SlideShare a Scribd company logo
On Resilient Computing
ISSI 2011, Tokyo, Japan
February 16, 2012
Sven Wohlgemuth
Transdisciplinary Research Integration Center
National Institute of Informatics, Japan
Research Organization for Information and Systems, Japan
Agenda
I. Social Infrastructures and ICT
II. Adaptation and Interdependencies
III. Isolation Mechanisms
IV. Resilient Computing
2Sven Wohlgemuth <wohlgemuth@nii.ac.jp> On Resilient Computing
Sensor and controller
ICT services
I. Social Infrastructures and ICT
Sensor and controller
Workflows
Energy supply
Communication network
ICT services
S1 S2 S3
S4
Physical
Cyber
Function Event-driven
S5 S6
S8
...
...
• ICT control systems implement functions of social infrastructures
• Real-time processing of context data and controlling location
• Centralized control
• Operated by public or private organizations
3Sven Wohlgemuth <wohlgemuth@nii.ac.jp> On Resilient Computing
Sensor and controller
ICT services
I. Social Infrastructures and ICT
Sensor and controller
Workflows
Energy supply
Communication network
ICT services
S1 S2 S3
S4
Physical
Cyber
Function Event-driven
S5 S6
S8
...
...
• ICT control systems implement functions of social infrastructures
• Real-time processing of context data and controlling location
• Centralized control
• Operated by public or private organizations
Correctness threatened
by crime, terrorism, and natural disasters
3Sven Wohlgemuth <wohlgemuth@nii.ac.jp> On Resilient Computing
Resilience and ICT
• An affected resilient ICT system delivers at least correct critical services in a hostile
environment (brittle) (Hollnagel et al., 2006)
• Ability of an ICT system to provide and maintain an acceptable level of service in the
face of various faults and challenges to normal operation (Sterbenz et al., 2010)
• Persistence of dependability when facing changes (Laprie, 2008)
Own illustration following (Sheffi, 2005; Günther et al., 2007; McNanus, 2009)
4Sven Wohlgemuth <wohlgemuth@nii.ac.jp> On Resilient Computing
II. Adaptation and Interdependencies
Function
Specification Service
Sensor and controller
ICT services
d1 d2 c1
S1 S2 S3
S4
d1 d1, d1*
d1. d2, ...
c2
S4
Sn
d1. d2, ...
c2
d1
OS
Sj Sk
Si
Data flows describe interdependenciesAdaptation of an ICT system
5Sven Wohlgemuth <wohlgemuth@nii.ac.jp> On Resilient Computing
Shared
service C
Shared
service C
Sensor
Service A
Actuator
d r
d
Case (a) - Passive attack
Sensor
Service A
Actuator
d r*
d*
Case (b) - Active attack
Sensor Actuator
Case (c) - Non-availability
Malicious interferences Non-malicious interference
d, d* : Input data for a data processing
: Shared used service
r, r* : Result of a data processing
d
Attacking
service B
Attacking
service B
Shared
service C
Service A
Service B
Covert Channels
Automatic detection of all cover channels is impossible (Wang and Ju, 2006)
Covert channels may be unknown and lead to a failure Fault isolation
6Sven Wohlgemuth <wohlgemuth@nii.ac.jp> On Resilient Computing
III. Isolation Mechanisms
Mechanisms &
Methods
Policies
• Bell-LaPadula, Chinese Wall
• BiBa, Clark-Wilson
• Role-based access control
• Optimistic Security
• APPLE
• Obligation Specification Language (OSL)
• Extended Privacy Definition Tools
(ExPDT)
• Testing
• Simulation
• Model checking
• Security engineering
• Non-linkable Delegation of
Rights
• Monitors
• Virtualization
• Privacy-enhancing technologies
• Verifiable homomorphic encryption
• Secure data aggregation
• Certified security patterns
• Vulnerability analysis
• Model checking
• Penetration testing
• Process Rewriting
• Software patches
Fault acceptanceFault avoidance
7Sven Wohlgemuth <wohlgemuth@nii.ac.jp> On Resilient Computing
Fault tolerance
Fault
forecasting
Fault
prevention
Fault removal
• Forensics
• Process mining
• Data provenance
• Redundancy
• Consensus protocols
• Recovery-oriented computing
Consensus and Adaptation
Objective: Majority on correct data (sensor data, computation result)
S4
S5
S6
Sj
Sl
Monitor
d1
d2
d3
d1, d2, d3
d1, d2, d3
Sk
Consensus protocols and malicious faults:
• Synchronous communication:
• Asynchronous communication: Consensus not possible if one process fails
• But: Bears risk of failure due to non-availability of data
• Tolerates t < n/3 faulty processes, with authenticated messages: t < n
dcorrect = (d1=d2=d3), (d1=d2), (d1=d3) OR (d2=d3)
?
Cachin et al. 2011
8Sven Wohlgemuth <wohlgemuth@nii.ac.jp> On Resilient Computing
Challenge: Correct data processing in spite of covert channels
Fulfilled safety (correct) properties
Fulfilled liveness (adaptation) properties
Expected risk of failure
Error rate0% 100%
The Error rate represents the probability
of faulty services of a system according to its
specification
Safety Liveness
5On Resilient ComputingSven Wohlgemuth <wohlgemuth@nii.ac.jp>
IV. Resilient Computing
Challenge: Correct data processing in spite of covert channels
Error rate0% 100%
CriticalBrittleBrittleCritical
Fulfilled safety (correct) properties
Fulfilled liveness (adaptation) properties
Expected risk of failure
Safety Liveness
5On Resilient Computing
Failure due to safety
High capability of correct data
processing
Few on demand data
processing
Sven Wohlgemuth <wohlgemuth@nii.ac.jp>
IV. Resilient Computing
Failure due to liveness
Low capability
on correct data processing
High on demand data
processing
Challenge: Correct data processing in spite of covert channels
Error rate0% 100%
CriticalBrittleBrittleCritical
Fulfilled safety (correct) properties
Fulfilled liveness (adaptation) properties
Expected risk of failure
Safety Liveness
5On Resilient ComputingSven Wohlgemuth <wohlgemuth@nii.ac.jp>
IV. Resilient Computing
Acceptable states
Acceptable correctness of
data processing
Acceptable on demand
data processing
Challenge: Correct data processing in spite of covert channels
Error rate0% 100%
CriticalBrittleBrittleCritical
Fulfilled safety (correct) properties
Fulfilled liveness (adaptation) properties
Expected risk of failure
Safety Liveness
5On Resilient ComputingSven Wohlgemuth <wohlgemuth@nii.ac.jp>
IV. Resilient Computing
Generate Evidences
S4
S5
S6
Sj Sk
Sl
Risk Assessment with
Uncertainty
Usage Control Policy Select Services
S4
S5
S6
Sj Sk
Sl
De-Select Services
S4
S5
S6
Sj Sk
Sl
Security Architecture for Resilient Computing
10Sven Wohlgemuth <wohlgemuth@nii.ac.jp> On Resilient Computing
Generate Evidences
S4
S5
S6
Sj Sk
Sl
Risk Assessment with
Uncertainty
Usage Control Policy Select Services
S4
S5
S6
Sj Sk
Sl
De-Select Services
S4
S5
S6
Sj Sk
Sl
Preliminary work: DREISAM (Delegation of Rights) & DETECTIVE (Data Provenance)
Security Architecture for Resilient Computing
10Sven Wohlgemuth <wohlgemuth@nii.ac.jp> On Resilient Computing
Ad

Recommended

IoTSuite: A Framework to Design, Implement, and Deploy IoT Applications
IoTSuite: A Framework to Design, Implement, and Deploy IoT Applications
Pankesh Patel
 
IoT Levels and Deployment Templates
IoT Levels and Deployment Templates
Prakash Honnur
 
Improve Product Design with High Quality Requirements
Improve Product Design with High Quality Requirements
Elizabeth Steiner
 
Introduction to IoT
Introduction to IoT
Selvaraj Seerangan
 
Binary Division Algorithms based on Vedic Mathematics: A Review
Binary Division Algorithms based on Vedic Mathematics: A Review
IJEEE
 
Chapter 1 pdf
Chapter 1 pdf
ChAnushaECE
 
Lecture 5
Lecture 5
vishal choudhary
 
BDCAM: big data for context-aware Monitoring
BDCAM: big data for context-aware Monitoring
kitechsolutions
 
A tool suite for prototyping internet of things applications
A tool suite for prototyping internet of things applications
Pankesh Patel
 
“Case Study: Facial Detection and Recognition for Always-On Applications,” a ...
“Case Study: Facial Detection and Recognition for Always-On Applications,” a ...
Edge AI and Vision Alliance
 
Enabling high level application development for internet of things
Enabling high level application development for internet of things
Pankesh Patel
 
WiRoTip: an IoT-based Wireless Sensor Network for Water Pipeline Monitoring
WiRoTip: an IoT-based Wireless Sensor Network for Water Pipeline Monitoring
IJECEIAES
 
IOT
IOT
Aashiq Ahamed N
 
Wireless Data Processing System for IoT-Enabled Devices
Wireless Data Processing System for IoT-Enabled Devices
EliDuggan
 
iThings-2012, Besançon, France, 20 November, 2012
iThings-2012, Besançon, France, 20 November, 2012
Charith Perera
 
Cluster-based Wireless Sensor Network (WSN) Methods for Secure and Efficient ...
Cluster-based Wireless Sensor Network (WSN) Methods for Secure and Efficient ...
Swapnil Jagtap
 
IoT Application Testing - Complexities & Challenges
IoT Application Testing - Complexities & Challenges
SatyaKVivek
 
Edge computing and its role in architecting IoT
Edge computing and its role in architecting IoT
Kiran Kumar Pattanaik
 
K luo bera_poster
K luo bera_poster
lkcozy
 
Speeding Up Resting State Networks Recognition via a Hardware Accelerator
Speeding Up Resting State Networks Recognition via a Hardware Accelerator
NECST Lab @ Politecnico di Milano
 
Internet of Things and i's Applications
Internet of Things and i's Applications
Aakashjit Bhattacharya
 
IoT malware network traffic classification using visual representation and d...
IoT malware network traffic classification using visual representation and d...
Aboul Ella Hassanien
 
Is Your Software Development Process Green?
Is Your Software Development Process Green?
Förderverein Technische Fakultät
 
Connect Arduino to PubNub cloud slides by UI5CN webinar Part 1
Connect Arduino to PubNub cloud slides by UI5CN webinar Part 1
AJAY NAYAK
 
IRJET- An Efficient Model for Detecting and Identifying Cyber Attacks in Wire...
IRJET- An Efficient Model for Detecting and Identifying Cyber Attacks in Wire...
IRJET Journal
 
Sensor Cloud
Sensor Cloud
Debjyoti Ghosh
 
Bridging the Industrial IoT Gap
Bridging the Industrial IoT Gap
John Speck
 
On detecting and identifying faulty internet of things devices and outages
On detecting and identifying faulty internet of things devices and outages
journalBEEI
 
IoT Architecture Layers of IoT and Role of Edge Devices and Gateways.pptx
IoT Architecture Layers of IoT and Role of Edge Devices and Gateways.pptx
daisyloumontante1
 
Cps security bitsworkshopdec15.2012 (1)
Cps security bitsworkshopdec15.2012 (1)
shanshicn
 

More Related Content

What's hot (20)

A tool suite for prototyping internet of things applications
A tool suite for prototyping internet of things applications
Pankesh Patel
 
“Case Study: Facial Detection and Recognition for Always-On Applications,” a ...
“Case Study: Facial Detection and Recognition for Always-On Applications,” a ...
Edge AI and Vision Alliance
 
Enabling high level application development for internet of things
Enabling high level application development for internet of things
Pankesh Patel
 
WiRoTip: an IoT-based Wireless Sensor Network for Water Pipeline Monitoring
WiRoTip: an IoT-based Wireless Sensor Network for Water Pipeline Monitoring
IJECEIAES
 
IOT
IOT
Aashiq Ahamed N
 
Wireless Data Processing System for IoT-Enabled Devices
Wireless Data Processing System for IoT-Enabled Devices
EliDuggan
 
iThings-2012, Besançon, France, 20 November, 2012
iThings-2012, Besançon, France, 20 November, 2012
Charith Perera
 
Cluster-based Wireless Sensor Network (WSN) Methods for Secure and Efficient ...
Cluster-based Wireless Sensor Network (WSN) Methods for Secure and Efficient ...
Swapnil Jagtap
 
IoT Application Testing - Complexities & Challenges
IoT Application Testing - Complexities & Challenges
SatyaKVivek
 
Edge computing and its role in architecting IoT
Edge computing and its role in architecting IoT
Kiran Kumar Pattanaik
 
K luo bera_poster
K luo bera_poster
lkcozy
 
Speeding Up Resting State Networks Recognition via a Hardware Accelerator
Speeding Up Resting State Networks Recognition via a Hardware Accelerator
NECST Lab @ Politecnico di Milano
 
Internet of Things and i's Applications
Internet of Things and i's Applications
Aakashjit Bhattacharya
 
IoT malware network traffic classification using visual representation and d...
IoT malware network traffic classification using visual representation and d...
Aboul Ella Hassanien
 
Is Your Software Development Process Green?
Is Your Software Development Process Green?
Förderverein Technische Fakultät
 
Connect Arduino to PubNub cloud slides by UI5CN webinar Part 1
Connect Arduino to PubNub cloud slides by UI5CN webinar Part 1
AJAY NAYAK
 
IRJET- An Efficient Model for Detecting and Identifying Cyber Attacks in Wire...
IRJET- An Efficient Model for Detecting and Identifying Cyber Attacks in Wire...
IRJET Journal
 
Sensor Cloud
Sensor Cloud
Debjyoti Ghosh
 
Bridging the Industrial IoT Gap
Bridging the Industrial IoT Gap
John Speck
 
On detecting and identifying faulty internet of things devices and outages
On detecting and identifying faulty internet of things devices and outages
journalBEEI
 
A tool suite for prototyping internet of things applications
A tool suite for prototyping internet of things applications
Pankesh Patel
 
“Case Study: Facial Detection and Recognition for Always-On Applications,” a ...
“Case Study: Facial Detection and Recognition for Always-On Applications,” a ...
Edge AI and Vision Alliance
 
Enabling high level application development for internet of things
Enabling high level application development for internet of things
Pankesh Patel
 
WiRoTip: an IoT-based Wireless Sensor Network for Water Pipeline Monitoring
WiRoTip: an IoT-based Wireless Sensor Network for Water Pipeline Monitoring
IJECEIAES
 
Wireless Data Processing System for IoT-Enabled Devices
Wireless Data Processing System for IoT-Enabled Devices
EliDuggan
 
iThings-2012, Besançon, France, 20 November, 2012
iThings-2012, Besançon, France, 20 November, 2012
Charith Perera
 
Cluster-based Wireless Sensor Network (WSN) Methods for Secure and Efficient ...
Cluster-based Wireless Sensor Network (WSN) Methods for Secure and Efficient ...
Swapnil Jagtap
 
IoT Application Testing - Complexities & Challenges
IoT Application Testing - Complexities & Challenges
SatyaKVivek
 
Edge computing and its role in architecting IoT
Edge computing and its role in architecting IoT
Kiran Kumar Pattanaik
 
K luo bera_poster
K luo bera_poster
lkcozy
 
Speeding Up Resting State Networks Recognition via a Hardware Accelerator
Speeding Up Resting State Networks Recognition via a Hardware Accelerator
NECST Lab @ Politecnico di Milano
 
Internet of Things and i's Applications
Internet of Things and i's Applications
Aakashjit Bhattacharya
 
IoT malware network traffic classification using visual representation and d...
IoT malware network traffic classification using visual representation and d...
Aboul Ella Hassanien
 
Connect Arduino to PubNub cloud slides by UI5CN webinar Part 1
Connect Arduino to PubNub cloud slides by UI5CN webinar Part 1
AJAY NAYAK
 
IRJET- An Efficient Model for Detecting and Identifying Cyber Attacks in Wire...
IRJET- An Efficient Model for Detecting and Identifying Cyber Attacks in Wire...
IRJET Journal
 
Bridging the Industrial IoT Gap
Bridging the Industrial IoT Gap
John Speck
 
On detecting and identifying faulty internet of things devices and outages
On detecting and identifying faulty internet of things devices and outages
journalBEEI
 

Similar to On Resilient Computing (20)

IoT Architecture Layers of IoT and Role of Edge Devices and Gateways.pptx
IoT Architecture Layers of IoT and Role of Edge Devices and Gateways.pptx
daisyloumontante1
 
Cps security bitsworkshopdec15.2012 (1)
Cps security bitsworkshopdec15.2012 (1)
shanshicn
 
CPSSecurityBITSWorkshopDec15.2012 (1).pptx
CPSSecurityBITSWorkshopDec15.2012 (1).pptx
MahendraShukla27
 
Will Internet of Things (IoT) be secure enough?
Will Internet of Things (IoT) be secure enough?
Ravindra Dastikop
 
Io t security defense in depth charles li v1 20180425c
Io t security defense in depth charles li v1 20180425c
Charles Li
 
Iot cyber security
Iot cyber security
sajid mehmood
 
Lightweight Cryptography Algorithms for Security of IoT Devices: A Survey
Lightweight Cryptography Algorithms for Security of IoT Devices: A Survey
IRJET Journal
 
Cyber Security in Railways Systems, Ansaldo STS experience
Cyber Security in Railways Systems, Ansaldo STS experience
Community Protection Forum
 
Ansaldo STS at CPExpo 2013: "Risks and Security Management in Logistics and ...
Ansaldo STS at CPExpo 2013: "Risks and Security Management in Logistics and ...
Leonardo
 
IMPLEMENTATION OF IDS (INTRUDER DETECTION SYSTEM)
IMPLEMENTATION OF IDS (INTRUDER DETECTION SYSTEM)
IRJET Journal
 
Module_I.pptxadsdDSSSSSSSSSSSSSSSSUGGGGGGGGGGGGG
Module_I.pptxadsdDSSSSSSSSSSSSSSSSUGGGGGGGGGGGGG
vedantshrivastava286
 
DTS Solution - ISACA UAE Chapter - ISAFE 2014 - RU PWNED - Living a Life as a...
DTS Solution - ISACA UAE Chapter - ISAFE 2014 - RU PWNED - Living a Life as a...
Shah Sheikh
 
Digital Twin ppt-2 (2).pptx
Digital Twin ppt-2 (2).pptx
Vinay Ms
 
IRJET- Authentication and Context Awareness Access Control in Internet of Things
IRJET- Authentication and Context Awareness Access Control in Internet of Things
IRJET Journal
 
Securing Critical Infrastructures with a cybersecurity digital twin
Securing Critical Infrastructures with a cybersecurity digital twin
Massimiliano Masi
 
Integrating Wireless Sensor Network into Cloud Services for Real-time Data Co...
Integrating Wireless Sensor Network into Cloud Services for Real-time Data Co...
Mokpo National University
 
IRJET - Bridge Monitoring System using IoT
IRJET - Bridge Monitoring System using IoT
IRJET Journal
 
IoT Unit 4.pptx Internet OF things chapter 4
IoT Unit 4.pptx Internet OF things chapter 4
NimuShah
 
seminar ppt.pptx
seminar ppt.pptx
SuprithC2
 
Ch7 Data Transmission in Smart City, Summer Cours, AUST 2015
Ch7 Data Transmission in Smart City, Summer Cours, AUST 2015
Isam Shahrour
 
IoT Architecture Layers of IoT and Role of Edge Devices and Gateways.pptx
IoT Architecture Layers of IoT and Role of Edge Devices and Gateways.pptx
daisyloumontante1
 
Cps security bitsworkshopdec15.2012 (1)
Cps security bitsworkshopdec15.2012 (1)
shanshicn
 
CPSSecurityBITSWorkshopDec15.2012 (1).pptx
CPSSecurityBITSWorkshopDec15.2012 (1).pptx
MahendraShukla27
 
Will Internet of Things (IoT) be secure enough?
Will Internet of Things (IoT) be secure enough?
Ravindra Dastikop
 
Io t security defense in depth charles li v1 20180425c
Io t security defense in depth charles li v1 20180425c
Charles Li
 
Lightweight Cryptography Algorithms for Security of IoT Devices: A Survey
Lightweight Cryptography Algorithms for Security of IoT Devices: A Survey
IRJET Journal
 
Cyber Security in Railways Systems, Ansaldo STS experience
Cyber Security in Railways Systems, Ansaldo STS experience
Community Protection Forum
 
Ansaldo STS at CPExpo 2013: "Risks and Security Management in Logistics and ...
Ansaldo STS at CPExpo 2013: "Risks and Security Management in Logistics and ...
Leonardo
 
IMPLEMENTATION OF IDS (INTRUDER DETECTION SYSTEM)
IMPLEMENTATION OF IDS (INTRUDER DETECTION SYSTEM)
IRJET Journal
 
Module_I.pptxadsdDSSSSSSSSSSSSSSSSUGGGGGGGGGGGGG
Module_I.pptxadsdDSSSSSSSSSSSSSSSSUGGGGGGGGGGGGG
vedantshrivastava286
 
DTS Solution - ISACA UAE Chapter - ISAFE 2014 - RU PWNED - Living a Life as a...
DTS Solution - ISACA UAE Chapter - ISAFE 2014 - RU PWNED - Living a Life as a...
Shah Sheikh
 
Digital Twin ppt-2 (2).pptx
Digital Twin ppt-2 (2).pptx
Vinay Ms
 
IRJET- Authentication and Context Awareness Access Control in Internet of Things
IRJET- Authentication and Context Awareness Access Control in Internet of Things
IRJET Journal
 
Securing Critical Infrastructures with a cybersecurity digital twin
Securing Critical Infrastructures with a cybersecurity digital twin
Massimiliano Masi
 
Integrating Wireless Sensor Network into Cloud Services for Real-time Data Co...
Integrating Wireless Sensor Network into Cloud Services for Real-time Data Co...
Mokpo National University
 
IRJET - Bridge Monitoring System using IoT
IRJET - Bridge Monitoring System using IoT
IRJET Journal
 
IoT Unit 4.pptx Internet OF things chapter 4
IoT Unit 4.pptx Internet OF things chapter 4
NimuShah
 
seminar ppt.pptx
seminar ppt.pptx
SuprithC2
 
Ch7 Data Transmission in Smart City, Summer Cours, AUST 2015
Ch7 Data Transmission in Smart City, Summer Cours, AUST 2015
Isam Shahrour
 
Ad

More from Sven Wohlgemuth (20)

A Secure Decision-Support Scheme for Self-Sovereign Identity Management
A Secure Decision-Support Scheme for Self-Sovereign Identity Management
Sven Wohlgemuth
 
Competitive Compliance with Blockchain
Competitive Compliance with Blockchain
Sven Wohlgemuth
 
Secure Sharing of Design Information with Blockchains
Secure Sharing of Design Information with Blockchains
Sven Wohlgemuth
 
個人情報の有効活用を可能にする (Enabling effective use of personal information)
個人情報の有効活用を可能にする (Enabling effective use of personal information)
Sven Wohlgemuth
 
Tagging Disclosure of Personal Data to Third Parties to Preserve Privacy
Tagging Disclosure of Personal Data to Third Parties to Preserve Privacy
Sven Wohlgemuth
 
Privacy-Enhancing Trust Infrastructure for Process Mining
Privacy-Enhancing Trust Infrastructure for Process Mining
Sven Wohlgemuth
 
EN 6.3: 4 Kryptographie
EN 6.3: 4 Kryptographie
Sven Wohlgemuth
 
EN 6.3: 3 Sicherheitsmodelle
EN 6.3: 3 Sicherheitsmodelle
Sven Wohlgemuth
 
Privacy in Business Processes by User-Centric Identity Management
Privacy in Business Processes by User-Centric Identity Management
Sven Wohlgemuth
 
WP14 Workshop "From Data Economy to Secure Logging as a Step towards Transpar...
WP14 Workshop "From Data Economy to Secure Logging as a Step towards Transpar...
Sven Wohlgemuth
 
Privacy in e-Health
Privacy in e-Health
Sven Wohlgemuth
 
On Privacy in Medical Services with Electronic Health Records
On Privacy in Medical Services with Electronic Health Records
Sven Wohlgemuth
 
EN 6.3: 2 IT-Compliance und IT-Sicherheitsmanagement
EN 6.3: 2 IT-Compliance und IT-Sicherheitsmanagement
Sven Wohlgemuth
 
EN 6.3: 1 IT-Sicherheit und Technischer Datenschutz
EN 6.3: 1 IT-Sicherheit und Technischer Datenschutz
Sven Wohlgemuth
 
Privacy with Secondary Use of Personal Information
Privacy with Secondary Use of Personal Information
Sven Wohlgemuth
 
International Workshop on Information Systems for Social Innovation (ISSI) 2009
International Workshop on Information Systems for Social Innovation (ISSI) 2009
Sven Wohlgemuth
 
Durchsetzung von Privacy Policies in Dienstenetzen
Durchsetzung von Privacy Policies in Dienstenetzen
Sven Wohlgemuth
 
Privacy in Business Processes by User-Centric Identity Management
Privacy in Business Processes by User-Centric Identity Management
Sven Wohlgemuth
 
Privacy in Business Processes by Identity Management
Privacy in Business Processes by Identity Management
Sven Wohlgemuth
 
Schlüsselverwaltung - Objektorientierter Entwurf und Implementierung
Schlüsselverwaltung - Objektorientierter Entwurf und Implementierung
Sven Wohlgemuth
 
A Secure Decision-Support Scheme for Self-Sovereign Identity Management
A Secure Decision-Support Scheme for Self-Sovereign Identity Management
Sven Wohlgemuth
 
Competitive Compliance with Blockchain
Competitive Compliance with Blockchain
Sven Wohlgemuth
 
Secure Sharing of Design Information with Blockchains
Secure Sharing of Design Information with Blockchains
Sven Wohlgemuth
 
個人情報の有効活用を可能にする (Enabling effective use of personal information)
個人情報の有効活用を可能にする (Enabling effective use of personal information)
Sven Wohlgemuth
 
Tagging Disclosure of Personal Data to Third Parties to Preserve Privacy
Tagging Disclosure of Personal Data to Third Parties to Preserve Privacy
Sven Wohlgemuth
 
Privacy-Enhancing Trust Infrastructure for Process Mining
Privacy-Enhancing Trust Infrastructure for Process Mining
Sven Wohlgemuth
 
EN 6.3: 3 Sicherheitsmodelle
EN 6.3: 3 Sicherheitsmodelle
Sven Wohlgemuth
 
Privacy in Business Processes by User-Centric Identity Management
Privacy in Business Processes by User-Centric Identity Management
Sven Wohlgemuth
 
WP14 Workshop "From Data Economy to Secure Logging as a Step towards Transpar...
WP14 Workshop "From Data Economy to Secure Logging as a Step towards Transpar...
Sven Wohlgemuth
 
On Privacy in Medical Services with Electronic Health Records
On Privacy in Medical Services with Electronic Health Records
Sven Wohlgemuth
 
EN 6.3: 2 IT-Compliance und IT-Sicherheitsmanagement
EN 6.3: 2 IT-Compliance und IT-Sicherheitsmanagement
Sven Wohlgemuth
 
EN 6.3: 1 IT-Sicherheit und Technischer Datenschutz
EN 6.3: 1 IT-Sicherheit und Technischer Datenschutz
Sven Wohlgemuth
 
Privacy with Secondary Use of Personal Information
Privacy with Secondary Use of Personal Information
Sven Wohlgemuth
 
International Workshop on Information Systems for Social Innovation (ISSI) 2009
International Workshop on Information Systems for Social Innovation (ISSI) 2009
Sven Wohlgemuth
 
Durchsetzung von Privacy Policies in Dienstenetzen
Durchsetzung von Privacy Policies in Dienstenetzen
Sven Wohlgemuth
 
Privacy in Business Processes by User-Centric Identity Management
Privacy in Business Processes by User-Centric Identity Management
Sven Wohlgemuth
 
Privacy in Business Processes by Identity Management
Privacy in Business Processes by Identity Management
Sven Wohlgemuth
 
Schlüsselverwaltung - Objektorientierter Entwurf und Implementierung
Schlüsselverwaltung - Objektorientierter Entwurf und Implementierung
Sven Wohlgemuth
 
Ad

Recently uploaded (20)

ChatGPT_and_Its_Uses_Presentationss.pptx
ChatGPT_and_Its_Uses_Presentationss.pptx
Neha Prakash
 
BitRecover OST to PST Converter Software
BitRecover OST to PST Converter Software
antoniogosling01
 
Topic 2 - Cloud Computing Basics,,,.pptx
Topic 2 - Cloud Computing Basics,,,.pptx
oneillp100
 
IAREUOUSTPIDWHY$)CHARACTERARERWUEEJJSKWNSND
IAREUOUSTPIDWHY$)CHARACTERARERWUEEJJSKWNSND
notgachabite123
 
原版一样(ISM毕业证书)德国多特蒙德国际管理学院毕业证多少钱
原版一样(ISM毕业证书)德国多特蒙德国际管理学院毕业证多少钱
taqyed
 
inside the internet - understanding the TCP/IP protocol
inside the internet - understanding the TCP/IP protocol
shainweniton02
 
BASICS OF SAP _ ALL ABOUT SAP _WHY SAP OVER ANY OTHER ERP SYSTEM
BASICS OF SAP _ ALL ABOUT SAP _WHY SAP OVER ANY OTHER ERP SYSTEM
AhmadAli716831
 
The ARUBA Kind of new Proposal Umum .pptx
The ARUBA Kind of new Proposal Umum .pptx
andiwarneri
 
Transmission Control Protocol (TCP) and Starlink
Transmission Control Protocol (TCP) and Starlink
APNIC
 
TCP/IP presentation SET2- Information Systems
TCP/IP presentation SET2- Information Systems
agnesegtcagliero
 
原版澳洲斯文本科技大学毕业证(SUT毕业证书)如何办理
原版澳洲斯文本科技大学毕业证(SUT毕业证书)如何办理
taqyed
 
B M Mostofa Kamal Al-Azad [Document & Localization Expert]
B M Mostofa Kamal Al-Azad [Document & Localization Expert]
Mostofa Kamal Al-Azad
 
Pitch PitchPitchPitchPitchPitchPitch.pptx
Pitch PitchPitchPitchPitchPitchPitch.pptx
157551
 
最新版美国特拉华大学毕业证(UDel毕业证书)原版定制
最新版美国特拉华大学毕业证(UDel毕业证书)原版定制
taqyea
 
ChatGPT A.I. Powered Chatbot and Popularization.pdf
ChatGPT A.I. Powered Chatbot and Popularization.pdf
StanleySamson1
 
Lecture 3.1 Analysing the Global Business Environment .pptx
Lecture 3.1 Analysing the Global Business Environment .pptx
shofalbsb
 
Topic 1 Foundational IT Infrastructure_.pptx
Topic 1 Foundational IT Infrastructure_.pptx
oneillp100
 
最新版加拿大奎斯特大学毕业证(QUC毕业证书)原版定制
最新版加拿大奎斯特大学毕业证(QUC毕业证书)原版定制
taqyed
 
PROCESS FOR CREATION OF BUSINESS PARTNER IN SAP
PROCESS FOR CREATION OF BUSINESS PARTNER IN SAP
AhmadAli716831
 
Almos Entirely Correct Mixing with Apps to Voting
Almos Entirely Correct Mixing with Apps to Voting
gapati2964
 
ChatGPT_and_Its_Uses_Presentationss.pptx
ChatGPT_and_Its_Uses_Presentationss.pptx
Neha Prakash
 
BitRecover OST to PST Converter Software
BitRecover OST to PST Converter Software
antoniogosling01
 
Topic 2 - Cloud Computing Basics,,,.pptx
Topic 2 - Cloud Computing Basics,,,.pptx
oneillp100
 
IAREUOUSTPIDWHY$)CHARACTERARERWUEEJJSKWNSND
IAREUOUSTPIDWHY$)CHARACTERARERWUEEJJSKWNSND
notgachabite123
 
原版一样(ISM毕业证书)德国多特蒙德国际管理学院毕业证多少钱
原版一样(ISM毕业证书)德国多特蒙德国际管理学院毕业证多少钱
taqyed
 
inside the internet - understanding the TCP/IP protocol
inside the internet - understanding the TCP/IP protocol
shainweniton02
 
BASICS OF SAP _ ALL ABOUT SAP _WHY SAP OVER ANY OTHER ERP SYSTEM
BASICS OF SAP _ ALL ABOUT SAP _WHY SAP OVER ANY OTHER ERP SYSTEM
AhmadAli716831
 
The ARUBA Kind of new Proposal Umum .pptx
The ARUBA Kind of new Proposal Umum .pptx
andiwarneri
 
Transmission Control Protocol (TCP) and Starlink
Transmission Control Protocol (TCP) and Starlink
APNIC
 
TCP/IP presentation SET2- Information Systems
TCP/IP presentation SET2- Information Systems
agnesegtcagliero
 
原版澳洲斯文本科技大学毕业证(SUT毕业证书)如何办理
原版澳洲斯文本科技大学毕业证(SUT毕业证书)如何办理
taqyed
 
B M Mostofa Kamal Al-Azad [Document & Localization Expert]
B M Mostofa Kamal Al-Azad [Document & Localization Expert]
Mostofa Kamal Al-Azad
 
Pitch PitchPitchPitchPitchPitchPitch.pptx
Pitch PitchPitchPitchPitchPitchPitch.pptx
157551
 
最新版美国特拉华大学毕业证(UDel毕业证书)原版定制
最新版美国特拉华大学毕业证(UDel毕业证书)原版定制
taqyea
 
ChatGPT A.I. Powered Chatbot and Popularization.pdf
ChatGPT A.I. Powered Chatbot and Popularization.pdf
StanleySamson1
 
Lecture 3.1 Analysing the Global Business Environment .pptx
Lecture 3.1 Analysing the Global Business Environment .pptx
shofalbsb
 
Topic 1 Foundational IT Infrastructure_.pptx
Topic 1 Foundational IT Infrastructure_.pptx
oneillp100
 
最新版加拿大奎斯特大学毕业证(QUC毕业证书)原版定制
最新版加拿大奎斯特大学毕业证(QUC毕业证书)原版定制
taqyed
 
PROCESS FOR CREATION OF BUSINESS PARTNER IN SAP
PROCESS FOR CREATION OF BUSINESS PARTNER IN SAP
AhmadAli716831
 
Almos Entirely Correct Mixing with Apps to Voting
Almos Entirely Correct Mixing with Apps to Voting
gapati2964
 

On Resilient Computing

  • 1. On Resilient Computing ISSI 2011, Tokyo, Japan February 16, 2012 Sven Wohlgemuth Transdisciplinary Research Integration Center National Institute of Informatics, Japan Research Organization for Information and Systems, Japan
  • 2. Agenda I. Social Infrastructures and ICT II. Adaptation and Interdependencies III. Isolation Mechanisms IV. Resilient Computing 2Sven Wohlgemuth <[email protected]> On Resilient Computing
  • 3. Sensor and controller ICT services I. Social Infrastructures and ICT Sensor and controller Workflows Energy supply Communication network ICT services S1 S2 S3 S4 Physical Cyber Function Event-driven S5 S6 S8 ... ... • ICT control systems implement functions of social infrastructures • Real-time processing of context data and controlling location • Centralized control • Operated by public or private organizations 3Sven Wohlgemuth <[email protected]> On Resilient Computing
  • 4. Sensor and controller ICT services I. Social Infrastructures and ICT Sensor and controller Workflows Energy supply Communication network ICT services S1 S2 S3 S4 Physical Cyber Function Event-driven S5 S6 S8 ... ... • ICT control systems implement functions of social infrastructures • Real-time processing of context data and controlling location • Centralized control • Operated by public or private organizations Correctness threatened by crime, terrorism, and natural disasters 3Sven Wohlgemuth <[email protected]> On Resilient Computing
  • 5. Resilience and ICT • An affected resilient ICT system delivers at least correct critical services in a hostile environment (brittle) (Hollnagel et al., 2006) • Ability of an ICT system to provide and maintain an acceptable level of service in the face of various faults and challenges to normal operation (Sterbenz et al., 2010) • Persistence of dependability when facing changes (Laprie, 2008) Own illustration following (Sheffi, 2005; Günther et al., 2007; McNanus, 2009) 4Sven Wohlgemuth <[email protected]> On Resilient Computing
  • 6. II. Adaptation and Interdependencies Function Specification Service Sensor and controller ICT services d1 d2 c1 S1 S2 S3 S4 d1 d1, d1* d1. d2, ... c2 S4 Sn d1. d2, ... c2 d1 OS Sj Sk Si Data flows describe interdependenciesAdaptation of an ICT system 5Sven Wohlgemuth <[email protected]> On Resilient Computing
  • 7. Shared service C Shared service C Sensor Service A Actuator d r d Case (a) - Passive attack Sensor Service A Actuator d r* d* Case (b) - Active attack Sensor Actuator Case (c) - Non-availability Malicious interferences Non-malicious interference d, d* : Input data for a data processing : Shared used service r, r* : Result of a data processing d Attacking service B Attacking service B Shared service C Service A Service B Covert Channels Automatic detection of all cover channels is impossible (Wang and Ju, 2006) Covert channels may be unknown and lead to a failure Fault isolation 6Sven Wohlgemuth <[email protected]> On Resilient Computing
  • 8. III. Isolation Mechanisms Mechanisms & Methods Policies • Bell-LaPadula, Chinese Wall • BiBa, Clark-Wilson • Role-based access control • Optimistic Security • APPLE • Obligation Specification Language (OSL) • Extended Privacy Definition Tools (ExPDT) • Testing • Simulation • Model checking • Security engineering • Non-linkable Delegation of Rights • Monitors • Virtualization • Privacy-enhancing technologies • Verifiable homomorphic encryption • Secure data aggregation • Certified security patterns • Vulnerability analysis • Model checking • Penetration testing • Process Rewriting • Software patches Fault acceptanceFault avoidance 7Sven Wohlgemuth <[email protected]> On Resilient Computing Fault tolerance Fault forecasting Fault prevention Fault removal • Forensics • Process mining • Data provenance • Redundancy • Consensus protocols • Recovery-oriented computing
  • 9. Consensus and Adaptation Objective: Majority on correct data (sensor data, computation result) S4 S5 S6 Sj Sl Monitor d1 d2 d3 d1, d2, d3 d1, d2, d3 Sk Consensus protocols and malicious faults: • Synchronous communication: • Asynchronous communication: Consensus not possible if one process fails • But: Bears risk of failure due to non-availability of data • Tolerates t < n/3 faulty processes, with authenticated messages: t < n dcorrect = (d1=d2=d3), (d1=d2), (d1=d3) OR (d2=d3) ? Cachin et al. 2011 8Sven Wohlgemuth <[email protected]> On Resilient Computing
  • 10. Challenge: Correct data processing in spite of covert channels Fulfilled safety (correct) properties Fulfilled liveness (adaptation) properties Expected risk of failure Error rate0% 100% The Error rate represents the probability of faulty services of a system according to its specification Safety Liveness 5On Resilient ComputingSven Wohlgemuth <[email protected]> IV. Resilient Computing
  • 11. Challenge: Correct data processing in spite of covert channels Error rate0% 100% CriticalBrittleBrittleCritical Fulfilled safety (correct) properties Fulfilled liveness (adaptation) properties Expected risk of failure Safety Liveness 5On Resilient Computing Failure due to safety High capability of correct data processing Few on demand data processing Sven Wohlgemuth <[email protected]> IV. Resilient Computing
  • 12. Failure due to liveness Low capability on correct data processing High on demand data processing Challenge: Correct data processing in spite of covert channels Error rate0% 100% CriticalBrittleBrittleCritical Fulfilled safety (correct) properties Fulfilled liveness (adaptation) properties Expected risk of failure Safety Liveness 5On Resilient ComputingSven Wohlgemuth <[email protected]> IV. Resilient Computing
  • 13. Acceptable states Acceptable correctness of data processing Acceptable on demand data processing Challenge: Correct data processing in spite of covert channels Error rate0% 100% CriticalBrittleBrittleCritical Fulfilled safety (correct) properties Fulfilled liveness (adaptation) properties Expected risk of failure Safety Liveness 5On Resilient ComputingSven Wohlgemuth <[email protected]> IV. Resilient Computing
  • 14. Generate Evidences S4 S5 S6 Sj Sk Sl Risk Assessment with Uncertainty Usage Control Policy Select Services S4 S5 S6 Sj Sk Sl De-Select Services S4 S5 S6 Sj Sk Sl Security Architecture for Resilient Computing 10Sven Wohlgemuth <[email protected]> On Resilient Computing
  • 15. Generate Evidences S4 S5 S6 Sj Sk Sl Risk Assessment with Uncertainty Usage Control Policy Select Services S4 S5 S6 Sj Sk Sl De-Select Services S4 S5 S6 Sj Sk Sl Preliminary work: DREISAM (Delegation of Rights) & DETECTIVE (Data Provenance) Security Architecture for Resilient Computing 10Sven Wohlgemuth <[email protected]> On Resilient Computing