Upload
timothy-copeland
View
219
Download
0
Tags:
Embed Size (px)
Citation preview
Software Quality and Infrastructure Protection
for Diffuse Computing
FY2001 ONR CIP/SW URI
Principal Investigator: Andre ScedrovInstitution: University of Pennsylvania
URL: http://www.cis.upenn.edu/spyce
STARTED IN MAY 2001
The SPYCE Team Cynthia Dwork* (Microsoft)
Joan Feigenbaum (Yale)
Joseph Y. Halpern (Cornell)
Patrick D. Lincoln* (SRI)
John C. Mitchell (Stanford)
Andre Scedrov (U Penn)
Vitaly Shmatikov* (SRI)
Jonathan M. Smith (U Penn)
Paul Syverson* (NRL)
Project Coordination: Multi-Pronged Approach to Herding Research
Physical meetings (Dec ’01, Dec ’02)- Workshop on Economics and Information
Security (May ’02) Video conference (Oct ’01) Teleconferences (joint, subgroups) Email discussions
Organization and coordination centered at UPenn
Main Theme: Diffuse Computing
Managing and maintaining a Managing and maintaining a computational infrastucture, computational infrastucture, distributed among many distributed among many heterogeneous nodes that do heterogeneous nodes that do not trust each other completely not trust each other completely and may have incentives (needs, and may have incentives (needs, priorities).priorities).
MissionAnalysis
5.3.1
JFHQ
DevelopCOAE
5.3.4
JFHQ
PlanningGuidance
5.3.2
CDR
EndState 5.3.3
CDR
AnalyzeCOAE
5.3.5
JFHQ
RedTeamInputs
0.0
RedTeam
SelectCOAE
5.3.7
CDR
PrepareETO
5.3.9
JFHQ
JFHQFunctional
Inputs 5.3.4
JFHQ
Collaborative Planning Environment
externalFunctional
Inputs0.0
COE
ReviseONA JFHQ
TaskMission CINC
PrepareONA JFHQ
PrepareCONPLAN
w/FDOs5.3.9JFHQ
DetermineDesired
End StateCINC
SharpenONA JIC
DevelopLogisticsSupport JFHQ
Command
5.4
JFHQ
ProjectFuture
OperationsJFHQ
CompareMoE
0.0
JFHQ
CompareMoP 0.0
JFHQ
5.3.6
JFHQ
5.3.8
CDR
JPOTF
DIA
NAVFOR Element
MARFOR Element
JF HQ
JPG
AFFOR Element
ARFOR Element
JFACC
JFLCC
DOCC
JFMCC
JSOTF
POC
JCSNMCC
SPSTF
COC
Theater JIC/JAC
NMJIC
NCAUnified CINC
USAF
SupportCommands
Theater
USMC
Navy
Army
JCCC
JLRC
JOCJISE
JPRC
JPRC
ACE
JISE (JFLCC)
JISE/J2 (JSOTF)
JISE/J2 Watch (JFACC)
MTACC/ACE
JFHQ OPFAC Interfaces in Wartime Scenario
TRANSCOM
SPACECOM
STRATCOM
SPOC
JIOC
JWAC
AFSPOC
ARSPOC
NAVSPOC
MI
CP Main
CP Fwd
CINC IMO
JCCCJCCC
NOC
NOCNOC
NOC
TCCCIO Cell
DISAGNOSC
RNOSC RNOSC
Other AgenciesNRO
NSA
NSA
JMCGAOC
JAOC
JISE/J2 (JFMCC)JMOC
CVIC/CDCTFCC
JCCC
JOC (JFLCC)
JCCC
TOC
JRTOC
JOC
JLRC
JPGJCCC
JISENIST
NRO
JOC (JSOTF)
JF HQ
JFLCC
JFMCC
JFACC
Unified CINC
AFFOR Element
MARFOR Element
NAVFOR Element
ARFOR Element
JSOTF
Theater JIC/JAC
National CINC JFHQ Staff JF Component Service Component
NCA
DIA
NRO
NSA
JCS
NIMA
SOCOM
TacticalAssets
TRANSCOM
SPACECOM
STRATCOM
JWAC
DLA
CIA
Academia
Coast Guard Element
JFHQ CINC Plug
C4ISR Architecture
Diffuse Computing
Paradigm developing rapidly as a result of - commercial computing markets - now-recognized potential of
peer-to-peer computing and grid computing- the need for distributed network-centric
systems, Raises challenges for
- system design, - software production, - the development of mechanisms ensuring
stable equilibria of diffuse systems
SPYCE Objective:Scaleable High Assurance
Develop fundamental understanding, models, algorithms, and network testbed, in order to reduce cost, improve performance, and provide higher reliability for networked operations across untrusted networks.
Incentive Compatibility
Efficient Diffuse Multimedia Networking
Secure Data Storage and Communication
Authorization Schemes
Smart devices diffuse into the environment….
… with control and assurance
Desktop ‘80s
Room ‘40s
Wearable ‘90s
Pervasive ‘00s
CPU
CPUCPU
CPUCPU
Mobile team
Persistent Object Base
Intelligent information processing
URI Objective Algorithms to model diffuse computing and achieve scaleable high assurance
DoD capabilities enhanced Reduced cost, improved performance, and higher reliability for networked operations across untrusted networks
Scientific/technical approach Computing and networking elements diffusing into the environment need: -Local incentive-compatibility in global distributed computing-Scaleable authorization mechanisms-Assured communication-Experimental evidence
Sample Accomplishments• Local conditions for stable routes in
interdomain routing
• Anonymous communication
• SPAM reduction algorithms
• Content transcoding for heterogeneous clients
• Kerberos V protocol analysis
• Logic for reasoning about digital rights
URI, 2001 March, 2003
Software Quality and Infrastructure Protection for Diffuse Computing
Smart devices diffuse into the environment….
… with control and assurance
Desktop ‘80s
Room ‘40s
Wearable ‘90s
Pervasive ‘00s
[email protected] Web URL: http://www.cis.upenn.edu/spyce/
Conferences where we publish Computer Security Foundations Workshop Conference on Computer and Communication Security International Information Security Conference Workshop on Security and Privacy in Digital Rights
Management Conference on Electronic Commerce Symposium on Principles of Distributed Computing International Symposium on High-Performance Distributed
Computing
Conference on Computer Communications International Workshop on Web Content Caching and
Distribution International Symposium on Modeling, Analysis and
Simulation of Computer and Telecommunication Systems
Conferences where we publish Computer Security Foundations Workshop Conference on Computer and Communication Security International Information Security Conference Workshop on Security and Privacy in Digital Rights
Management Conference on Electronic Commerce Symposium on Principles of Distributed Computing International Symposium on High-Performance Distributed
Computing
Conference on Computer Communications International Workshop on Web Content Caching and
Distribution International Symposium on Modeling, Analysis and
Simulation of Computer and Telecommunication Systems
KeywordsComputerSecurityDistributedCommunication
Project Themes
Combines 4 complementary thrusts:- Incentive-compatibility in distributed
computing- Authorization mechanisms- Secure data storage and retrieval- Communication protocols
Multi-institution experimental platform + systematic, formal treatment of underlying models, algorithms & data structures
July 2001
SPYCE areas of concentration
Market-based computation (incentive-compatibility)
Communication and security protocols analysis
Authorization mechanisms (trust management)
Privacy and anonymityNetworking, experimental platform
Today
Spyce Interaction Graph
- Protocol Analysis- Formal Methods
for Cryptography
CynthiaAndre
JonathanJoe
Patrick
John
VitalyJoan
Paul
Spyce Interaction Graph
- Protocol Analysis- Formal Methods
for Cryptography
- Anonymity
CynthiaAndre
JonathanJoe
Patrick
John
VitalyJoan
Paul
Spyce Interaction Graph
- Protocol Analysis- Formal Methods
for Cryptography
- Anonymity- Privacy
CynthiaAndre
JonathanJoe
Patrick
John
VitalyJoan
Paul
Spyce Interaction Graph
- Protocol Analysis- Formal Methods
for Cryptography
- Anonymity- Privacy- Algorithmic
Mech Design
CynthiaAndre
JonathanJoe
Patrick
John
VitalyJoan
Paul
Spyce Interaction Graph
- Protocol Analysis- Formal Methods
for Cryptography
- Anonymity- Privacy- Algorithmic
Mech Design- Authorization
CynthiaAndre
JonathanJoe
Patrick
John
VitalyJoan
Paul
Spyce Interaction Graph
- Protocol Analysis- Formal Methods
for Cryptography
- Anonymity- Privacy- Algorithmic
Mech Design- Authorization- Decision Theory
CynthiaAndre
JonathanJoe
Patrick
John
VitalyJoan
Paul
Spyce Interaction Graph
- Protocol Analysis- Formal Methods
for Cryptography
- Anonymity- Privacy- Algorithmic
Mech Design- Authorization- Decision Theory- BGP
CynthiaAndre
JonathanJoe
Patrick
John
VitalyJoan
Paul
Spyce Interaction Graph
- Protocol Analysis- Formal Methods
for Cryptography
- Anonymity- Privacy- Algorithmic
Mech Design- Authorization- Decision Theory- BGP- Digital Rights
CynthiaAndre
JonathanJoe
Patrick
John
VitalyJoan
Paul
Presentations today
Feigenbaum Market-based computation Halpern Communication and security
protocols Mitchell Authorization mechanisms Everyone Poster Session Lincoln Privacy and anonymity Smith Networking
Summary of Project:Multidisciplinary Research
Software Quality and Infrastructure Protection for Diffuse Computing
Algorithms to model diffuse computing and achieve scaleable high assurance
Multi-institution experimental platform
Software Quality and Infrastructure Protection
for Diffuse Computing
FY2001 ONR CIP/SW URI
Principal Investigator: Andre ScedrovInstitution: University of Pennsylvania
URL: http://www.cis.upenn.edu/spyce
STARTED IN MAY 2001
Diffuse Computing
Diffuse computing is an emerging paradigm in which computational task are performed by aggregated computational services, distributed over a network.
This paradigm, developing rapidly as a result of commercial computing markets, the now-recognized potential of peer-to-peer systems, and the need for distributed network-centric systems, raises challenges for system design, software production, and the development of mechanisms ensuring stable equilibria of diffuse systems.
Project Meetings URI kickoff meeting July 7 ‘01 (DC) Video conference Oct 8 ’01 (Penn-SRI) First board meeting Nov 5 ’01 (Penn) Group meeting Dec ’01 (Calistoga, CA)
- Workshop on Economics and Information Security
May ’02 (Berkeley) Second board meeting June 21 ’02 (Penn) Third board meeting Sep 30 ’02 (Cape May) Group meeting Dec ’02 (St. John,USVI) Continuing visits among sites, teleconferences Fourth board meeting Mar 31 ’03 (Penn)