可扩展信任:工程挑战还是复杂性障碍?

K. Birman
{"title":"可扩展信任:工程挑战还是复杂性障碍?","authors":"K. Birman","doi":"10.1145/1179474.1179476","DOIUrl":null,"url":null,"abstract":"We consider the challenges of developing and deploying trusted computing platforms that can be operated on a large scale. The core question concerns scalability of trust properties: do these revolve around engineering challenges (which can potentially be overcome by clever design), complexity barriers (which might require completely new approaches), or other kinds of obstacles?Scalable trust means different things to different users; unless we limit the topic, we run the risk of scalability problems of our own. Accordingly, we'll narrow attention to the forms of trust needed in a hypothetical electronic medical records system that interconnects multiple institutions and includes telemetry or even active devices for monitoring patents. There are several efforts underway to develop prototype systems with this functionality.We begin by asking what trust means in the context of such a system. Then, we match technology to the needs, and finally ask whether the available options can scale under the demands that a successful deployment might impose.For our purposes, we'll look at two categories of trust properties, although one can identify others. The first involves quality of service guarantees, such as high availability, fault-tolerance and timely responsiveness. Clearly, an electronic medical records system needs to be highly available and rapidly responsive, particularly if it is \"in the loop\" for patient monitoring or treatment. High availability can be reduced to data and service replication, and rapid responsiveness under scalable load is typically achieved by balancing the load over a set of cloned services. Our question can now be rephrased: rather than asking about the scalability of trust, at least in these respects, we should ask about the scalability of replication technologies.A system can scale well in some dimensions while scaling poorly in others. At Cornell, the QuickSilver and Ricochet projects have explored this question, asking what forms of scalability are actually required. If data and services are replicated in groups, using multicast (or pub-sub technology) to disseminate updates, components may need to belong to many groups (or topics), and some of these groups may be very large. Moreover, the properties desired of groups will vary: some should stress rapid data delivery, others strong delivery properties such as virtual synchrony, and some may need to support a transactional persistence guarantee (the so-called ACID properties). The systems we've developed respond to these requirements. Ricochet focuses on time-critical scenarios, while QuickSilver emphasizes performance and has an extensible framework for developing groups with strong properties.Armed with the perspective offered by this work on scalable replication, we can now return to the original question and ask about other forms of trust. The most obvious issue involves security and authorization relationships: a medical system will support large numbers of users (patients, care providers, other kinds of service providers, etc), and will mediate access to resources (sensors, databases, applications, medication dispensers, etc) subject to policies maintained by the various agencies involved: the medical practices, hospitals, etc. Each entity potentially maintains its own security policies, hence the challenge involves enforcing a composed set of rules.Goals of a policy enforcement solution include high availability, dynamicism (the policies and participants will change over time), decentralization (it will often be important for system components to be able to \"act locally\" on behalf of the global policy), minimal disclosure (decisions should be feasible with access to just the relevant subset of a database of security rules), performance (decisions should be reached rapidly), etc. By scalability, we mean that, given adequate hardware, these goals should be sustained as we scale in the dimensions just enumerated.We will suggest that consistent application of a security policy maps to the same underlying consistency questions seen when replicating data. This perspective makes it possible to apply the insights gained studying scalable data replication to the scalability of security policy enforcement. A series of challenge problems can be identified. Some are primarily engineering challenges, in the sense that the problem can apparently be solved, but implementing the solution might not be easy. Others pose algorithmic challenges or non-trivial complexity issues. The talk will identify several open questions.The need for scalable trust is pressing: It would have been easy to pose similar questions about any of a great variety of critical infrastructure systems used in financial settings, air traffic control, military intelligence, etc. At least some of these problems are solvable. But understanding which can be solved and which expose fundamental barriers is a matter of vital importance if our community is to offer the guidance that developers of these critical systems will need.","PeriodicalId":401412,"journal":{"name":"Scalable Trusted Computing","volume":"157 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2006-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":"{\"title\":\"Scalable trust: engineering challenge or complexity barrier?\",\"authors\":\"K. Birman\",\"doi\":\"10.1145/1179474.1179476\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"We consider the challenges of developing and deploying trusted computing platforms that can be operated on a large scale. The core question concerns scalability of trust properties: do these revolve around engineering challenges (which can potentially be overcome by clever design), complexity barriers (which might require completely new approaches), or other kinds of obstacles?Scalable trust means different things to different users; unless we limit the topic, we run the risk of scalability problems of our own. Accordingly, we'll narrow attention to the forms of trust needed in a hypothetical electronic medical records system that interconnects multiple institutions and includes telemetry or even active devices for monitoring patents. There are several efforts underway to develop prototype systems with this functionality.We begin by asking what trust means in the context of such a system. Then, we match technology to the needs, and finally ask whether the available options can scale under the demands that a successful deployment might impose.For our purposes, we'll look at two categories of trust properties, although one can identify others. The first involves quality of service guarantees, such as high availability, fault-tolerance and timely responsiveness. Clearly, an electronic medical records system needs to be highly available and rapidly responsive, particularly if it is \\\"in the loop\\\" for patient monitoring or treatment. High availability can be reduced to data and service replication, and rapid responsiveness under scalable load is typically achieved by balancing the load over a set of cloned services. Our question can now be rephrased: rather than asking about the scalability of trust, at least in these respects, we should ask about the scalability of replication technologies.A system can scale well in some dimensions while scaling poorly in others. At Cornell, the QuickSilver and Ricochet projects have explored this question, asking what forms of scalability are actually required. If data and services are replicated in groups, using multicast (or pub-sub technology) to disseminate updates, components may need to belong to many groups (or topics), and some of these groups may be very large. Moreover, the properties desired of groups will vary: some should stress rapid data delivery, others strong delivery properties such as virtual synchrony, and some may need to support a transactional persistence guarantee (the so-called ACID properties). The systems we've developed respond to these requirements. Ricochet focuses on time-critical scenarios, while QuickSilver emphasizes performance and has an extensible framework for developing groups with strong properties.Armed with the perspective offered by this work on scalable replication, we can now return to the original question and ask about other forms of trust. The most obvious issue involves security and authorization relationships: a medical system will support large numbers of users (patients, care providers, other kinds of service providers, etc), and will mediate access to resources (sensors, databases, applications, medication dispensers, etc) subject to policies maintained by the various agencies involved: the medical practices, hospitals, etc. Each entity potentially maintains its own security policies, hence the challenge involves enforcing a composed set of rules.Goals of a policy enforcement solution include high availability, dynamicism (the policies and participants will change over time), decentralization (it will often be important for system components to be able to \\\"act locally\\\" on behalf of the global policy), minimal disclosure (decisions should be feasible with access to just the relevant subset of a database of security rules), performance (decisions should be reached rapidly), etc. By scalability, we mean that, given adequate hardware, these goals should be sustained as we scale in the dimensions just enumerated.We will suggest that consistent application of a security policy maps to the same underlying consistency questions seen when replicating data. This perspective makes it possible to apply the insights gained studying scalable data replication to the scalability of security policy enforcement. A series of challenge problems can be identified. Some are primarily engineering challenges, in the sense that the problem can apparently be solved, but implementing the solution might not be easy. Others pose algorithmic challenges or non-trivial complexity issues. The talk will identify several open questions.The need for scalable trust is pressing: It would have been easy to pose similar questions about any of a great variety of critical infrastructure systems used in financial settings, air traffic control, military intelligence, etc. At least some of these problems are solvable. But understanding which can be solved and which expose fundamental barriers is a matter of vital importance if our community is to offer the guidance that developers of these critical systems will need.\",\"PeriodicalId\":401412,\"journal\":{\"name\":\"Scalable Trusted Computing\",\"volume\":\"157 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2006-11-03\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"4\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Scalable Trusted Computing\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1145/1179474.1179476\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Scalable Trusted Computing","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/1179474.1179476","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 4

摘要

但是,如果我们的社区要为这些关键系统的开发人员提供所需的指导,那么了解哪些可以解决,哪些暴露了基本障碍是至关重要的。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Scalable trust: engineering challenge or complexity barrier?
We consider the challenges of developing and deploying trusted computing platforms that can be operated on a large scale. The core question concerns scalability of trust properties: do these revolve around engineering challenges (which can potentially be overcome by clever design), complexity barriers (which might require completely new approaches), or other kinds of obstacles?Scalable trust means different things to different users; unless we limit the topic, we run the risk of scalability problems of our own. Accordingly, we'll narrow attention to the forms of trust needed in a hypothetical electronic medical records system that interconnects multiple institutions and includes telemetry or even active devices for monitoring patents. There are several efforts underway to develop prototype systems with this functionality.We begin by asking what trust means in the context of such a system. Then, we match technology to the needs, and finally ask whether the available options can scale under the demands that a successful deployment might impose.For our purposes, we'll look at two categories of trust properties, although one can identify others. The first involves quality of service guarantees, such as high availability, fault-tolerance and timely responsiveness. Clearly, an electronic medical records system needs to be highly available and rapidly responsive, particularly if it is "in the loop" for patient monitoring or treatment. High availability can be reduced to data and service replication, and rapid responsiveness under scalable load is typically achieved by balancing the load over a set of cloned services. Our question can now be rephrased: rather than asking about the scalability of trust, at least in these respects, we should ask about the scalability of replication technologies.A system can scale well in some dimensions while scaling poorly in others. At Cornell, the QuickSilver and Ricochet projects have explored this question, asking what forms of scalability are actually required. If data and services are replicated in groups, using multicast (or pub-sub technology) to disseminate updates, components may need to belong to many groups (or topics), and some of these groups may be very large. Moreover, the properties desired of groups will vary: some should stress rapid data delivery, others strong delivery properties such as virtual synchrony, and some may need to support a transactional persistence guarantee (the so-called ACID properties). The systems we've developed respond to these requirements. Ricochet focuses on time-critical scenarios, while QuickSilver emphasizes performance and has an extensible framework for developing groups with strong properties.Armed with the perspective offered by this work on scalable replication, we can now return to the original question and ask about other forms of trust. The most obvious issue involves security and authorization relationships: a medical system will support large numbers of users (patients, care providers, other kinds of service providers, etc), and will mediate access to resources (sensors, databases, applications, medication dispensers, etc) subject to policies maintained by the various agencies involved: the medical practices, hospitals, etc. Each entity potentially maintains its own security policies, hence the challenge involves enforcing a composed set of rules.Goals of a policy enforcement solution include high availability, dynamicism (the policies and participants will change over time), decentralization (it will often be important for system components to be able to "act locally" on behalf of the global policy), minimal disclosure (decisions should be feasible with access to just the relevant subset of a database of security rules), performance (decisions should be reached rapidly), etc. By scalability, we mean that, given adequate hardware, these goals should be sustained as we scale in the dimensions just enumerated.We will suggest that consistent application of a security policy maps to the same underlying consistency questions seen when replicating data. This perspective makes it possible to apply the insights gained studying scalable data replication to the scalability of security policy enforcement. A series of challenge problems can be identified. Some are primarily engineering challenges, in the sense that the problem can apparently be solved, but implementing the solution might not be easy. Others pose algorithmic challenges or non-trivial complexity issues. The talk will identify several open questions.The need for scalable trust is pressing: It would have been easy to pose similar questions about any of a great variety of critical infrastructure systems used in financial settings, air traffic control, military intelligence, etc. At least some of these problems are solvable. But understanding which can be solved and which expose fundamental barriers is a matter of vital importance if our community is to offer the guidance that developers of these critical systems will need.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信