Title: A Dynamic, Distributive and Heterogeneous Authorization Policy Management Framework
1A Dynamic, Distributive and Heterogeneous
Authorization Policy Management Framework
- Speaker YU Chiu Man
- March 16, 2007
2Agenda
- Related Work Research Objectives
- Dynamic Policy Management Framework (DPMF)
- Conflict Analysis with Partial Information (CAPI)
- Heterogeneous Policy Management
- Contributions Future Work
3Extra-Grid and Inter-Grid Car04
Host
Host
Host
Host
Host
Host
Physical Organization
Physical Organization
Host
Host
Host
Host
Host
Host
Physical Organization
Physical Organization
4Inter Grid
Physical Organization
Physical Organization
Host
Host
Host
Host
Host
Host
Physical Organization
Physical Organization
Host
Host
Host
Host
Host
Host
5Inter Grid
Virtual Organization
Virtual Organization
Virtual Organization
6Related Work
- Traditional approaches provides authorization
policy management for only extra-grids. - Global Layer approaches
- LGI Min05
- IDSA Car04
- VOPS Ver02
- Policy Domain Overlay Wel03
- VOMS Alf03
- Plug-in approaches
- Cassandra Bec04
- Multipolicy Authorization Framework Lan06
- LCAS Ste03
7Global Layer Approach
Global Layer (Policy model) (Access control model)
organization
organization
organization
8Plug-in Approach
Global Layer (Policy model) (Access control model)
deploy
deploy
deploy
organization
organization
organization
9Problems of Global Layer and Plug-in Approaches
- Imposing too much coupling on the Grid
environments. - Not scalable for a large number of heterogeneous
Virtual Organizations (VOs). - Not supporting dynamic environments.
10Research Objectives
- Main Goal
- Authorization policy management for open
Inter-Grid environments of multiple dynamic and
heterogeneous VOs. - Challenges
- Management of multiple VOs
- Dynamic Grid memberships
- Untrusting relationship between VOs
- Heterogeneous authorization systems
- Our solutions
- Dynamic policy management framework
- Policy conflict analysis with partial information
- Heterogeneous authorization policy management
11Scenario Collaboration of VOs
Alice University
Bob University
Carol University
Dave University
Faculties
Globus w/Permis Permis Policy Model RBAC Model
Globus w/Permis Permis Policy Model RBAC Model
TeraGrid w/Akenti Akenti Policy Model RBAC Model
EGEE EGEE Policy Model DAC Model
Education VO
Inter University Grid
Collaboration
12Agenda
- Related Work Research Objectives
- Dynamic Policy Management Framework (DPMF)
- Conflict Analysis with Partial Information (CAPI)
- Heterogeneous Policy Management
- Contributions Future Work
13DPMF approach
DPMF system (Homogeneous policy
management) (Conflict analysis with partial
information) (Heterogeneous policy management)
Local system (Policy model) (Access control model)
Local system (Policy model) (Access control model)
Local system (Policy model) (Access control model)
deploy
deploy
deploy
VO
VO
VO
14Dynamic Policy Management Framework (DPMF)
- DPMF is a hierarchical framework which aims to
support - dynamic Grid membership
- heterogeneous policy management
- for Grid environments of multiple VOs.
- Each DPMF system contains a number of
- Policy Agents (PAs),
- Policy Management Agents (PMAs),
- and a Grid Information Agent (GIA).
15VO Model
16DPMF Model
PA (PDP)
PA (PDP)
PA (PDP)
PMA (PDP)
GIA (Grid Operator)
PMA (PDP)
PA (PDP)
PA (PDP)
PA (PDP)
PA (PDP)
Policy repository
Service requesters
Service Providers(PEP)
17DPMF Authorization Model(Push sequence model)
Policy Decision Point (PDP)
System User
Service Provider Policy Enforcement Point (PEP)
18Authorization for Collaboration of Services
- DPMF authorization services supports
authorization for collaboration of services (that
is, multiple services). - The method of concluding permission conditions is
to intersect (that is, AND) the permit
conditions of the policies of the target
services. - An authorization decision is positive if the
permission conditions for the task is not null.
19Permission Conditions
policies
service(a)
Permission Conditions
AND
policies
service(b)
service(c)
policies
Time 9 to 17 Friday Time 9 to 12 Sunday
Time 9 to 17 Tuesday Time 9 to 12 Sunday
Time 9 to 12 Sunday
AND
Time 9 to 17 Monday Time 9 to 17 Friday Time 9
to 12 Sunday
20Scope of Policy Management in DPMF
PMA (Heterogeneous policy management)
Virtual Cluster 1
VO b
PMA PA (Homogeneous policy management)
VO a
VO c
VO d
VO e
VO f
Virtual Cluster 3
VO g
VO h
VO i
Virtual Cluster 2
21Trust Information Table
22Distribution of Policy Management
- Using the information of PA trust relationships,
the PMA can find the subject PA which is trusted
by most PAs in a conflict analysis task. - PMA can delegate the task to the subject PA to
perform conflict analysis. - Workload of policy management is distributed in a
virtual cluster.
23Workload Balancing by Task Delegation
L the total policy management workload in a
virtual cluster l the policy management
workload of a PA (PMA inclusively) n the
number of PAs in the virtual cluster. Then, the
total workload is the sum of individual PA and
PMA workload which is proportional to the
number of requests and policies. Without
delegation, the PMA workload is equal to the
total workload L, that is
24Workload Balancing by Task Delegation
With delegation, the total workload L is
distributed among the PMA and PAs where T
average percentage of trusted PAs, k average
number of services involved in each
request. Therefore On average
25Experiment on Task Delegation
26Deployment of DPMF Authorization Module
Globus Client
GRAM (Globus Resource Allocation Manager)
User
Gatekeeper
Job Manager
Resource/ Application
use
invoke
initialize
Proxy
HTTP
use
use
Authentication service
Job management
Authorization service (Local VO)
DPMF middleware
Authorization service (Remote VO)
27DPMF API System Flow (Generic)
Authentication Service
credential request
credential
User
Target Services
authorization request credential
authorization request
service response
decision authorization token
policy transfer
authorization token
28DPMF API System Flow (Integration with
Shibboleth)
Target Services
redirect
service response
AQH
AQM
authentication request
AQR
User
authorization request attributes
authorization request
decision authorization token
policy transfer
authorization token
29DPMF Implementation
30Agenda
- Research Objectives
- Dynamic Policy Management Framework (DPMF)
- Conflict Analysis with Partial Information (CAPI)
- Heterogeneous Policy Management
- Contributions Future Work
31Conflict Analysis with Partial Information (CAPI)
- The problem
- In open environments, we cannot assume that the
VOs can trust other VOs. - Some VOs may want to keep their policies private
to others. - PMA may be unable to get all the necessary policy
information from PAs to perform conflict analysis
and make decisions. - Conflict analysis with partial information is
needed.
32Open Environment of Multiple VOs
33Trust relationship
34CAPI Assumption
35Main Idea of CAPI Mechanism
Trusting PAs
Policy owner attributes
PMA
Untrusting PAs
Policies
Policy owner attributes
Policies
Substitution Policies
36Flow of CAPI
Pre-Detection Phase
Detection Phase
Post-Detection Phase
37CAPI Pre-Detection phase
- PMA collects policy information from trusting
PAs. - PMA generates policy templates by adding data of
evaluation element set to the collected policies.
Policy template database
PMA
38Policy Template Format
ltConditiongt 09 to 21 on everyday ltActiongt permit
execute ltSubjectgt https//192.168.0.128443/wsrf
/services/NewBookService ltIdentitygt any ltEvaluat
ion element setgt ltVO sizegt valueStringsmall,
valueNum0 ltservice typegt valueStringcommercia
l, valueNum1 ltsecurity levelgt
valueStringlow, valueNum0 ltPriority Setgt ltVO
sizegt 0.3 ltservice typegt 0.4 ltsecurity
levelgt 0.3
Original Policy
Policy Template Elements
39Policy Template Format (contd)
- The evaluation element set stores evaluation
elements which are attributes of the policy
owner. - The attributes are defined by the PMA which can
include - Type of VO, Size of VO,
- Type of Service provider,
- Type of Service,
- Security level of Service,
- Lifetime of Service,
- VO (PA) trust relationships
- The priority set stores the weights of importance
of the evaluation elements.
40CAPI Detection phase
- PMA generates substitution policies using the
evaluation element set, and priority set. - When there is a substitution policy involved in a
conflict, the policy would be stored in a
Conflict Policy Set.
Substitution policies For PA c
PAs involved in a service request
Policy template database
PMA
Conflict Policy Set
41Selection of Policy Template(Detection Phase)
- Control factors defined by PMA
- similarity value threshold
- maximum number of substitution policies
- Service similarity value
- Pr priority value
- Ev distance of evaluation element values of the
policy template to the untrusting PA - Service similarity value 0
- A lower service similarity value means higher
similarity of policy owners - A policy template would be selected if
- Its service similarity value similarity value
threshold - Number of substitution policies maximum number
of substitution policies
42Generation of Substitution policies(Detection
Phase)
- For a selected policy template,
- generate a substitution policy
- Condition substitute ? Condition template
- Action substitute ? Action template
- Target Identity substitute ? Identity of
service requester
43Conflict analysis
- Traverse all involved policies and substitution
policies. - First round
- For all policies where the Action is to permit
the action requested by the user. - Intersect the Conditions of these policies.
- Record the result Condition as Permission
Conditions. - Second round
- For each policy where its Action is to deny the
action requested by the user. - If its Condition has intersection with the
Permission Conditions, record the policy into
Conflict Policy Set.
44CAPI Post-Detection phase
- If Permission Conditions is not null, PMA sends
the Conflict Policy Set to untrusting PA(s). - PMA queries them to see if the corresponding
service(s) has any of the policies in Conflict
Policy Set .
Conflict Policy Set
PMA
PA c (untrusting)
reply
45Untrusting PAs policy checking(Post-Detection
Phase)
- The untrusting PA compares its policy set
(Policy)untrust to the Conflict Policy Set - A pair of policy (Policy)untrust and
(Policy)conflict are matched if they satisfy all
three criteria - (Condition)conflict is a subset of
(Condition)untrust - (Action)conflict is a subset of (Action)untrust
- (Identity)conflict is a subset of
(Identity)untrust - The untrusting PA sends the number of certified
conflict policies to PMA for decision making. - PMA makes positive authorization decision if the
number is zero.
46Why CAPI works
- If
- Correlation of service similarity and policy
similarity is high and - Number of substitution policies is larger than
that of unknown policies. - Then
- Permission Conditions (by CAPI) is a subset of
the true Permission Conditions and - Conflict Policy Set (by CAPI) is a super-set of
the true one. - Thus
- Resultant Permission Conditions is valid for both
the trusting and untrusting PAs. - Untrusting PAs checking the Conflict Policy Set
is sufficient to ensure absence of conflicting
policies.
47Experiment on CAPI
- Experimental factors
- Correlation of service similarity and policy
similarity (CoSP) - This factor controls whether similar service
environment -gt similar policy set holds. - Maximum number of substitution policies
- This factor controls the maximum number of
substitution policies to be selected. - Similarity threshold to select substitution
policies - This factor controls the scope of selecting
substitution policies. A large threshold means to
bear less similar service environments - Occurrence rate of opposite policies
- This factor controls how often an opposite policy
exists in the overall policy pool.
48Similarity of Policies
- Three performance indexes are used to measure the
similarity of generated substitution policy set
to the policy set of untrusting PAs. - Positive Match (PM)
-
- Negative Match (NM)
-
- Policy Similarity (PS)
-
49Evaluation
- In the experiments, we control the correlation
of service similarity and policy similarity
(CoSP). -
- policy similarity PS
- service similarity 1- service similarity
value - 0 CoSP 1
50Part A correlation of service similarity and
policy similarity (CoSP)
51Observation for results in part A
- Higher (CoSP)
- ? 1. Higher Positive Match (PM)
- ? 2. Lower Positive Match (NM)
- ? 3. Higher Policy Similarity (PS)
- PM grows exponentially
- PS grows linearly
52Part B max. num. of substitution policies
10
20
30
40
53Observation for results in part B
- (max number of substitution policies) does not
significantly affect PM and NM - Higher (max number of substitution policies)
- ? Higher Policy Similarity
54Part C similarity threshold
1
0
3
2
55Observation for results in part C
- Higher (similarity threshold)
- ? 1. Lower Positive Match (PM)
- ? 2. Higher Negative Match (NM)
- ? 3. Lower Policy Similarity (PS)
- ? 4. Graphs of PM,NM,PS become more irregular
56Part D occurrence rate of opposite policy
3
2
4
5
57Observation for results in part D
- Higher (rate of opposite policy)
- ? Higher negative match (NM)
- (rate of opposite policy) does not significantly
affect PM and PS
58Overall Observations
- (CoSP) and (similarity threshold)
- significantly affect PM, NM, PS
- According to Part D, to ensure that PM gt NM
- (CoSP) gt (rate of opposite policy) x 10
- According to Part B and C, to achieve a low NM
- 1. Low (similarity threshold)
- 2. Small (max. no. substitution policies) but
need to be larger than size of policy set of
untrusting VO
59Agenda
- Related Work Research Objectives
- Dynamic Policy Management Framework (DPMF)
- Conflict Analysis with Partial Information (CAPI)
- Heterogeneous Policy Management
- Contributions Future Work
60Flow of HeterogeneousPolicy Management
User
Request authorization
PA
Forward request
Request maps
PMA
GIA
Request policies
PA
PA
PA
Policy
Policy
Policy
Account mapping
(Policy)
(Policy)
(Policy)
Policy mapping
(Policy)
(Policy)
(Policy)
Conflict analysis Conclusion of permission
condition
Authorization Decision
61Account Mapping
62Account Mapping
PAs
Local Accounts
Local Accounts
GIA
Account Map
Account Map
63Policy Mapping
Local policy schema (Virtual Cluster B)
Local policy schema (Virtual Cluster A)
Meta-schema taxonomy
64Meta-Schema Taxonomy
- A collection of meta-schema elements.
- The taxonomy is divided into categories, for
example - Condition
- Action
- Identity
- Other
- Example elements for Condition category
- Time Period Time, Time
- Event String
- Expired Time Time
65Policy Schema Map
- Pointers from elements in local policy schema
to that in meta-schema taxonomy
66Policy Schema Map
67Policy Schema Map
PAs
Local Policy Schema
GIA
Meta-Schema Taxonomy
Policy Schema Map
Policy Schema Map
Policy Schema Map
Policy Schema Map
68Inter-Schema Map
Policy Schema Map A
VO identity (A)
Meta-Schema Taxonomy
Local Policy Schema (A)
Policy Schema Map B
VO identity (B)
Meta-Schema Taxonomy
Local Policy Schema (B)
69Inter-Schema Map
OR
70Example of Policy Mapping (Policy Core
Information Model versus SAML) (I)
71- Policy Core Information Model
Local Policy Schema
72Local Policy Schema
73Inter-Schema Map for mapping SAML to IETF Policy
Core Information Model
74Experiment on Processing Time of Heterogeneous
Policy Management
75Experiment on Processing Time of Heterogeneous
Policy Management
- p percentage of services on heterogeneous
virtual clusters in the environment - n average number of services involved in each
request - The probability of initializing Heterogeneous
Policy Management mechanism is - 1 (1 p)n
76Agenda
- Related Work Research Objectives
- Dynamic Policy Management Framework (DPMF)
- Conflict Analysis with Partial Information (CAPI)
- Heterogeneous Policy Management
- Contributions Future Work
77Contributions (I)
- DPMF architecture
- Support authorization policy management for
multiple-VOs Grid environments. - Advantages
- To deploy DPMF, the VOs do not need to deploy a
new authorization system. - Support dynamic Grid memberships.
- Support task delegation such that the
authorization workload can be shared among the
VOs.
78Contributions (II)
- CAPI mechanism
- Enable authorization decision making when the
authorization policy information is incomplete. - Calculate the similarities between service
providers to generate substitutions of the
incomplete policy information (unknown policies).
79Contributions (III)
- Heterogeneous Policy Management mechanism
- Authorization between VOs of heterogeneous
authorization systems. - Use account mapping and policy mapping
mechanisms. - Implementation of DPMF system
- We have implemented the DPMF system and
- Performed experiments to evaluate its
performance.
80Future Work (I)
- There are many different P2P applications using
different P2P systems. - How to support their collaborations?
- Can DPMF be used in P2P environments?
- Challenges
- Authentication in P2P is not compulsory.
- Malicious hosts.
- Free-riders.
81Future Work (II)
- Malicious host
- Malicious hosts may provide incorrect policy
information. - Mechanisms to detect or prevent malicious
information are essential. - Free-rider
- Free-riders are the VOs or hosts which are not
willing to share the DPMF policy management
tasks. - This problem may be significant in environments
without authentication.
82Welcome for Questions
83References (I)
- Car04 B.E. Carpenter, and P. A. Janson.
Abstract Interdomain Security Assertions A
Basis for extra-grid virtual organizations, IBM
Systems Journal, Vol. 43, No. 4, 2004, pp.
689-701. - Min05 Naftaly Minsky. Law Governed Interaction
(LGI) A Distributed Coordination and Control
Mechanism, in Rutgers University Technical
Report, October 2005. - Ver02 Dinesh Verma, Sambit Sahu, Seraphin Calo,
Manid Beigi, and Isabella Chang. A Policy
Service for GRID Computing, M. Parashar(Ed.)
GRID 2002, LNCS 2536, pp. 243-255. - Wel03 Von Welch, Frank Siebenlist, Ian Foster,
John Bresnahan, Karl Czajkowski, Jarek Gawor,
Carl Kesselman, Sam Meder, Laura Pearlman, and
Steven Tuecke. Security for Grid Services, in
Proceedings of the 12th IEEE International
Symposium on High Performance Distributed
Computing (HPDC'03).
84References (II)
- Alf03 R. Alfieri, R. Cecchini, etc. VOMS an
Authorization System for Virtual Organizations,
1st European Across Grids Conference, Santiago de
Compostela, February 13-14, 2003. - Lan06 B. Lang, I. Foster, F. Siebenlist, R.
Ananthakrishnan, T. Freeman. A Multipolicy
Authorization Framework for Grid Security, in
Proceedings of the Fifth IEEE Symposium on
Network Computing and Application, Cambridge,
USA, July 24-26, 2006. - Bec04 Moritz Y. Becker, and Peter Sewell.
Cassandra Distributed Access Control Policies
with Tunable Expressiveness, Proceedings of the
Fifth IEEE International Workshop on Policies for
Distributed Systems and Networks (POLICY'04),
2004. - Ste03 M. Steenbakkers. Guide to LCAS Version
1.1.16, Document of the European DataGrid
Project, 15 September 2003.