cross-tenant trust models in cloud computing

26
Institute for Cyber Security Cross-Tenant Trust Models in Cloud Computing Bo Tang and Ravi Sandhu IRI Aug 14-16, 2013 San Francisco, CA © ICS at UTSA World-Leading Research with Real- World Impact! 1

Upload: nan

Post on 23-Feb-2016

41 views

Category:

Documents


0 download

DESCRIPTION

Cross-Tenant Trust Models in Cloud Computing . Bo Tang and Ravi Sandhu IRI Aug 14-16, 2013 San Francisco, CA. OUTLINE. Introduction Background and Motivation Cross-Tenant Trust Model (CTTM) Tenant Trust Relations Formalized Model Role-Based CTTM (RB-CTTM) Related Work - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: Cross-Tenant Trust Models in Cloud Computing

World-Leading Research with Real-World Impact! 1

Institute for Cyber Security

Cross-Tenant Trust Models in Cloud Computing

Bo Tang and Ravi Sandhu

IRIAug 14-16, 2013San Francisco, CA

© ICS at UTSA

Page 2: Cross-Tenant Trust Models in Cloud Computing

OUTLINE

IntroductionBackground and MotivationCross-Tenant Trust Model (CTTM)

Tenant Trust RelationsFormalized ModelRole-Based CTTM (RB-CTTM)

Related WorkConclusion and Discussion

© ICS at UTSA World-Leading Research with Real-World Impact! 2

Page 3: Cross-Tenant Trust Models in Cloud Computing

OUTLINE

IntroductionBackground and MotivationCross-Tenant Trust Model (CTTM)

Tenant Trust RelationsFormalized ModelRole-Based CTTM (RB-CTTM)

Related WorkConclusion and Discussion

© ICS at UTSA World-Leading Research with Real-World Impact! 3

Page 4: Cross-Tenant Trust Models in Cloud Computing

Cloud Computing

Shared infrastructure [$$$] -----> [$|$|$]

Multi-Tenancy Virtually dedicated resources

Data Locked-inCollaborations can only be achieved through desktop.E.g.: create/edit Word documents in Dropbox.

A suitable fine-grained cross-tenant access control model is essential

© ICS at UTSA World-Leading Research with Real-World Impact! 4

Source: http://blog.box.com/2011/06/box-and-google-docs-accelerating-the-cloud-workforce/

Page 5: Cross-Tenant Trust Models in Cloud Computing

Industry Solutions

Microsoft and IBM: Fine-grained data sharing in SaaS using DB schema Only feasible in DB

NASA: RBAC + OpenStack (Nebula) Lacks ability to support multi-org collaborations

Salesforce (Force.com): Single Sign-On + SAMLFocus on authentication and simple authorizationHeavy management of certificates

© ICS at UTSA World-Leading Research with Real-World Impact! 5

Source: http://msdn.microsoft.com/en-us/library/aa479086.aspx http://nebula.nasa.gov/blog/2010/06/03/nebulas-implementation-role-based-access-control-rbac/http://wiki.developerforce.com/page/Single_Sign-On_with_SAML_on_Force.com

Page 6: Cross-Tenant Trust Models in Cloud Computing

OUTLINE

IntroductionBackground and MotivationCross-Tenant Trust Model (CTTM)

Tenant Trust RelationsFormalized ModelRole-Based CTTM (RB-CTTM)

Related WorkConclusion and Discussion

© ICS at UTSA World-Leading Research with Real-World Impact! 6

Page 7: Cross-Tenant Trust Models in Cloud Computing

Motivation

© Bo Tang World-Leading Research with Real-World Impact! 7

Figure 1. A car renting example of cross-tenant accesses

Page 8: Cross-Tenant Trust Models in Cloud Computing

On-Demand Self-Service

Centralized facility Resource pool

Multi-tenancy Unilateral and automatic provisioning as neededDynamically assigned virtual resources

Temporary users and tenants

© Bo Tang World-Leading Research with Real-World Impact! 8

Page 9: Cross-Tenant Trust Models in Cloud Computing

Scope and Assumptions

Standardized APIsCross-tenant accesses are functionally available

Authenticated UsersRemovable assumptions:

One Cloud ServiceoBut extensible to multi-cloud

Two Tenant Trust (rather than federation)Unidirectional Trust Relations (like follow in Twitter)Unilateral Trust Relations (trustor or trustee)

© Bo Tang World-Leading Research with Real-World Impact! 9

Page 10: Cross-Tenant Trust Models in Cloud Computing

OUTLINE

IntroductionBackground and MotivationCross-Tenant Trust Model (CTTM)

Tenant Trust RelationsFormalized ModelRole-Based CTTM (RB-CTTM)

Related WorkConclusion and Discussion

© ICS at UTSA World-Leading Research with Real-World Impact! 10

Page 11: Cross-Tenant Trust Models in Cloud Computing

Tenant Trust Relations

Tenant Trust (TT) relation is not partial orderIt is

Reflexive: A ⊴ ABut not transitive: A ⊴ B ∧ B ⊴ C ⇏ A ⊴ CNeither symmetric: A ⊴ B ⇏ B ⊴ A Nor anti-symmetric: A ⊴ B ∧ B ⊴ A ⇏ A ≡ B

© Bo Tang World-Leading Research with Real-World Impact! 11

Page 12: Cross-Tenant Trust Models in Cloud Computing

Trust Types

Four potential trust types:Type-α: trustor can give access to trustee. Type-β: trustee can give access to trustor. Type-γ: trustee can take access from trustor. Type-δ: trustor can take access from trustee.

oNo meaningful use case, since the trustor holds all the control of the cross-tenant assignments of the trustee’s permissions.

© Bo Tang World-Leading Research with Real-World Impact! 12

Page 13: Cross-Tenant Trust Models in Cloud Computing

Formalized CTTM Model

© Bo Tang World-Leading Research with Real-World Impact! 13

Figure 2. Cross-Tenant Trust Management model

Page 14: Cross-Tenant Trust Models in Cloud Computing

CTTM Authz. Assignments

AA U × P , a many-to-many user-to-permission ⊆assignment relation, also written as “←”, requiring that u ← p only ifpermOwner(p) ≡ userOwner(u) ∨permOwner(p) ⊴α userOwner(u) ∨userOwner(u) ⊴β permOwner(p) ∨permOwner(p) ⊴γ userOwner(u),where only one of the requirements can apply ⊴depending on the nature of TT.

Example: Bob@UTSA ← discount%AVIS

© Bo Tang World-Leading Research with Real-World Impact! 14

Page 15: Cross-Tenant Trust Models in Cloud Computing

Role-Based CTTM

© Bo Tang World-Leading Research with Real-World Impact! 15

Figure 3. Role-Based Cross-Tenant Trust Management model

Page 16: Cross-Tenant Trust Models in Cloud Computing

RB-CTTM Authz. Assignments

UA U × R, is a many-to-many user-to-role ⊆assignment relation;

PA P × R, is a many-to-many permission-to-role ⊆assignment relation requiring that (p, r) PA only ∈if permOwner(p) ≡ roleOwner(r) ∨permOwner(p) ⊴α roleOwner(r) ∨roleOwner(r) ⊴β permOwner(p) ∨permOwner(p) ⊴γ roleOwner(r),where only one of the ⊴ requirements can apply depending on the nature of TT;

© Bo Tang World-Leading Research with Real-World Impact! 16

Page 17: Cross-Tenant Trust Models in Cloud Computing

RB-CTTM Authz. Assignments (contd.)

RH R × R, is a partial order on R called role ⊆hierarchy or role dominance relation, also written as “≥”, requiring that r2 ≥ r1 only ifroleOwner(r1) ≡ roleOwner(r2) ∨roleOwner (r1) ⊴α roleOwner(r2) ∨roleOwner (r2) ⊴β roleOwner (r1) ∨roleOwner (r1) ⊴γ roleOwner(r2),where only one of the ⊴ requirements can apply depending on the nature of TT;

© Bo Tang World-Leading Research with Real-World Impact! 17

Page 18: Cross-Tenant Trust Models in Cloud Computing

Feasibility in the Cloud

© Bo Tang World-Leading Research with Real-World Impact! 18

Figure 4. Multi-Tenant Authorization as a Service (MTAaaS) Architecture

Page 19: Cross-Tenant Trust Models in Cloud Computing

OUTLINE

IntroductionBackground and MotivationCross-Tenant Trust Model (CTTM)

Tenant Trust RelationsFormalized ModelRole-Based CTTM (RB-CTTM)

Related WorkConclusion and Discussion

© ICS at UTSA World-Leading Research with Real-World Impact! 19

Page 20: Cross-Tenant Trust Models in Cloud Computing

Related Work

RBAC CBAC, GB-RBAC, ROBAC (e.g.: player transfer in NBA) Require central authority managing collaborations

Delegation Models dRBAC and PBDM (e.g.: allowing subleasing) Lacks agility (which the cloud requires)

Grids CAS, VOMS, PERMIS Absence of centralized facility and homogeneous

architecture (which the cloud has)

© ICS at UTSA World-Leading Research with Real-World Impact! 20

Page 21: Cross-Tenant Trust Models in Cloud Computing

Related Work (Contd.)

Role-based Trust RT (Type-α trust relation)MTAS (Type-β trust relation)MT-RBAC (Type-γ trust relation)Suits the cloud (out-sourcing trust)

© ICS at UTSA World-Leading Research with Real-World Impact! 21

Page 22: Cross-Tenant Trust Models in Cloud Computing

OUTLINE

IntroductionBackground and MotivationCross-Tenant Trust Model (CTTM)

Tenant Trust RelationsFormalized ModelRole-Based CTTM (RB-CTTM)

Related WorkConclusion and Future Work

© ICS at UTSA World-Leading Research with Real-World Impact! 22

Page 23: Cross-Tenant Trust Models in Cloud Computing

Conclusion

Needs of cross-tenant access controlOn-demand self-service modelTenant trust relation and typesCTTM and RB-CTTM models

FormalizationFeasibility in the cloud

Mapping to related workRT, MTAS and MT-RBAC

© ICS at UTSA World-Leading Research with Real-World Impact! 23

Page 24: Cross-Tenant Trust Models in Cloud Computing

Future Work

Other models compatible with MTAaaS platformImplementation MTAaaS in OpenStack

© ICS at UTSA World-Leading Research with Real-World Impact! 24

Page 25: Cross-Tenant Trust Models in Cloud Computing

Institute for Cyber Security

Q & A

© ICS at UTSA World-Leading Research with Real-World Impact! 25

Page 26: Cross-Tenant Trust Models in Cloud Computing

Institute for Cyber Security

Thank You!

© ICS at UTSA World-Leading Research with Real-World Impact! 26