• No results found

Identity Management and Integrity Protection in Publish-Subscribe systems

N/A
N/A
Protected

Academic year: 2021

Share "Identity Management and Integrity Protection in Publish-Subscribe systems"

Copied!
15
0
0

Loading.... (view fulltext now)

Full text

(1)

Identity Management and Integrity

Protection in Publish-Subscribe

systems

Anders Fongen and Federico Mancini

(2)

Outline

Introduction to PubSub

PubSub security problems

Outline of the PubSub implementation

Operational details

Trusted Binding of Message Router operation

Conclusions and future work

(3)

Principles of PubSub

● Messages are not individually addressed

● Routed from producer to receivers based on content

› aka content routing

› content metadata (topics)

● Publications are annotated with topics ● Receivers subscribe to topics

● Message transport is asynchronous ● Scales better

› employs multicast topologies

● Smaller resource consumption

› Messages are queued outside the hosts

Publisher Publisher

Subscriber Subscriber

Subscriber Message

router Message router

Topic: weather

(4)

PubSub security

Problems:

• Is the published information authentic and unmodified? • Who is the publisher, is it authorized?

• Will the published information only reach authorized subscribers? • Who operates the message routers? Are they operating correctly?

Principles:

• The confidentiality is the concern of the Publisher

– should be able to express subscriber requirements • The integrity is the concern of the Subscriber

– should be able to express publisher requirements

• The correct distribution of messages based on pub-sub requirements is responsibility of the Message Routers

Need to identify and authenticate who is generating, transporting and consuming the information: USE OF IDENTITY MANAGEMENT

(5)
(6)

Extending the PubSub network with Identity

Management

Publisher Publisher Subscriber Subscriber Subscriber Message router Message router Publisher Publisher Subscriber Message router Publisher Subscriber Community of Interest

Community of Interest Community of Interest Identity Provider Identity Provider Identity Provider PKI A PKI B Trust

(7)

Relations between IdM and PubSub security

An IdM issues

Identity Statements

which

● bind keys and attributes to an identity ● identity is associated with a subject

Keys are used to provide subject authentication

● through a proof-of-possession principle

Attributes can be interpreted as roles/properties of the subject

● can be used to represent authorization

● and support the access control decisions

With a trust relation between IdM authorities

● access control decisions can be made on “foreigners” ● provided that the attribute “vocabulary” is harmonized

The correctness of keys and credentials is the responsibility of the

Authority

(8)

Secure PubSub protocol: Authentication

For cross-domain operations

(9)

Identity statements, subscriptions and

publications

Identity Statement (IS) Subject Distinguished name

Subject Public Key Subject Attributes

Valid from - to

Issuer distinguished name Issuer Signature

Publication Publisher IS

Subscriber’s requirements The actual message

Unique Message Id Publisher’s signature Subscription Topics Publisher’s requirements Subscriber’s IS

Requirements are boolean

compositions of subject attributes:

(nationality=«UK») or

(10)

Secure PubSub protocol: Routing tables

Message routers (MR) exchange

aggregated subscriptions

the “sum” of its clients' subscription (topics+requirements)

Aggregated subscriptions are flooded in the MR network in order to

build

forwarding tables

in each MR

The functions

merge

and

spill

are defined as follows:

𝑐 = 𝑚𝑚𝑚𝑚𝑚 𝑎,𝑏 𝑃 ⊇ 𝐶 ⊇ 𝐴 ∪ 𝐵

𝑠𝑠𝑠𝑠𝑠 𝑎,𝑏,𝑐 ={𝑥 ∣ 𝑥 ∈ 𝐶,𝑥 ∉ 𝐴 ∪ 𝐵 }

Aggregated Subscription Topics

(11)

Secure PubSub protocol: Message routing

Publication Publisher IS

Subscriber’s requirements The actual message

Unique Message Id Publisher’s signature Aggregated Subscription

Topics

Publisher’s requirements

The MR matches received publications to its aggregated subscription. This is formally defined by a match function:

𝐴 ={𝑠 ∣ 𝑚𝑎𝑚𝑐𝑚 𝑎,𝑠 = 𝑚𝑚𝑡𝑚},𝑠 ∈ 𝑃

If A is not empty, then it is forwarded to neighbouring MRs and possibly to the subscribers directly connected to this MR, if their attributes match the publisher requirements.

List of local subscribers Subscriptions

(12)

Message routers integrity

• The message router’s integrity is critical for this security model to work. • The responsibility for message confidentiality and integrity lies with the

message routers.

• Therefore we need to trust the message routers to perform the attribute

verification correctly and not to tamper with publisher certificates.

Possible threats:

• If the MR code is compromised it can deliver messages to subscribers

without the correct attributes, or from a non-reliable publisher

• Unauthorized subscribers or publishers can connect to compromised

message routers and read/send messages

• If a publisher IS can be forged by a MR, the message integrity can be

(13)

Increase integrity with TPM

Forging an IS is extremely difficult, and without it any modification to

a message can be detected also by a subscriber.

In order to guarantee the correct operation of a MR, we can use a

TPM to seal a predefined configuration, where the code performing

the message verification and distribution has been verified.

(14)

Conclusions

• The IdM can offer authentication and access control through the Identity

Statements issued to all entities involved in the message exchange.

• Identity Statements can be easily extended with attributes that can be

used to express subcribers and publishers requirements.

• Message routers can guarantee confidentiality by not delivering

messages to subscribers that do not match the publishers

requirements. At the same time message integrity can be guaranteed by delivering to subscribers only messages published by publishers they trust.

• Aggregated subscriptions based also on attributes can contribute to

stop unauhtorized messaged early in the process. Hence avoiding to waste bandwidth and reducing the exposition of messages to potentially compromised MRs.

• Cross-domain communication can be performed in a transparent way

(15)

Future work and open problems

Explore possible efficient implementations of the

merge

function

Test extensively the actual effect of aggregate subscriptions and

attribute verification on message traffic

Investigate further the use of Trusted computing based solutions for

MR integrity

References

Related documents

This means that on the one hand, news of increasing dividend payouts is incorporated into stock prices very quickly, and on the other hand, is in fact new information to the market

It is vital that partners provide UWS with the necessary information (eg. timesheets, expenses, progress reports, dissemination information) in a timely manner

Further- more, we compared our approach with two different base lines: (i) a method exploiting only the frequency of semantic relations of length 1 within linked data (no heuristics

Recently, methods to assess the similarity of utilisation distributions have been developed and have been used to visualise and compare patterns of similarity in space use over

The Association of Research Libraries’ Office of Scholarly Communications published a report entitled “Research Library Publishing Services: New Options for University Publishing”

rication of structural components made from the magnesium alloy is described in [26]. In recent years, the modeling of superplastic forming has been widely used in order to optimize

Assim, para compreender a dimensão duchampiana na produção do autor catalão, especialmente nos romances Aire de Dylan e Historia abreviada de la literatura portátil , é

educators choose to utilize the museum to supplement their curricula?” The research is funded by the Andrew W. Mellon Foundation and is being facilitated by staff members of