the earth system grid ----- security to enable access

37
The Earth System Grid ----- Security to enable Access Frank Siebenlist Argonne National Laboratory / University of Chicago [email protected] NSF Cybersecurity Summit 2007; Arlington, VA - Feb 22-23, 2007

Upload: yagil

Post on 10-Jan-2016

22 views

Category:

Documents


4 download

DESCRIPTION

The Earth System Grid ----- Security to enable Access. Frank Siebenlist Argonne National Laboratory / University of Chicago [email protected] NSF Cybersecurity Summit 2007; Arlington, VA - Feb 22-23, 2007. PMEL. Making Climate Simulation Data Available Globally. - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: The Earth System Grid -----  Security to enable Access

The Earth System Grid-----

Security to enable Access

Frank SiebenlistArgonne National Laboratory / University of

[email protected]

NSF Cybersecurity Summit 2007; Arlington, VA - Feb 22-23, 2007

Page 2: The Earth System Grid -----  Security to enable Access

Making Climate Simulation Data

Available GloballyPMEL

ESG Computational/Data Sites and Collaborators

Page 3: The Earth System Grid -----  Security to enable Access

The ESG Team

ANL- Ian T. Foster (PI)- Frank Siebenlist- Dan Fraser- Veronika Nefedova

LBNL- Arie Shoshani- Alex Sim- Alex Romosan

LANL- Phil Jones

LLNL/PCMDI- Dean Williams (PI)- Bob Drach

NCAR- David Brown- Luca Cinquini- Peter Fox- Jose’ Garcia- Rob Markel- Don Middleton (PI)- Gary Strand

ORNL- Dave Bernholdt- Mei-Li Chen- Line Pouchard

NOAA/PMEL- Steve Hankin- Roland Schweitzer

USC/ISI- Ann Chervenak- Carl Kesselman- Rob Schuler

Page 4: The Earth System Grid -----  Security to enable Access

ESG Architecture

Page 5: The Earth System Grid -----  Security to enable Access

ESG Portal

Page 6: The Earth System Grid -----  Security to enable Access

An Operational DataGrid for Climate Research

Page 7: The Earth System Grid -----  Security to enable Access

An Operational DataGrid for IPCC

Page 8: The Earth System Grid -----  Security to enable Access

AuthenticationAuthorization

Accounting/Metrics

Page 9: The Earth System Grid -----  Security to enable Access
Page 10: The Earth System Grid -----  Security to enable Access

Virtual Data Services

Page 11: The Earth System Grid -----  Security to enable Access

Moving Many Files: DML

Page 12: The Earth System Grid -----  Security to enable Access

A Few MetricsA Few Metrics•ESG General Climate Portal• 4,000 registrations

• 160 TB of data available, 876 datasets and 840,000 files

• 30 TB downloaded in 92K files + virtual data services

•ESG IPCC Portal(U.S. Intergovernmental Panel on Climate Change (IPCC))

• 1000 registered users

• 35 TB of data available in 67K files

• 125 TB downloaded in 548K files

Page 13: The Earth System Grid -----  Security to enable Access

1/10d POP Ocean Model

MOZART Chemistry Model

Towards GlobalEarth SystemModeling CCM3 at T170 Resolution

(about 70km)

QuickTime™ and aYUV420 codec decompressor

are needed to see this picture.

QuickTime™ and aYUV420 codec decompressor

are needed to see this picture.

QuickTime™ and aYUV420 codec decompressor

are needed to see this picture.

Page 14: The Earth System Grid -----  Security to enable Access

ESG

PMEL

Page 15: The Earth System Grid -----  Security to enable Access

Inside

SAN + MSS RAID + HPSS

Inside

TeraGrid

Page 16: The Earth System Grid -----  Security to enable Access

The Earth System GridCenter for Enabling

Technologies

•Petascale distributed climate data

•Global Grid of data producers (IPCC)

•Model experiment environment

•Analysis services (online & archive)

•ESG-enabled analysis and visualization tools

Funded for 2006-2010

Page 17: The Earth System Grid -----  Security to enable Access
Page 18: The Earth System Grid -----  Security to enable Access

…ESG Security……in process of architecting

next phase…reporting on design choices/challenges

Page 19: The Earth System Grid -----  Security to enable Access

19

Resource

“Client => Portal => Resource” Access

browserClient

Portal

Page 20: The Earth System Grid -----  Security to enable Access

20

Resource

“Client => Portal => Resource” Accessas Portal-ID

browserClient

Portal

PortalAuthN&

AuthZ

ClientAuthN

ClientAuthZ

As Portal-IDResource only sees/knows AuthN’ed Portal-IDResource does not “know” Client-IDResource enforces only Portal-ID access policyFine-grained client AuthZ determined/enforced at Portal(Client-ID only for audit)

Page 21: The Earth System Grid -----  Security to enable Access

21

Resource

“Client => Portal => Resource” Accessas Portal-ID on behalf of Client-ID

browserClient

Portal

PortalAuthNAuthZ&

ClientAuthZ

ClientAuthN

ClientAuthZ

Client-ID

As Portal-ID on behalf of Client-IDResource sees AuthN’ed Portal-IDResource sees UnAuthN’ed Client-IDResource trusts Portal-ID to forward Client’s requestNo “cryptographic proof” of delegationClient’s AuthZ determined/enforced at Resource(Client’s AuthZ also determined/enforced at Portal)

Page 22: The Earth System Grid -----  Security to enable Access

22

Resource

“Client => Portal => Resource” Accessas Portal impersonating Client-ID

browserClient

Portal

ClientAuthN&

AuthZ

ClientAuthN

ClientCreds

ClientCredsSvc

ClientAuthZ

As Client-ID through ImpersonationPortal maintains client’s (proxy-)credentialsResource only sees Client-ID Client’s AuthZ determined/enforced at Resource(Portal-ID only for audit)

Page 23: The Earth System Grid -----  Security to enable Access

23

“Portal => Resource” Access Methods As Portal-ID

Resource only sees/knows AuthN’ed Portal-ID Resource enforces only Portal-ID access policy All fine-grained client AuthZ determined/enforced at Portal

As Portal-ID on behalf of Client-ID Resource sees AuthN’ed Portal-ID Resource trusts Portal-ID to forward Client’s request Client’s AuthZ determined/enforced at Resource

As Client-ID through Impersonation Portal maintains client’s (proxy-)credentials Resource only sees Client-ID Client’s AuthZ determined/enforced at Resource

As Portal-ID through fine-grained Delegation Resource sees AuthN’ed Portal-ID Client-ID’s AuthZ assertion empowers Portal-ID Portal’s rights at Resource limited by Client’s

Page 24: The Earth System Grid -----  Security to enable Access

24

Light and Fat-Client Access

browserClient

Portal

Resource

PortalAuthN&

AuthZClientAuthN

ClientAuthZ

“Fat”Client

Resource

ClientAuthN&

AuthZ

Reuse Portal’s AuthZ through push/pull

Obtain data’s URI after browsing

GridFTP, OpenDAP, SRM, ws-transfer, ???

Page 25: The Earth System Grid -----  Security to enable Access

25

Access Policy Taxonomy (1)

“Physical” User, AuthN-ID, DN, Username

Operation/Action

Identity-based, ACL-like, most simple policy statement

PermissionPermit | Deny | NotApplicable

“Physical” Resource, FileName, URL, FQN

PUser | Op | Perm | PRsrc

Page 26: The Earth System Grid -----  Security to enable Access

26

Access Policy Taxonomy (2)“Physical” User, AuthN-ID, DN, Username

Grouping Abstractionspolicy (mostly) defined on groups

Resource Group, Classification

“Physical” Resource, FileName, URL, FQN

UGroup | Op | Perm | RGroup

RGroup | PRsrc

User Group, Attribute, “Role”

PUser | UGroup

Page 27: The Earth System Grid -----  Security to enable Access

27

Access Policy Taxonomy (3)“Physical” User, AuthN-ID, DN, Username

“Logical” Abstractionssupport multiple authN-mechs

resource location transparencies

“Logical” Resource, Lfile, URN

“Physical” Resource, PFile, URL, FQN

UGroup | Op | Perm | RGroup

RGroup | LRsrc

“Logical” Username, Access-ID

LUser | UGroup

PUser | LUser

LRsrc | PRsrc

Page 28: The Earth System Grid -----  Security to enable Access

28

Access Policy Taxonomy (4)

Puser/Luser/UGroup/Role | Op | Perm | Rgroup/LRsrc/PRsrc

RGroup | LRsrc

LUser | UGroup

PUser | LUser

LRsrc | PRsrc

Luser/UGroup | Role

Policy on physical, logical, roles and groups…plus hierarchical groups/roles, etc., etc…

Page 29: The Earth System Grid -----  Security to enable Access

29

Access Policy Taxonomy (5)

Meta-Data Catalog Integrationallows for “secure-browsing”

Meta-Data Catalogintegrated with access policy

UGroup | Op | Perm | RGroup

RGroup | LRsrc

LUser | UGroup

PUser | LUser

LRsrc | PRsrc

RGroup | Meta-Data

LRsrc | Meta-Data

PRsrc | Meta-Data

Page 30: The Earth System Grid -----  Security to enable Access

30

??Permission??

Requested operation

Access Determination (1)Authenticated User-ID

Can Subject invoke Operation on Resource?Can AuthN-ID invoke Operation on Physical-Resource?

“Physical” Resource to access

UGroup | Op | Perm | RGroup

RGroup | LRsrc

LUser | UGroup

PUser | LUser

LRsrc | PRsrc

Page 31: The Earth System Grid -----  Security to enable Access

31

Policy Assertions from Everywhere

Page 32: The Earth System Grid -----  Security to enable Access

32

VOMSRS/VOMS

SAZ/PRIMA/GUMS

MyProxy AuthN Svc - Username=> DN mapping

Access Determination (2)

Puser/Luser/UGroup/Role | Op | Perm | Rgroup/LRsrc/PRsrc

RGroup | LRsrc

LUser | UGroup

PUser | LUser

LRsrc | PRsrc

Luser/UGroup | Role

Policy “components” distributed

Meta-data catalogData-Service

(after staging…)

Page 33: The Earth System Grid -----  Security to enable Access

33

Policy Assertions from Everywhere

CAS

ShibLDAPHandleVOMS

PERMISXACMLSAMLSAZPRIMA

Gridmap

XACML

???

Page 34: The Earth System Grid -----  Security to enable Access

34

Policy Evaluation Complexity Single Domain & Centralized Policy Database/Service

Meta-Data Groups/Roles membership maintained with Rules Only Pull/push of AuthZ-assertions

Challenge is to find right “balance”(driven by use cases…not by fad/fashion ;-) )

… Split Policy & Distribute Everything

Separate DBs for meta-data, rules & attribute mappings Deploy MyProxy, LDAP,VOMS, Shib, CAS, PRIMA, XACML, PRIMA, GUMS, PERMIS, ???

Page 35: The Earth System Grid -----  Security to enable Access

35

AuthZ & Attr Svcs Topology Policy Enforcement Use Cases determine “optimal” AuthZ & Attr Svc Topology

Client pull-push versus Server pull Network-hurdles/firewalls Crossing of admin domains

Separate Attributes from Rules (VOMS/Shib)orSeparate Policies from Enforcement Point (CAS) Separation of duty - delegation of admin

Replicating of Policy-DB or Call-Out Network overhead versus sync-mgmt overhead

!!! Choose “Most Simple” Deployment Option !!!(ideally, services and middleware should allow all options…)

Page 36: The Earth System Grid -----  Security to enable Access

36

Data Integrity Protection Data “Corruption”

Many, many copies of the original data files and model-code

Many “opportunities” for undetected changes Independent from normal integrity protection for storage and data moving

Accidental, script-kiddies or worse… Integrity Protection

Identify and guard the “original” Most files are immutable…maybe make them all immutable…

Use file-signatures/digests (SH-1/256, ???) Tripwire-like

Digest part of meta-data, communicate expected digest with URL/URI, independent digest-services, embed digest in URI, use digest-value as “natural” name for file…file-name=digest-value

Learn from file-sharing P2P application!

Integrate integrity checks in file-moving apps http, DataMoverLight, GridFTP, Opendap, RLS, etc.

Define procedures for data corruption detection

Page 37: The Earth System Grid -----  Security to enable Access

37

Conclusion ESG is a very cool and challenging application!

Security goal is to enable not limit access… Many challenges not unique to ESG

Leverage existing solutions Collaborate on non-existing

Interoperability requirements with TG/OSG/??? Limits technology/mechanism choices(creds, protocols, assertion-formats, interfaces, infrastructure-services, ontology, SSO, audit, etc.)

Requires (closer) collaboration “Fighting” complexity is major challenge

Cost associated with splitting-up policies Need better understanding & best practices

Data Integrity Protection Feature-gap in tools and data management