SlideShare ist ein Scribd-Unternehmen logo
1 von 25
Folie 1 ISGC 2011 > Andreas Schreiber > Security and Trust in an Industrial Grid Project > 23.03.2011 Security and Trust in an Industrial Grid Project ISGC 2011 (23 March 2011, 臺北市, Taiwan) Andreas Schreiber <Andreas.Schreiber@dlr.de>German Aerospace Center (DLR), Colognehttp://www.dlr.de/sc
ISGC 2011 > Andreas Schreiber > Security and Trust in an Industrial Grid Project > 23.03.2011 Abstract In usual Grid security infrastructures based on personal Grid certificates, it is possible for users (i.e., employees), to first copy data (or software) to a Grid resource using their personal certificate and then copy this from another security domain to some other place. In the D-Grid project AeroGrid, which provides a Grid infrastructure and client tools for an industrial application from the aerospace domain, the industrial partner is a large turbine manufacturer with high demands on security. It is an important requirement that employees are not able to copy any data outside the security domain of the company. Within the project, a security policy for solving this problem has been defined. The basic strategy for a solution is as follows: The policies and the administrators of the company must forbid and enforce that employees can take the private key that belongs to the Grid certificate with them outside the company. Then the Grid certificate would be not usable for accessing data stored on some Grid resources. For the implementation of this strategy, a company-internal Grid Certificate Authority is deployed and a policy for handling certificates and private key is defined.  A second industrial requirement is reliability of data arising from complex processes. To have a reliable documentation of the individual steps performed in engineering calculations, it’s important to trace all processing steps, i.e. the complete Provenance of the process that led’s to a certain result. Within the project, a Service-Oriented Provenance architecture for recording Provenance information (such as user interactions in the graphical user interface or execution of numerical codes) has been provided.  This talk presents the security and the Provenance infrastructure of the AeroGrid project as well as details on the implementation and deployment of the security solution.  ISGC 2011: http://event.twgrid.org/isgc2011/index.html
Outline AeroGrid Industrial Background Trust Security Provenance ISGC 2011 > Andreas Schreiber > Security and Trust in an Industrial Grid Project > 23.03.2011
JSC at SC09 > Andreas Schreiber>  AeroGrid > 17.11.2009 AeroGrid Grid-based cooperation between  industry, research centers, and  universities  in aerospace engineering http://www.aero-grid.de
JSC at SC09 > Andreas Schreiber>  AeroGrid > 17.11.2009 Industry MTU Aero Engines GmbH T-Systems Solutions for Research GmbH German Aerospace Center (DLR) Institute for Propulsion Technology Simulation and Software Technology (Coord.) University of the Armed Forces, Munich Institute for Jet Propulsion  Research University Project Partner
JSC at SC09 > Andreas Schreiber>  AeroGrid > 17.11.2009 AeroGridUse Case and Project Goals Usage Case Collaboration in designing engine components  Project goals Allow cooperation in research and development projects Use of up-to-date program versions, data, and compute resources across all locations Detailed documentation of history of a computational process that leads to a certain result (“Provenance”)
JSC at SC09 > Andreas Schreiber>  AeroGrid > 17.11.2009 AeroGrid Architecture Site A (e.g., D-Grid) Resources UNICORE 6 UNICORE6Gateway Liferay Server Code-Developer DataFinder User UNICORE / WebDAV WebDAVServer Data/Metadata Data/Metadata Web-Portal Site B (Service provider) Simulation User Resources UNICORE 6 UNICORE6Gateway ePROTAS Liferay Server CPU Resources CPU Resources WebDAV Server . . .
AeroGrid Deployment ISGC 2011 > Andreas Schreiber > Security and Trust in an Industrial Grid Project > 23.03.2011
JSC at SC09 > Andreas Schreiber>  AeroGrid > 17.11.2009 Background: Turbo MachinerySimulation Tasks Simulation of turbine components  Design (variants) Optimization Aero elasticity Aero acoustics Cooling Complex geometries Multistage  components
JSC at SC09 > Andreas Schreiber>  AeroGrid > 17.11.2009 Workflow Turbine Simulation
Trust in Industrial Context Employees are not trusted Need for protecting confidential and classified data Solution is a suitable security policy Results are not trusted Need for traceable workflows and reliable documented results Solution is recording of process and data Provenance ISGC 2011 > Andreas Schreiber > Security and Trust in an Industrial Grid Project > 23.03.2011
Industrial Security Concerns UNICORE 6 security model is based on client and server certificates With personal user certificates: Security solution must forbid to copy confidential or classified data or software ISGC 2011 > Andreas Schreiber > Security and Trust in an Industrial Grid Project > 23.03.2011 Users can access resources from within secure company network Users can access resources from other locations Users can access data or software from other locations
Security Solution Certificate Authority Internal Grid-CA, trusted by D-Grid resources Definition of policy for this CA Assure that private personal keys cannot leave the company Security policies of the companies already forbids to copy any data Prevent active misuse of the security policy Wrapper for Grid client software Users cannot read and copy their private personal keys Only the Grid client software can read the key ISGC 2011 > Andreas Schreiber > Security and Trust in an Industrial Grid Project > 23.03.2011
Security Solution ISGC 2011 > Andreas Schreiber > Security and Trust in an Industrial Grid Project > 23.03.2011 Data/Metadata Simulation User CPU Resources User ePROTAS UNICORE / WebDAV Wrapper Remote Site (e.g., D-GridResource) Resources UNICORE 6 UNICORE6Gateway UNICORE Client Liferay Server Certificate WebDAVServer
Trust for ResultsAbout “Provenance” lat.: provenire, “to come from“ Synonym: “Lineage” In Art Curation: Source, Origin: The history of ownership or location of a piece of art Actions performed on artifacts Data Provenance: What for? Question of Item Identity Question of Product Quality Question of Production Efficiency Question of Production Error Sources Question of Repeatability Question of Trust ?  	!
Provenancein Computer Science The Provenance of a piece of information is the history of its creation. What details can be documented about data production processes? Input Parameters of Tools and Workflows  Used Resources (Computers, Other Data) Responsible Contacts (User Sessions) Produced Files and Relationships among each other Difference toclassic Logging!
Example Provenance Use Case Questionsin Engineering Applications Which simulation produced a certain file? Which simulation calculated a certain model? In which simulation a certain parameter was used? What monitoring data was recorded in a simulation with parameter == x? Which simulations were run with a certain numeric or model configuration? Has all data stayed within the company network during a confidential calculation?
Process Documentationof Complex Simulations What is recorded in complex simulations? Model Parameters Tools (Versions, Path, Origin of the Binaries) Used Libraries and Compilers (Versions, Parameters) Used Resources(e.g., Data, Computers, OS Environment, …) Produced Files User Session References Execution Dependencies and Causal Chains Benefits: Detailed Trace of the Emergence of Results Clear Documentation of Distributed Workflows Possibility to “Re-run“ Simulations Formalities Compliance Checks
Specific AeroGrid Use Cases Resource Search Which users and resources were involved in the production of a certain result? Error Search Find successful simulation runswith a certain parameterconfiguration Expert Search Who has used a certainconfiguration of parametersalready? SIMULATION FAILED
AeroGrid Architecture
AeroGrid Workflow: Provenance-Aware Applications Stand-alone GUI Applications Command Line Executables Script Integrated Tools Component-Based Software e.g. Objects Interactions through Shell Executions Event Handling File System …
Structure of Provenance Documentation Example: Login and create a collection

Weitere ähnliche Inhalte

Was ist angesagt?

Predictive Maintenance with R
Predictive Maintenance with RPredictive Maintenance with R
Predictive Maintenance with R
eoda GmbH
 
Cloud computing security- critical infrastructures
Cloud computing security- critical infrastructuresCloud computing security- critical infrastructures
Cloud computing security- critical infrastructures
Mohammed Saqib
 

Was ist angesagt? (17)

Big Data Analytics in Healthcare
Big Data Analytics in HealthcareBig Data Analytics in Healthcare
Big Data Analytics in Healthcare
 
Predictive Maintenance with R
Predictive Maintenance with RPredictive Maintenance with R
Predictive Maintenance with R
 
D4: Predix Cool Features (Predix Transform 2016)
D4: Predix Cool Features (Predix Transform 2016) D4: Predix Cool Features (Predix Transform 2016)
D4: Predix Cool Features (Predix Transform 2016)
 
Trade offs for threshold implementations
Trade offs for threshold implementationsTrade offs for threshold implementations
Trade offs for threshold implementations
 
Yield Improvement Through Data Analysis using TIBCO Spotfire
Yield Improvement Through Data Analysis using TIBCO SpotfireYield Improvement Through Data Analysis using TIBCO Spotfire
Yield Improvement Through Data Analysis using TIBCO Spotfire
 
IZERTIS V-trev midih-presentation-oc2_demo_day
IZERTIS V-trev midih-presentation-oc2_demo_dayIZERTIS V-trev midih-presentation-oc2_demo_day
IZERTIS V-trev midih-presentation-oc2_demo_day
 
IoT Platform Meetup - GE
IoT Platform Meetup - GEIoT Platform Meetup - GE
IoT Platform Meetup - GE
 
Kontakt.io webinar with Cassia Networks
Kontakt.io webinar with Cassia NetworksKontakt.io webinar with Cassia Networks
Kontakt.io webinar with Cassia Networks
 
Predix Data Fabric & Digital Twin Framework- Platform for Continuous Learning...
Predix Data Fabric & Digital Twin Framework- Platform for Continuous Learning...Predix Data Fabric & Digital Twin Framework- Platform for Continuous Learning...
Predix Data Fabric & Digital Twin Framework- Platform for Continuous Learning...
 
RA TechED 2019 - SS16 - Security Where and Why do I start
RA TechED 2019 - SS16 - Security Where and Why do I startRA TechED 2019 - SS16 - Security Where and Why do I start
RA TechED 2019 - SS16 - Security Where and Why do I start
 
Industria 4.0. Lucca, 5 luglio 2017 - The Connected Enterprise
Industria 4.0. Lucca, 5 luglio 2017 - The Connected EnterpriseIndustria 4.0. Lucca, 5 luglio 2017 - The Connected Enterprise
Industria 4.0. Lucca, 5 luglio 2017 - The Connected Enterprise
 
Harel Kodesh, Vice President, Predix and CTO, GE Digital
Harel Kodesh, Vice President, Predix and CTO, GE DigitalHarel Kodesh, Vice President, Predix and CTO, GE Digital
Harel Kodesh, Vice President, Predix and CTO, GE Digital
 
Smart Manufacturing Requirements for Equipment Capability and Control
Smart Manufacturing Requirements forEquipment Capability and ControlSmart Manufacturing Requirements forEquipment Capability and Control
Smart Manufacturing Requirements for Equipment Capability and Control
 
Cloud computing security- critical infrastructures
Cloud computing security- critical infrastructuresCloud computing security- critical infrastructures
Cloud computing security- critical infrastructures
 
Internet of Things - AMECSE
Internet of Things - AMECSEInternet of Things - AMECSE
Internet of Things - AMECSE
 
19 Jun 2018 - Hazard Analysis and Functional Safety Compliance
19 Jun 2018 - Hazard Analysis and Functional Safety Compliance 19 Jun 2018 - Hazard Analysis and Functional Safety Compliance
19 Jun 2018 - Hazard Analysis and Functional Safety Compliance
 
GE Predix - The IIoT Platform
GE Predix - The IIoT PlatformGE Predix - The IIoT Platform
GE Predix - The IIoT Platform
 

Andere mochten auch

Test Automation Engineer
Test Automation EngineerTest Automation Engineer
Test Automation Engineer
Melinda Kasza
 
Dr. Taj Mattu (President, Foresight Science & Technology): Creating an Entrep...
Dr. Taj Mattu (President, Foresight Science & Technology): Creating an Entrep...Dr. Taj Mattu (President, Foresight Science & Technology): Creating an Entrep...
Dr. Taj Mattu (President, Foresight Science & Technology): Creating an Entrep...
Asbar World Forum 2016
 
أ. ناصر النفيسي (نائب رئيس شركة أرامكو): استثمار المعرفة في أرامكو السعودية
أ. ناصر النفيسي (نائب رئيس شركة أرامكو): استثمار المعرفة في أرامكو السعوديةأ. ناصر النفيسي (نائب رئيس شركة أرامكو): استثمار المعرفة في أرامكو السعودية
أ. ناصر النفيسي (نائب رئيس شركة أرامكو): استثمار المعرفة في أرامكو السعودية
Asbar World Forum 2016
 
Rogers m smith
Rogers m smithRogers m smith
Rogers m smith
njcfuller
 

Andere mochten auch (11)

S1
S1S1
S1
 
Desert Code Camp 2016.1 - Stateful Distributed Systems
Desert Code Camp 2016.1 - Stateful Distributed SystemsDesert Code Camp 2016.1 - Stateful Distributed Systems
Desert Code Camp 2016.1 - Stateful Distributed Systems
 
Instituto superior tecnológico iii
Instituto superior tecnológico  iiiInstituto superior tecnológico  iii
Instituto superior tecnológico iii
 
Test Automation Engineer
Test Automation EngineerTest Automation Engineer
Test Automation Engineer
 
Pete frasers 10 step guide
Pete frasers 10 step guidePete frasers 10 step guide
Pete frasers 10 step guide
 
Dr. Taj Mattu (President, Foresight Science & Technology): Creating an Entrep...
Dr. Taj Mattu (President, Foresight Science & Technology): Creating an Entrep...Dr. Taj Mattu (President, Foresight Science & Technology): Creating an Entrep...
Dr. Taj Mattu (President, Foresight Science & Technology): Creating an Entrep...
 
Surdas ke Pad - class 10
Surdas ke Pad - class 10Surdas ke Pad - class 10
Surdas ke Pad - class 10
 
أ. ناصر النفيسي (نائب رئيس شركة أرامكو): استثمار المعرفة في أرامكو السعودية
أ. ناصر النفيسي (نائب رئيس شركة أرامكو): استثمار المعرفة في أرامكو السعوديةأ. ناصر النفيسي (نائب رئيس شركة أرامكو): استثمار المعرفة في أرامكو السعودية
أ. ناصر النفيسي (نائب رئيس شركة أرامكو): استثمار المعرفة في أرامكو السعودية
 
Rogers m smith
Rogers m smithRogers m smith
Rogers m smith
 
Python debugger
Python debuggerPython debugger
Python debugger
 
Google borg と コンテナベース分散システムデザインパターン
Google borg と コンテナベース分散システムデザインパターンGoogle borg と コンテナベース分散システムデザインパターン
Google borg と コンテナベース分散システムデザインパターン
 

Ähnlich wie Security and Trust in an Industrial Grid Project

Achieving Data Dissemination with Security using FIWARE and Intel Software Gu...
Achieving Data Dissemination with Security using FIWARE and Intel Software Gu...Achieving Data Dissemination with Security using FIWARE and Intel Software Gu...
Achieving Data Dissemination with Security using FIWARE and Intel Software Gu...
Dalton Valadares
 

Ähnlich wie Security and Trust in an Industrial Grid Project (20)

Composition and Execution of Secure Workflows in WSRF-Grids, IEEE CCGrid 2008...
Composition and Execution of Secure Workflows in WSRF-Grids, IEEE CCGrid 2008...Composition and Execution of Secure Workflows in WSRF-Grids, IEEE CCGrid 2008...
Composition and Execution of Secure Workflows in WSRF-Grids, IEEE CCGrid 2008...
 
System Approach for Single Keyword Search for Encrypted Data Files Guarantees...
System Approach for Single Keyword Search for Encrypted Data Files Guarantees...System Approach for Single Keyword Search for Encrypted Data Files Guarantees...
System Approach for Single Keyword Search for Encrypted Data Files Guarantees...
 
IRJET- Sharing Session Key to Protect Data in Cloud Storage
IRJET- Sharing Session Key to Protect Data in Cloud StorageIRJET- Sharing Session Key to Protect Data in Cloud Storage
IRJET- Sharing Session Key to Protect Data in Cloud Storage
 
Keynote WFIoT2019 - Data Graph, Knowledge Graphs Ontologies, Internet of Thin...
Keynote WFIoT2019 - Data Graph, Knowledge Graphs Ontologies, Internet of Thin...Keynote WFIoT2019 - Data Graph, Knowledge Graphs Ontologies, Internet of Thin...
Keynote WFIoT2019 - Data Graph, Knowledge Graphs Ontologies, Internet of Thin...
 
Advance security in cloud computing for military weapons
Advance security in cloud computing for military weaponsAdvance security in cloud computing for military weapons
Advance security in cloud computing for military weapons
 
IRJET- Protection of Personal Data on Distributed Cloud using Biometrics
IRJET- Protection of Personal Data on Distributed Cloud using BiometricsIRJET- Protection of Personal Data on Distributed Cloud using Biometrics
IRJET- Protection of Personal Data on Distributed Cloud using Biometrics
 
Effective Information Flow Control as a Service: EIFCaaS
Effective Information Flow Control as a Service: EIFCaaSEffective Information Flow Control as a Service: EIFCaaS
Effective Information Flow Control as a Service: EIFCaaS
 
Intel software guard extension
Intel software guard extensionIntel software guard extension
Intel software guard extension
 
IRJET- Securing Cloud Data Under Key Exposure
IRJET- Securing Cloud Data Under Key ExposureIRJET- Securing Cloud Data Under Key Exposure
IRJET- Securing Cloud Data Under Key Exposure
 
A Secure and Dynamic Multi Keyword Ranked Search over Encrypted Cloud Data
A Secure and Dynamic Multi Keyword Ranked Search over Encrypted Cloud DataA Secure and Dynamic Multi Keyword Ranked Search over Encrypted Cloud Data
A Secure and Dynamic Multi Keyword Ranked Search over Encrypted Cloud Data
 
IRJET- Data Security in Cloud Computing through AES under Drivehq
IRJET- Data Security in Cloud Computing through AES under DrivehqIRJET- Data Security in Cloud Computing through AES under Drivehq
IRJET- Data Security in Cloud Computing through AES under Drivehq
 
IRJET-2 Proxy-Oriented Data Uploading in Multi Cloud Storage
IRJET-2 	  Proxy-Oriented Data Uploading in Multi Cloud StorageIRJET-2 	  Proxy-Oriented Data Uploading in Multi Cloud Storage
IRJET-2 Proxy-Oriented Data Uploading in Multi Cloud Storage
 
IRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET - Data Security in Cloud Computing using Homomorphic AlgorithamIRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET - Data Security in Cloud Computing using Homomorphic Algoritham
 
Cloud security with Sage Construction Anywhere
Cloud security with Sage Construction AnywhereCloud security with Sage Construction Anywhere
Cloud security with Sage Construction Anywhere
 
IRJET - Virtual Data Auditing at Overcast Environment
IRJET - Virtual Data Auditing at Overcast EnvironmentIRJET - Virtual Data Auditing at Overcast Environment
IRJET - Virtual Data Auditing at Overcast Environment
 
Driving a Digital Thread Program in Manufacturing with Apache Kafka | Anu Mis...
Driving a Digital Thread Program in Manufacturing with Apache Kafka | Anu Mis...Driving a Digital Thread Program in Manufacturing with Apache Kafka | Anu Mis...
Driving a Digital Thread Program in Manufacturing with Apache Kafka | Anu Mis...
 
SECURITY IN COULD DATA STORAGE USING SOFT COMPUTING TECHNIQUES AND ELGAMAL CR...
SECURITY IN COULD DATA STORAGE USING SOFT COMPUTING TECHNIQUES AND ELGAMAL CR...SECURITY IN COULD DATA STORAGE USING SOFT COMPUTING TECHNIQUES AND ELGAMAL CR...
SECURITY IN COULD DATA STORAGE USING SOFT COMPUTING TECHNIQUES AND ELGAMAL CR...
 
GE’s Industrial Data Lake Platform
GE’s Industrial Data Lake PlatformGE’s Industrial Data Lake Platform
GE’s Industrial Data Lake Platform
 
IRJET- An Approach for Implemented Secure Proxy Server for Multi-User Searcha...
IRJET- An Approach for Implemented Secure Proxy Server for Multi-User Searcha...IRJET- An Approach for Implemented Secure Proxy Server for Multi-User Searcha...
IRJET- An Approach for Implemented Secure Proxy Server for Multi-User Searcha...
 
Achieving Data Dissemination with Security using FIWARE and Intel Software Gu...
Achieving Data Dissemination with Security using FIWARE and Intel Software Gu...Achieving Data Dissemination with Security using FIWARE and Intel Software Gu...
Achieving Data Dissemination with Security using FIWARE and Intel Software Gu...
 

Mehr von Andreas Schreiber

Mehr von Andreas Schreiber (20)

Provenance-based Security Audits and its Application to COVID-19 Contact Trac...
Provenance-based Security Audits and its Application to COVID-19 Contact Trac...Provenance-based Security Audits and its Application to COVID-19 Contact Trac...
Provenance-based Security Audits and its Application to COVID-19 Contact Trac...
 
Visualization of Software Architectures in Virtual Reality and Augmented Reality
Visualization of Software Architectures in Virtual Reality and Augmented RealityVisualization of Software Architectures in Virtual Reality and Augmented Reality
Visualization of Software Architectures in Virtual Reality and Augmented Reality
 
Provenance as a building block for an open science infrastructure
Provenance as a building block for an open science infrastructureProvenance as a building block for an open science infrastructure
Provenance as a building block for an open science infrastructure
 
Raising Awareness about Open Source Licensing at the German Aerospace Center
Raising Awareness about Open Source Licensing at the German Aerospace CenterRaising Awareness about Open Source Licensing at the German Aerospace Center
Raising Awareness about Open Source Licensing at the German Aerospace Center
 
Open Source Licensing for Rocket Scientists
Open Source Licensing for Rocket ScientistsOpen Source Licensing for Rocket Scientists
Open Source Licensing for Rocket Scientists
 
Interactive Visualization of Software Components with Virtual Reality Headsets
Interactive Visualization of Software Components with Virtual Reality HeadsetsInteractive Visualization of Software Components with Virtual Reality Headsets
Interactive Visualization of Software Components with Virtual Reality Headsets
 
Provenance for Reproducible Data Science
Provenance for Reproducible Data ScienceProvenance for Reproducible Data Science
Provenance for Reproducible Data Science
 
Visualizing Provenance using Comics
Visualizing Provenance using ComicsVisualizing Provenance using Comics
Visualizing Provenance using Comics
 
Quantified Self Comics
Quantified Self ComicsQuantified Self Comics
Quantified Self Comics
 
Nachvollziehbarkeit mit Hinblick auf Privacy-Verletzungen
Nachvollziehbarkeit mit Hinblick auf Privacy-VerletzungenNachvollziehbarkeit mit Hinblick auf Privacy-Verletzungen
Nachvollziehbarkeit mit Hinblick auf Privacy-Verletzungen
 
Reproducible Science with Python
Reproducible Science with PythonReproducible Science with Python
Reproducible Science with Python
 
Python at Warp Speed
Python at Warp SpeedPython at Warp Speed
Python at Warp Speed
 
A Provenance Model for Quantified Self Data
A Provenance Model for Quantified Self DataA Provenance Model for Quantified Self Data
A Provenance Model for Quantified Self Data
 
Open Source im DLR
Open Source im DLROpen Source im DLR
Open Source im DLR
 
Tracking after Stroke: Doctors, Dogs and All The Rest
Tracking after Stroke: Doctors, Dogs and All The RestTracking after Stroke: Doctors, Dogs and All The Rest
Tracking after Stroke: Doctors, Dogs and All The Rest
 
High Throughput Processing of Space Debris Data
High Throughput Processing of Space Debris DataHigh Throughput Processing of Space Debris Data
High Throughput Processing of Space Debris Data
 
Bericht von der QS15 Conference & Exposition
Bericht von der QS15 Conference & ExpositionBericht von der QS15 Conference & Exposition
Bericht von der QS15 Conference & Exposition
 
Telemedizin: Gesundheit, messbar für jedermann
Telemedizin: Gesundheit, messbar für jedermannTelemedizin: Gesundheit, messbar für jedermann
Telemedizin: Gesundheit, messbar für jedermann
 
Big Python
Big PythonBig Python
Big Python
 
Quantified Self mit Wearable Devices und Smartphone-Sensoren
Quantified Self mit Wearable Devices und Smartphone-SensorenQuantified Self mit Wearable Devices und Smartphone-Sensoren
Quantified Self mit Wearable Devices und Smartphone-Sensoren
 

Kürzlich hochgeladen

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 

Kürzlich hochgeladen (20)

Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 

Security and Trust in an Industrial Grid Project

  • 1. Folie 1 ISGC 2011 > Andreas Schreiber > Security and Trust in an Industrial Grid Project > 23.03.2011 Security and Trust in an Industrial Grid Project ISGC 2011 (23 March 2011, 臺北市, Taiwan) Andreas Schreiber <Andreas.Schreiber@dlr.de>German Aerospace Center (DLR), Colognehttp://www.dlr.de/sc
  • 2. ISGC 2011 > Andreas Schreiber > Security and Trust in an Industrial Grid Project > 23.03.2011 Abstract In usual Grid security infrastructures based on personal Grid certificates, it is possible for users (i.e., employees), to first copy data (or software) to a Grid resource using their personal certificate and then copy this from another security domain to some other place. In the D-Grid project AeroGrid, which provides a Grid infrastructure and client tools for an industrial application from the aerospace domain, the industrial partner is a large turbine manufacturer with high demands on security. It is an important requirement that employees are not able to copy any data outside the security domain of the company. Within the project, a security policy for solving this problem has been defined. The basic strategy for a solution is as follows: The policies and the administrators of the company must forbid and enforce that employees can take the private key that belongs to the Grid certificate with them outside the company. Then the Grid certificate would be not usable for accessing data stored on some Grid resources. For the implementation of this strategy, a company-internal Grid Certificate Authority is deployed and a policy for handling certificates and private key is defined. A second industrial requirement is reliability of data arising from complex processes. To have a reliable documentation of the individual steps performed in engineering calculations, it’s important to trace all processing steps, i.e. the complete Provenance of the process that led’s to a certain result. Within the project, a Service-Oriented Provenance architecture for recording Provenance information (such as user interactions in the graphical user interface or execution of numerical codes) has been provided. This talk presents the security and the Provenance infrastructure of the AeroGrid project as well as details on the implementation and deployment of the security solution. ISGC 2011: http://event.twgrid.org/isgc2011/index.html
  • 3. Outline AeroGrid Industrial Background Trust Security Provenance ISGC 2011 > Andreas Schreiber > Security and Trust in an Industrial Grid Project > 23.03.2011
  • 4. JSC at SC09 > Andreas Schreiber> AeroGrid > 17.11.2009 AeroGrid Grid-based cooperation between industry, research centers, and universities in aerospace engineering http://www.aero-grid.de
  • 5. JSC at SC09 > Andreas Schreiber> AeroGrid > 17.11.2009 Industry MTU Aero Engines GmbH T-Systems Solutions for Research GmbH German Aerospace Center (DLR) Institute for Propulsion Technology Simulation and Software Technology (Coord.) University of the Armed Forces, Munich Institute for Jet Propulsion Research University Project Partner
  • 6. JSC at SC09 > Andreas Schreiber> AeroGrid > 17.11.2009 AeroGridUse Case and Project Goals Usage Case Collaboration in designing engine components Project goals Allow cooperation in research and development projects Use of up-to-date program versions, data, and compute resources across all locations Detailed documentation of history of a computational process that leads to a certain result (“Provenance”)
  • 7. JSC at SC09 > Andreas Schreiber> AeroGrid > 17.11.2009 AeroGrid Architecture Site A (e.g., D-Grid) Resources UNICORE 6 UNICORE6Gateway Liferay Server Code-Developer DataFinder User UNICORE / WebDAV WebDAVServer Data/Metadata Data/Metadata Web-Portal Site B (Service provider) Simulation User Resources UNICORE 6 UNICORE6Gateway ePROTAS Liferay Server CPU Resources CPU Resources WebDAV Server . . .
  • 8. AeroGrid Deployment ISGC 2011 > Andreas Schreiber > Security and Trust in an Industrial Grid Project > 23.03.2011
  • 9. JSC at SC09 > Andreas Schreiber> AeroGrid > 17.11.2009 Background: Turbo MachinerySimulation Tasks Simulation of turbine components Design (variants) Optimization Aero elasticity Aero acoustics Cooling Complex geometries Multistage components
  • 10. JSC at SC09 > Andreas Schreiber> AeroGrid > 17.11.2009 Workflow Turbine Simulation
  • 11. Trust in Industrial Context Employees are not trusted Need for protecting confidential and classified data Solution is a suitable security policy Results are not trusted Need for traceable workflows and reliable documented results Solution is recording of process and data Provenance ISGC 2011 > Andreas Schreiber > Security and Trust in an Industrial Grid Project > 23.03.2011
  • 12. Industrial Security Concerns UNICORE 6 security model is based on client and server certificates With personal user certificates: Security solution must forbid to copy confidential or classified data or software ISGC 2011 > Andreas Schreiber > Security and Trust in an Industrial Grid Project > 23.03.2011 Users can access resources from within secure company network Users can access resources from other locations Users can access data or software from other locations
  • 13. Security Solution Certificate Authority Internal Grid-CA, trusted by D-Grid resources Definition of policy for this CA Assure that private personal keys cannot leave the company Security policies of the companies already forbids to copy any data Prevent active misuse of the security policy Wrapper for Grid client software Users cannot read and copy their private personal keys Only the Grid client software can read the key ISGC 2011 > Andreas Schreiber > Security and Trust in an Industrial Grid Project > 23.03.2011
  • 14. Security Solution ISGC 2011 > Andreas Schreiber > Security and Trust in an Industrial Grid Project > 23.03.2011 Data/Metadata Simulation User CPU Resources User ePROTAS UNICORE / WebDAV Wrapper Remote Site (e.g., D-GridResource) Resources UNICORE 6 UNICORE6Gateway UNICORE Client Liferay Server Certificate WebDAVServer
  • 15. Trust for ResultsAbout “Provenance” lat.: provenire, “to come from“ Synonym: “Lineage” In Art Curation: Source, Origin: The history of ownership or location of a piece of art Actions performed on artifacts Data Provenance: What for? Question of Item Identity Question of Product Quality Question of Production Efficiency Question of Production Error Sources Question of Repeatability Question of Trust ? !
  • 16. Provenancein Computer Science The Provenance of a piece of information is the history of its creation. What details can be documented about data production processes? Input Parameters of Tools and Workflows Used Resources (Computers, Other Data) Responsible Contacts (User Sessions) Produced Files and Relationships among each other Difference toclassic Logging!
  • 17. Example Provenance Use Case Questionsin Engineering Applications Which simulation produced a certain file? Which simulation calculated a certain model? In which simulation a certain parameter was used? What monitoring data was recorded in a simulation with parameter == x? Which simulations were run with a certain numeric or model configuration? Has all data stayed within the company network during a confidential calculation?
  • 18. Process Documentationof Complex Simulations What is recorded in complex simulations? Model Parameters Tools (Versions, Path, Origin of the Binaries) Used Libraries and Compilers (Versions, Parameters) Used Resources(e.g., Data, Computers, OS Environment, …) Produced Files User Session References Execution Dependencies and Causal Chains Benefits: Detailed Trace of the Emergence of Results Clear Documentation of Distributed Workflows Possibility to “Re-run“ Simulations Formalities Compliance Checks
  • 19. Specific AeroGrid Use Cases Resource Search Which users and resources were involved in the production of a certain result? Error Search Find successful simulation runswith a certain parameterconfiguration Expert Search Who has used a certainconfiguration of parametersalready? SIMULATION FAILED
  • 21. AeroGrid Workflow: Provenance-Aware Applications Stand-alone GUI Applications Command Line Executables Script Integrated Tools Component-Based Software e.g. Objects Interactions through Shell Executions Event Handling File System …
  • 22.
  • 23. Structure of Provenance Documentation Example: Login and create a collection
  • 24.
  • 25.
  • 26. ISGC 2011 > Andreas Schreiber > Security and Trust in an Industrial Grid Project > 23.03.2011 Questions?