面向私有云的大规模访问安全管理

Ye Wu
{"title":"面向私有云的大规模访问安全管理","authors":"Ye Wu","doi":"10.1145/2898445.2898458","DOIUrl":null,"url":null,"abstract":"Access control related problems and solutions are commonly taken for granted as the No.1 enterprise security concern. Today, as more and more companies shift their business to cloud, while blurring the boundary of information exchange and management, this inevitably introduces serious technical challenges and difficulties to the realm of access security management for loss of cognitive central control in some degree, thereby increasingly receiving more attentions and investigations on their original basis. Big internet companies such as Google, Facebook in the US., and Baidu in China, their IDCs consist of huge amount of physical servers and millions of virtual machines or containers, usually deemed as a profound private cloud. At meantime, doing daily jobs, hundreds and thousands of employees (most of them are engineers with different roles) demand to access multi-categorical resources in IDC frequently. For example, SREs may need to remotely logon production servers to configure environment or rectify system mistakes; RDs might logon by certain account associated to machines, initiating services to fulfill development work. Moreover, IDC is the place where tremendous applications are running dynamically and endlessly, among which they exchange information one another by accessing to data storage and computing services probably across domains. As a consequence, a very complicated topology based on accessing relationships is emerged due to interactions among massive people-devices-services. In order to solve such large-scale distributed access control centered problems, this apparently leads to a line of security technologies needing to be considered, including identity management, authentication methods, authorization models, auditing and reporting, regulatory compliance, tracing and forensic, domain isolation, intrusion detections, and even more the administration toolkits for security evaluation criteria. Toward designing and implementing this desired type of comprehensive security platform, while simultaneously circumventing relative reliable, scalable and performance issues in engineering, as is highly concerned in industrial-level products, it is really a daunting task if without developing appropriate abstraction on targets and innovative applicable theorem in depth, for reducing complexity and unifying mechanisms. In this talk, we just present such a real-world existing system developed by our team, namely Giano which embraces most aforementioned security techniques, already widely used for Baidu IDC operating management and integrated into many business products. Some important related theoretical work such as delegation logic, attribute-based authentication, proof-carrying authorization, et al. are about to be illustrated, with the focus on their applications in practice.","PeriodicalId":187535,"journal":{"name":"Proceedings of the 4th ACM International Workshop on Security in Cloud Computing","volume":"102 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Giano: Toward Large Scale Access Security Management in Private Cloud\",\"authors\":\"Ye Wu\",\"doi\":\"10.1145/2898445.2898458\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Access control related problems and solutions are commonly taken for granted as the No.1 enterprise security concern. Today, as more and more companies shift their business to cloud, while blurring the boundary of information exchange and management, this inevitably introduces serious technical challenges and difficulties to the realm of access security management for loss of cognitive central control in some degree, thereby increasingly receiving more attentions and investigations on their original basis. Big internet companies such as Google, Facebook in the US., and Baidu in China, their IDCs consist of huge amount of physical servers and millions of virtual machines or containers, usually deemed as a profound private cloud. At meantime, doing daily jobs, hundreds and thousands of employees (most of them are engineers with different roles) demand to access multi-categorical resources in IDC frequently. For example, SREs may need to remotely logon production servers to configure environment or rectify system mistakes; RDs might logon by certain account associated to machines, initiating services to fulfill development work. Moreover, IDC is the place where tremendous applications are running dynamically and endlessly, among which they exchange information one another by accessing to data storage and computing services probably across domains. As a consequence, a very complicated topology based on accessing relationships is emerged due to interactions among massive people-devices-services. In order to solve such large-scale distributed access control centered problems, this apparently leads to a line of security technologies needing to be considered, including identity management, authentication methods, authorization models, auditing and reporting, regulatory compliance, tracing and forensic, domain isolation, intrusion detections, and even more the administration toolkits for security evaluation criteria. Toward designing and implementing this desired type of comprehensive security platform, while simultaneously circumventing relative reliable, scalable and performance issues in engineering, as is highly concerned in industrial-level products, it is really a daunting task if without developing appropriate abstraction on targets and innovative applicable theorem in depth, for reducing complexity and unifying mechanisms. In this talk, we just present such a real-world existing system developed by our team, namely Giano which embraces most aforementioned security techniques, already widely used for Baidu IDC operating management and integrated into many business products. Some important related theoretical work such as delegation logic, attribute-based authentication, proof-carrying authorization, et al. are about to be illustrated, with the focus on their applications in practice.\",\"PeriodicalId\":187535,\"journal\":{\"name\":\"Proceedings of the 4th ACM International Workshop on Security in Cloud Computing\",\"volume\":\"102 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2016-05-30\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceedings of the 4th ACM International Workshop on Security in Cloud Computing\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1145/2898445.2898458\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 4th ACM International Workshop on Security in Cloud Computing","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/2898445.2898458","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

访问控制相关的问题和解决方案通常被认为是企业安全关注的首要问题。在越来越多的企业将业务转移到云的今天,信息交换和管理的边界越来越模糊,不可避免地给访问安全管理领域带来了严重的技术挑战和困难,在一定程度上失去了认知中心控制,从而在原有的基础上越来越受到关注和研究。美国的谷歌(Google)、Facebook等大型互联网公司。他们的idc由大量的物理服务器和数以百万计的虚拟机或容器组成,通常被视为一个深奥的私有云。同时,在日常工作中,成千上万的员工(其中大部分是不同角色的工程师)需要频繁访问IDC的多类资源。例如,SREs可能需要远程登录生产服务器来配置环境或纠正系统错误;开发人员可以通过与机器关联的特定帐户登录,启动服务以完成开发工作。此外,IDC是一个巨大的应用程序动态和无休止地运行的地方,它们之间通过访问跨域的数据存储和计算服务来相互交换信息。因此,由于大量人-设备-服务之间的交互,出现了基于访问关系的非常复杂的拓扑结构。为了解决这种以大规模分布式访问控制为中心的问题,显然需要考虑一系列安全技术,包括身份管理、身份验证方法、授权模型、审计和报告、法规遵从性、跟踪和取证、域隔离、入侵检测,甚至更多用于安全评估标准的管理工具包。为了设计和实现这种理想类型的综合安全平台,同时规避工业产品高度关注的工程上的相对可靠、可扩展和性能问题,如果不深入开发适当的目标抽象和创新的适用定理,以降低复杂性和统一机制,这将是一项艰巨的任务。在这次演讲中,我们只是展示了我们团队开发的这样一个真实的现有系统,即Giano,它包含了上述大多数安全技术,已经广泛应用于百度IDC运营管理,并集成到许多业务产品中。本文对授权逻辑、基于属性的认证、携带证明的授权等重要的相关理论工作进行了阐述,并重点介绍了它们在实践中的应用。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Giano: Toward Large Scale Access Security Management in Private Cloud
Access control related problems and solutions are commonly taken for granted as the No.1 enterprise security concern. Today, as more and more companies shift their business to cloud, while blurring the boundary of information exchange and management, this inevitably introduces serious technical challenges and difficulties to the realm of access security management for loss of cognitive central control in some degree, thereby increasingly receiving more attentions and investigations on their original basis. Big internet companies such as Google, Facebook in the US., and Baidu in China, their IDCs consist of huge amount of physical servers and millions of virtual machines or containers, usually deemed as a profound private cloud. At meantime, doing daily jobs, hundreds and thousands of employees (most of them are engineers with different roles) demand to access multi-categorical resources in IDC frequently. For example, SREs may need to remotely logon production servers to configure environment or rectify system mistakes; RDs might logon by certain account associated to machines, initiating services to fulfill development work. Moreover, IDC is the place where tremendous applications are running dynamically and endlessly, among which they exchange information one another by accessing to data storage and computing services probably across domains. As a consequence, a very complicated topology based on accessing relationships is emerged due to interactions among massive people-devices-services. In order to solve such large-scale distributed access control centered problems, this apparently leads to a line of security technologies needing to be considered, including identity management, authentication methods, authorization models, auditing and reporting, regulatory compliance, tracing and forensic, domain isolation, intrusion detections, and even more the administration toolkits for security evaluation criteria. Toward designing and implementing this desired type of comprehensive security platform, while simultaneously circumventing relative reliable, scalable and performance issues in engineering, as is highly concerned in industrial-level products, it is really a daunting task if without developing appropriate abstraction on targets and innovative applicable theorem in depth, for reducing complexity and unifying mechanisms. In this talk, we just present such a real-world existing system developed by our team, namely Giano which embraces most aforementioned security techniques, already widely used for Baidu IDC operating management and integrated into many business products. Some important related theoretical work such as delegation logic, attribute-based authentication, proof-carrying authorization, et al. are about to be illustrated, with the focus on their applications in practice.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信