Download pdf - Project

Transcript
Page 1: Project

A Combination of Multi Factor Authentication and Single Sign-on

Event to Improve Security for Ubiquitous Desktops in Virtual and

Cloud Computing Environment

• M. Neela Muhil Vannan (30906104028)• S. Santhosh (30906104042)

Guided by, Ms. S. M. Poonkuzhali M.E.,Lecturer,

Department of Computer Science and EngineeringMeenakshi Sundararajan Engineering College.

Page 2: Project

Contents• Introduction• Existing System and Objective• Proposed System• System Architecture and Sequence of

Modules• UML Diagrams• System Specification• Implementation of the Modules• Testing Conditions• Future Enhancements• References

4/14/2010

Page 3: Project

Introduction

• Ubiquitous refers to catering of all services under a single framework• Integration of various services into a single piece of abstracted

hardware constitutes the concept of virtualization• Extending this concept to a higher level of usage in the

organizational level means the application and deployment of Cloud computing

• Cloud Computing offers various services like, Software as a Service, Platform as a Service, Storage as a Service

• Private clouds in organizations may provide all three mentioned above.

4/14/2010

Page 4: Project

Existing System And Objective

• Emphasis is on low cost and decentralization of the entire infrastructure

• Usage of Thin clients is usually encouraged in the cloud computing setup

• Private Cloud requires a higher level of authentication than the one present at this stage

• Impersonation and other types of attacks from insiders cause major loss of data

• To provide a secure ubiquitous framework for desktop virtualization and cloud computing environments using a single sign on event strengthened by multi-factor authentication.

4/14/2010

Page 5: Project

Proposed System

• Usage of multi factor authentication and single sign-on event• LDAP is used for Profile Matching and initial Authentication• Kerberos based authentication service for single sign on and

multifactor authentication• Super User / Administrator for granting and revoking privileges• Security and simplicity of each transaction makes this the most

suitable for light weight thin clients

4/14/2010

Page 6: Project

Design and Relationship

Figure 3 Relationships between Ubiquitous Desktop and Thin Clients

Figure 2 Access of Multiple Services

4/14/2010

Page 7: Project

Proposed System Architecture

4/14/2010

Page 8: Project

Sequence of Modules and Implementation

• Module 1 - Virtual Systems and Virtual Networking Environment Setup for Cloud Computing using VMWare Workstation

• Module 2 - Enabling Access and profile creation for the users using LDAP

• Module 3 - Enabling Permissions and Accesses for LDAP Users with SUDO

• Module 4 - Setting up Kerberos Server and Clients for Multifactor authentication and Single Sign on Event

4/14/2010

Page 9: Project

System DesignUML Diagrams

• The Unified Modeling Language is a tool that can be used efficiently to analyze and design any systems.

• The following slides contain the required UML diagrams for the design of the proposed system.o Activity Diagramo Use Case Diagramo Sequence Diagramo Collaboration Diagramo Class Diagram

4/14/2010

Page 10: Project

Activity Diagram

4/14/2010

Page 11: Project

Use Case Diagram

4/14/2010

Page 12: Project

Sequence Diagram 1

4/14/2010

Page 13: Project

Sequence Diagram 2

4/14/2010

Page 14: Project

Collaboration Diagram 1

4/14/2010

Page 15: Project

Collaboration Diagram 2

4/14/2010

Page 16: Project

Class Diagram

4/14/2010

Page 17: Project

System Specification

• Hardware Requiremento Powerful Server for Cloud Computing System with

high resourceso Thin Clients with minimal processing capabilities

• Software Requiremento OpenLDAP Packageo Kerberos Packageo VNC Viewer & RDP

4/14/2010

Page 18: Project

Module 1- Virtual Systems and Virtual Networking Environment Setup for Cloud Computing using VMWare

Workstation

• Creating a cloud server, with storage as a service as the purpose

• Team with an Ethernet port assigned solely for the purpose of creating the LAN between these systems

• Setting up a Repository• Setting Up the Domain Name Server and Setting Hostnames

to the Virtual Systems• Setting up the VNC viewer and RDP connection and Cloud

Setup

4/14/2010

Page 19: Project

Implementation – Module 1

4/14/2010

Page 20: Project

Module 2 - Enabling Access and profile creation for the users using LDAP

• LDIF Format, Configuration Files• The base template - OU, UID,CN, Object class,

Password, Home directory• Generation of secure password - slappasswd , crypt

algorithm• Add the user in the usual method - useradd• Convert them to LDIF format - ./migrate_passwd.pl• Add to the LDAP database - ldapadd

4/14/2010

Page 21: Project

Implementation – Module 2

4/14/2010

Page 22: Project

Module 3 - Enabling Permissions and Accesses for LDAP Users with SUDO

• Enabling Permissions and Accesses for LDAP Users with SUDO

• Access to a file is granted or withheld by comparing the identity of the user making the request against permissions associated with the file

• Sudo gives the ability for a user to execute a command or process that is not available ordinarily but by acting as a different user with privileges

4/14/2010

Page 23: Project

Implementation – Module 3

4/14/2010

Page 24: Project

• Network authentication protocol• Uses secret-key cryptography.• Firewalls assume that "the bad guys" are on the outside,

which is often a very bad assumption• Most of the really damaging incidents of computer crime

are carried out by insiders• Kerberos authentication makes use of a trusted third

party, termed a key distribution center (KDC)

Module 4 - Setting up Kerberos Server and Clients for Multifactor authentication and Single Sign on Event

4/14/2010

Page 25: Project

Module 4 - Continued.......

• Consists of two logically separate parts: an Authentication Server (AS) and a Ticket Granting Server (TGS)

• Works on the basis of "tickets" which serve to prove the identity of users

• Each entity on the network — whether a client or a server — shares a secret key known only to itself and to the KDC which has a database of the secret keys

• Knowledge of this key serves to prove an entity's identity• The security of the protocol relies heavily on participants maintaining

loosely synchronized time and on short-lived assertions of authenticity called Kerberos tickets

4/14/2010

Page 26: Project

Implementation – Module 4

4/14/2010

Page 27: Project

Working of the project

4/14/2010

Page 28: Project

Testing Conditions• Unit Testing - Testing Script

• Network Connectivity and DNS Testing• Wrong Username or Password Testing• Sudo Permissions Testing• Ticket Expiry and Time Skew

4/14/2010

Page 29: Project

Testing – Case 1 – Network Connectivity and DNS Testing

4/14/2010

Page 30: Project

Testing – Case 2 – Wrong Username or Password Testing

4/14/2010

Page 31: Project

Testing – Case 3 – Sudo Permissions Testing

4/14/2010

Page 32: Project

Testing – Case 4 – Ticket Expiry and Time Skew Testing

4/14/2010

Page 33: Project

Testing – Case 4 – Ticket Expiry and Time Skew Testing

4/14/2010

Page 34: Project

Conclusion

• Multifactor authentication & Single sign-on event increases security

• Ubiqutousness of this environment is made available if the fully qualified domain name [FQDN] is known

4/14/2010

Page 35: Project

Future Enhancements and Possibilities

• Need not be a single type of Operating System like the experimental setup we were using throughout this project

• This might also be ported to hybrid clouds that span a large region and have high level of dedicated resources specified for the cloud server

• Graphical version of the sudo can be also used but the future holds much more extent of improvements to be made possible for this project

4/14/2010

Page 36: Project

References• Amazon Web Services;

http://www.amazon.com/gp/browse.html?node=201590011

• C. Border (2007), “The development and deployment of a multi-user, remote access virtualization system for networking, security, and system administration classes,” Proceedings of the 38th SIGCSE technical symposium on Computer science education, Covington, Kentucky, USA: ACM, pp. 576-580.

• “IBM Press room - 2007-11-15 IBM Introduces Ready-to-Use Cloud Computing - United States”;

http://www-03.ibm.com/press/us/en/pressrelease/22613.wss.

• “Kerberos: The Network Authentication Protocol” http://web.mit.edu/kerberos

• “OpenLDAP 2.2 Administrator’s Guide” http://www.openldap.org/doc/admin22/

• Paul Doyle, Mark Deegan, Ciaran O’Driscoll, Michael Gleeson, and Brian Gillespie (2008), Ubiquitous Desktops with Multi-factor Authentication published in Third International Conference on Digital Information Management, 2008. ICDIM 2008 - IEEE.

• Roderick W. Smith (2005), Linux in a Windows World, O’Reilly Publishers, First Edition.

4/14/2010

Page 37: Project

Thank You

4/14/2010


Recommended