubiquitous,

working across multiple devices, heterogeneous networks, being organisation independent (inter-operable) and centred around an end-user.

Page 15: Emerging Research Dimensions in IT Security Dr. Salar H. Naqvi snaqvi@ieee.org Senior Member IEEE Research Fellow, CoreGRID Network of Excellence European

www.seinit.org

Page 16: Emerging Research Dimensions in IT Security Dr. Salar H. Naqvi snaqvi@ieee.org Senior Member IEEE Research Fellow, CoreGRID Network of Excellence European
Page 17: Emerging Research Dimensions in IT Security Dr. Salar H. Naqvi snaqvi@ieee.org Senior Member IEEE Research Fellow, CoreGRID Network of Excellence European

Use case

Bob’s officeSecurity domain

Alice’s officeSecurity domain

Alice’s homeSecurity domain

Railway providerSecurity domain

Bob’s officeSecurity domain

Bob’s officeSecurity domain

Alice’s officeSecurity domain

Alice’s officeSecurity domain

Alice’s homeSecurity domain

Alice’s homeSecurity domain

Railway providerSecurity domainRailway providerSecurity domain

Page 18: Emerging Research Dimensions in IT Security Dr. Salar H. Naqvi snaqvi@ieee.org Senior Member IEEE Research Fellow, CoreGRID Network of Excellence European
Page 19: Emerging Research Dimensions in IT Security Dr. Salar H. Naqvi snaqvi@ieee.org Senior Member IEEE Research Fellow, CoreGRID Network of Excellence European

Novel Planes

Quantum

Physical

Logical

Virtual

Page 20: Emerging Research Dimensions in IT Security Dr. Salar H. Naqvi snaqvi@ieee.org Senior Member IEEE Research Fellow, CoreGRID Network of Excellence European

Quantum Key Distribution (QKD)

• Quantum Key Distribution (QKD) is simultaneous generation of identical bit sequences in two distinct locations with quantum physical methods

• QKD enables the implementation of a secure secret channel

• To make QKD ready for practical applications, we need to– Make physical devices ready for practical application– Provide necessary interfaces for the integration into existing

technologies– Develop conceptual design for networked infrastructures– Development of cryptographic algorithms and models

Page 21: Emerging Research Dimensions in IT Security Dr. Salar H. Naqvi snaqvi@ieee.org Senior Member IEEE Research Fellow, CoreGRID Network of Excellence European

• SECOQC: Secure Communication based on Quantum Cryptography– IST-2002-506813-SECOQC

• Duration: April 2004 – March 2008• Budget

– Total cost: 11.3 M€– EU Contribution: 5.5 M€

• Objectives– Global dependability and security framework

IST Integrated Project SECOQC

Page 22: Emerging Research Dimensions in IT Security Dr. Salar H. Naqvi snaqvi@ieee.org Senior Member IEEE Research Fellow, CoreGRID Network of Excellence European

www.secoqc.net

Page 23: Emerging Research Dimensions in IT Security Dr. Salar H. Naqvi snaqvi@ieee.org Senior Member IEEE Research Fellow, CoreGRID Network of Excellence European

Conclusions & Perspectives

• Security has emerged as an indispensable characteristic of any IT system

• Security components should be woven in the IT Fabric• IT Security requires new dimensions to tackle the

contemporary threats paradigm• European Commission provides funding for IT research

through various programs of IST (Information Society Technologies)

• Notably:– Future Emerging Technologies (FET)– Beyond the Horizon

• Security is not a product – Security is a PROCESS!