• No results found

Security for all: network-based protection for personal devices

N/A
N/A
Protected

Academic year: 2021

Share "Security for all: network-based protection for personal devices"

Copied!
18
0
0

Loading.... (view fulltext now)

Full text

(1)

Security for all: network-based protection

for personal devices

Antonio Lioy

Politecnico di Torino < lioy @ polito.it >

Cybersecurity & Privacy Innovation Forum 2015 Brussels, 28/4/2015

(2)

users deal with many "terminals" (laptop, desktop, tablet,

smartphone, Internet-connected TV, car infosystem, …

with very different security levels

 complex management of security controls for so many platforms with so different characteristics

 withdifferent network connection

can't consistently rely on network border protection

 with different policy requirements

mobile devices at home vs BYOD at work

Why SECURity at the network EDge

SECURED = offload security controls from the user terminals to a trusted and secure network node

(3)

From heterogeneous to uniform security

Project SECURED (www.secured-fp7.eu)

security applications independent from user terminals security protection independent from user location

(4)

home

 home gateway, protection of family (and visitors') devices

enterprise

 wired/wireless access, protection of hosts (including servers?)

public hotspot

 WiFi access, protection of visitors

mobile

 3G/4G access, protection of subscriber's device

IoT

 wireless access point, protection of IoT node

NOTE: first hop not "SECURED"? then create a secure

connection to a SECURED-node somewhere in the network

4

Use cases

(5)

NED (Network Edge Device)

 trusted node (with TC techniques)

provides a Trusted Virtual Domain per user

 e.g. home gateway, corporate router, wireless AP, GGSN

Personal Security Applications (PSA)  executed at the NED

specific tasks (packet filter, parental control,

anti-phishing, content inspection, …)

chained according to security policiessecurity policies

 simplify configuration of PSAs and share "best practice"

 flexibility (users care about policy, not implementation)

The SECURED components

(6)

The SECURED framework architecture

Project SECURED (www.secured-fp7.eu) 6

user terminal policy repository application repository authN 1. trust 2. authenticate 3. get apps 4. get policies personal execution environment 5. protect! NED

(7)

secure & trusted channel

NED (Network Edge Device

The SECURED trust fabric

Project SECURED (www.secured-fp7.eu)

TPM

measures

verifier user

(8)

PSCM

 NED front-end, performs attestation, authN, policy analysis…

TVD Manager

 manages the network topology of a NED

configures the infrastructure  controls TVD lifecycle

Personal Security Controller (PSC)

 stores the user service graph (PSAs and interconnections)

determines the TVD topology from PSA and policy

requirements

 monitors the status of the TVD

8

The NED components

(9)

The NED components at play

(10)

the same connection may be subject to constraints from

different tenants (depending on the network environment)

policies are applied in a hierarchical way (according to the

user and connection profiles)

user is informed of the overall policy applied to her

connection (and may refuse connecting to the network)

10

Multilayered security policies

Project SECURED (www.secured-fp7.eu)

user (child) parent ISP government user (employee) department ISP government corporation

(11)

HSPL ~ high-level security policies

 for expressing the general end-user security requirements

Alice is not authorized to access Internet traffic (type of

content,{illegal websites})

Bob wants email scanning (purpose,{malware})

MSPL ~ security capabilities

to express configuration requests in an

application-independent format

based on capabilities (atomic features of a security function)  capabilities grouped into categories, following an ontology

each PSA declares the categories it provides

automatic translation from HSPL to MSPL (and then to PSA)

Expressing security policies

(12)

Monolithic vs split NED

Project SECURED (www.secured-fp7.eu) 12

network edge device (SECURED) network computing device (SECURED) SEC end-user device network edge device (SECURED) network end-user device SEC

(13)

NED

Cloud / SDN / NFV for SECURED

Project SECURED (www.secured-fp7.eu)

PSC

cloud controller 1. attestation

2. config( α )

PSA1 PSA2 PSA3

α / 1 α / 2 α / 3 ext Mr. α network-hosted capabilities NFV ! custom network paths SDN !

(14)

FP7 call 10 Collaborative Project (FP7-ICT-2013-10)grant agreement no. 611458

duration: 3 years (1/10/2013 – 30/9/2016)EC contribution: 2.7 M Euro

web: www.secured–fp7.eu

mail: coordinator@secured–fp7.eu

14

The SECURED FP7 project

(15)

The Consortium (I)

Politecnico di Torino – Italy

 coordinator = Prof. Antonio Lioy ( lioy@polito.it )

networking, trusted computing, security policiesHP Laboratory Bristol – United Kingdom

networking, trusted computingPrimetel PLC – Cyprus

telco, network and content provider (regional)Telefonica Investigacion y Desarrollo – Spain

telco and network provider (worldwide)

(16)

The Consortium (II)

United Nations Interregional Crime and Justice Research

Institute – Italy

social and policy aspects of security

Universitat Politecnica de Catalunya – Spain

networking, mobility

(Barcelona Supercomputing Center – Spain)

computational architectures

VTT Technical Research Centre of Finland

cybersecurity

16 Project SECURED (www.secured-fp7.eu)

(17)

THANK YOU !

(18)

EU disclaimer

SECURED (project no. 611458) is co-funded by the European Union (EU) via the European Commission (EC), under the Information and Communication Technologies (ICT) theme of the 7th Framework Programme for R&D (FP7).

This document does not represent the opinion of the EC and the EC is not responsible for any use that might be made of its content.

SECURED disclaimer

The information in this document is provided "as is", and no guarantee or warranty is given that the information is fit for any particular purpose. The user thereof uses the information at its sole risk and liability.

Disclaimer

18 Project SECURED (www.secured-fp7.eu)

References

Related documents

Table 5: World Recent Past, Current &amp; Future Analysis for Fleet Management Systems by Geographic Region - US, Canada, Europe, Asia-Pacific, Latin America and Rest of World

If you open a cash ISA and subsequently transfer it into a stocks and shares ISA, you can still save any remaining allowance in a cash ISA during the current tax year as long

Didesnė dalis rėmėjų (41,5 %) buvo kilę iš darbininkų (dėl to, kad dažniau buvo gimę mieste), tai net daugiau nei partijos narių (35 %). LKP CK ir sekretoriato narių šiek tiek

Otherwise the Newton diagram method fails, and we use an extension of Hensel’s Lemma given in Section 4.1.. If the reduction F ∗ ( X ) (defined in Section 3) has

From this literature a draft document was produced summarising current evidence and containing recommendations regarding (1) the flight environment, (2) physiological effects

The list contained in this report shows the results of this screen and while we will look to do more work to refine it further, we thought it a useful starting point to

GEODESIGN MOOC CHANGE AGENT THEME CASE STUDY EXAMPLES: TOPIC AND LOCATION.. Week 1 Flooding • New National Recreation Area on the Gulf of Mexico: Texas, USA • Growth Pattern of

mounted on said base within said housing, said frame comprising a top plate generally parallel to but spaced from said base and ?rst and second side plates disposed