Upload
others
View
47
Download
0
Embed Size (px)
Citation preview
Secure Cloud Computing With Brokered Trusted
Sensor NetworksProfs. Steven Myers, Apu Kapadia, XiaoFeng Wang and
Geoffrey Fox
School of Informatics and ComputingIndiana University, Bloomington
Monday, March 29, 2010
Router
Router
Router
Router
Mini Computer Mini Computer Mini Computer Mini Computer
External Storage
External Storage
Router Router
Router
Router
Cloud Computing
Cloud Computing Cloud
Computing
Tower-mountAntenna
Tower-mountAntenna
Wireless Bridge
Computing & Network
Model
Monday, March 29, 2010
Sensor Model: (Not a Mote)•Android G1 Development Phone.•Version 1.6 Android OS•Sensors
•WiFi 802.11b/g•Bluetooth•Temperature/Thermometer•Accelerometer•GPS•Touch Screen•Camera (3.1 MP)•Audio
•QualComm 7201 528MHZ •64MB Ram•MicroSD Slow Storage•Currently NO SIM CHIPS
Monday, March 29, 2010
Router
Router
Router
Router
Mini Computer Mini Computer Mini Computer Mini Computer
External Storage
External Storage
Router Router
Router
Router
Cloud Computing
Cloud Computing Cloud
Computing
Tower-mountAntenna
Tower-mountAntenna
Wireless Bridge
Security Threats
1. Cloud or Grid
2. Communication Channels
3. Client
4. Sensor
5. Environment
Monday, March 29, 2010
Router
Router
Router
Router
Mini Computer Mini Computer Mini Computer Mini Computer
External Storage
External Storage
Router Router
Router
Router
Cloud Computing
Cloud Computing Cloud
Computing
Tower-mountAntenna
Tower-mountAntenna
Wireless Bridge
Security Threats1. Cloud or Grid
1. Information Theft
2. Malware
3. Covert Channels (shared CPU/Resrouces)
4. Proof of Computation?
Monday, March 29, 2010
Router
Router
Router
Router
Mini Computer Mini Computer Mini Computer Mini Computer
External Storage
External Storage
Router Router
Router
Router
Cloud Computing
Cloud Computing Cloud
Computing
Tower-mountAntenna
Tower-mountAntenna
Wireless Bridge
Security Threats
2. Communication Channels
1. Eavesdropping
2. Manipulation of packets
3. Denial/Delay Of Service
Monday, March 29, 2010
Router
Router
Router
Router
Mini Computer Mini Computer Mini Computer Mini Computer
External Storage
External Storage
Router Router
Router
Router
Cloud Computing
Cloud Computing Cloud
Computing
Tower-mountAntenna
Tower-mountAntenna
Wireless Bridge
Security Threats
3. Client
1. Malware
2. Human Predictability/Fallibility
Desktop PC
Monday, March 29, 2010
Router
Router
Router
Router
Mini Computer Mini Computer Mini Computer Mini Computer
External Storage
External Storage
Router Router
Router
Router
Cloud Computing
Cloud Computing Cloud
Computing
Tower-mountAntenna
Tower-mountAntenna
Wireless Bridge
Security Threats
4. Sensor
1. Malware/Viruses
2. Sensor data lost or stolen
3. Human Predictability/Fallibility
Monday, March 29, 2010
Router
Router
Router
Router
Mini Computer Mini Computer Mini Computer Mini Computer
External Storage
External Storage
Router Router
Router
Router
Cloud Computing
Cloud Computing Cloud
Computing
Tower-mountAntenna
Tower-mountAntenna
Wireless Bridge
Security Threats
5. Environment
1. Sensor stolen or repositioned
2. Environment modified to provide artificial sensor readings
Monday, March 29, 2010
Protecting Sensors From Environment
Monday, March 29, 2010
Goal: Prevent/Detect Theft or Movement of
Sensors
Monday, March 29, 2010
Idea: Use Sensor Information to
Determine Risk that Phone is misplaced/stolen
Monday, March 29, 2010
Examples
• If I have my phone in my office at 3pm vs 3am, what are the risks?
• If my phone knows my wife’s phone and my earpiece are present, what are the chances of theft?
• If the phone is in motion and gate of walker is equivalent to owners, what are the risks?
• Phone was authenticated to, and been in constant use since then.
Monday, March 29, 2010
Architecture
Overall Risk
EngineG
PS Risk
Blue
toot
hW
iFi
Gai
t Risk
Tem
p.Ri
sk
Usag
eAn
alys
is
Sensor Data
Final Risk Determination/Provenance
Data
•If final risk is low sensor data reported as is, possibly with Provenance Data.•If risk is high, force authentication of phone before reporting data or mark with high-risk provenance data.
Monday, March 29, 2010
Widget showing low risk
Monday, March 29, 2010
Widget showing high risk
Monday, March 29, 2010
GPS Sensor Risk
Monday, March 29, 2010
Record Phone’s Posn.
Youarehere
Monday, March 29, 2010
HOWAAA.....
(H)ome
(W)ork
(A)ux(O)ther
HOW
OWA
WAA
WAA
AAA
Location recorded every 30-Min. for 24 Hrs. producing the string
String is parses starting on each letter into triplets for 3rd order HMM
Convert to common location string for HMM Learning
Monday, March 29, 2010
0-2 3-5 6-8 9-11
12-14 15-17 18-20 21-23
A hierarchical HMM model is used to learn users schedules. At the outer layer we in essence have a node for each 3 hour block of time in the day.
Each node contains within it a 3rd order multi-state HMM to learn the schedule over the corresponding hours.
Tradeoff Learning Accuracy vs. Runtime Costs
Monday, March 29, 2010
On clicking Map It! (integrated with GoogleMaps)
Monday, March 29, 2010
Clicking “menu” will give an option to add the location
Monday, March 29, 2010
On Clicking “Add Location”
Monday, March 29, 2010
You can select Home, Work, etc
Monday, March 29, 2010
On clicking save, gives you a confirmation
Monday, March 29, 2010
Bluetooth Sensor Risk
Monday, March 29, 2010
Bluetooth Risk Idea
• Proximity of certain devices suggest low risk (Wife’s phone, my bluetooth earpiece, laptop, PS3, etc....)
• Proximity of certain devices suggest high risk (Enemy’s phone, competitor’s phone, device which has only questionable purposes)
Monday, March 29, 2010
Selection Menu
Monday, March 29, 2010
Bluetooth Menu
Monday, March 29, 2010
Scans and shows bluetooth currently around
Monday, March 29, 2010
Select appropriate list to add the bluetooth into
Monday, March 29, 2010
On Clicking “More >>” on the widget
Monday, March 29, 2010
Going Forward
• Calibrating Individual Sensor Risk
• Overall Risk Engine Structure (right now, simple expectation calc.)
• Other Sensors (phone call surfing patterns, accelerometer gait analysis).
Monday, March 29, 2010