SlideShare uma empresa Scribd logo
1 de 22
Baixar para ler offline
SeaCat: an SDN End-to-end Application
Containment ArchitecTure
Enabling Secure Role Based Access To Sensitive Healthcare Data
Junguk Cho, David Johnson, Makito Kano,
Kobus Van der Merwe and Brent Elieson
Motivation
• “Everything” is networked
– Nearly all business applications assume network
availability
• Also true in healthcare
– Accessing patient records
– Remote diagnoses and consultation
– In-home monitoring
– Healthcare analytics
– Plus “regular” vocational applications
• HR/payroll functions, accessing domain specific literature
– Plus non vocational use
• Browsing the web, social networking etc.
Motivation cont.
• Problem:
– Same individual, using same device potentially using
several of these applications simultaneously
– Applications have very different security and performance
constraints:
• Healthcare records: stringent regulatory privacy and security
requirements
• In-home patient monitoring: different privacy and security needs +
reliability and soft real time guarantees
• Web use: no impact on core healthcare applications
– Devices are increasingly mobile (tablets, laptops,
smartphones)
• Often not part of managed and trusted enterprise environment
Motivation cont.
• Current approaches, combinations of:
– Device scans when new devices attach to network
– Run applications on application servers with thin clients on
devices
– Complex network and server access control policies
• Inadequate:
– Device with up-to-date patch levels might still contain
malware
– Application servers with thin clients constrain the type of
applications that can be used
– Access control policies only deal with access. Provide no
protection once data is accessed
Motivation cont.
• Problem generalizes to broad range of access to
sensitive data
• Different sets of regulations/practices
– Protected health information (PHI)
• HIPAA regulations
– Student educational records
• FERPA regulations
– Federal government work
• FISMA regulations
– Business requirements
• PCI DSS regulations
– Institutional requirements
• IRB regulations
SeaCat Approach
• Combine SDN and
application
containment:
– End-to-end application
containment
• Non-healthcare apps:
– default context
• Healthcare app:
– dynamic app specific
context
– app and data contained in
this end-to-end context
• Treat mobile device as
“semi-trusted” SDN
domain
– Inter-domain SDN
interaction to tie in
Threat Model
• Concerned with security and performance of health care
applications used from variety of devices in a health care
environment
• Assume healthcare applications can be trusted
– different from conventional threat model where device needs to be
protected against untrusted applications
• Specific concerns:
– Unauthorized access
• role based authentication and policies
– Data leakage
• end-to-end application containment
– Resource guarantees
• context based resource allocation with preemption
– Denial of service
• resource guarantees plus separation of resources
SeaCat Architecture:
Endpoint Containment
• Uses lightweight
containers
– Linux containers
• All applications execute
in containers:
– move “regular apps”
into default
container
• Minimize trusted
computing base:
– Only SeaCat Trusted
Daemon left in root
namespace
Motivation cont.
• Problem:
– Same individual, using same device potentially using
several of these applications simultaneously
– Applications have very different security and performance
constraints:
• Healthcare records: stringent regulatory privacy and security
requirements
• In-home patient monitoring: different privacy and security needs +
reliability and soft real time guarantees
• Web use: no impact on core healthcare applications
– Devices are increasingly mobile (tablets, laptops,
smartphones)
• Often not part of managed and trusted enterprise environment
SeaCat Architecture:
Endpoint Network Containment
• SeaCat Trusted
Daemon:
– Manages endpoint
SDN domain
• Single switch
domain:
– Sets up context for
default apps
– Sets up context for
secure apps: based
on interaction with
enterprise SDN
SeaCat Architecture:
Enterprise Network Containment
• SeaCat Server:
– Manages enterprise SDN domain
• Sets up context for secure apps
• Includes SDN-enabled WiFi
– Interacts with SeaCat trusted daemon in endpoint
• Instructs trusted daemon to start secure container
• Coordinates SDN across domains
SeaCat Architecture:
Putting it all together
• Enterprise network treats each mobile endpoint as semi-
trusted SDN domain
• Secure app user: authenticates using “normal” single-sign-on
(SSO) technology
– SeaCat server integrated with SSO
– Successful authentication triggers:
• Creation of app specific SDN context in enterprise
• Signaling to endpoint SDN to:
– Create secure container
– Create endpoint app specific SDN context
– Ties to enterprise SDN context
• App and data remains in this secure end-to-end context
• When app exits:
– Complete context is destroyed
SeaCat Workflow/Interaction
Motivation cont.
• Current approaches, combinations of:
– Device scans when new devices attach to network
– Run applications on application servers with thin clients on
devices
– Complex network and server access control policies
• Inadequate:
– Device with up-to-date patch levels might still contain
malware
– Application servers with thin clients constrain the type of
applications that can be used
– Access control policies only deal with access. Provide no
protection once data is accessed
SeaCat Workflow/Interaction
EHR
Server
Default Context
Other
Apps
Other
Apps
Other
Apps
Internet/
Non Healthcare
Resources
Mobile Endpoint
SeaCat
Enterprise/Campus
Network
SeaCat
SSO
Secure Context
1
2
SeaCat Workflow/Interaction
EHR
Server
Default Context
Other
Apps
Other
Apps
Other
Apps
Internet/
Non Healthcare
Resources
Mobile Endpoint
SeaCat
Enterprise/Campus
Network
SeaCat
SSO
Secure Context
3
SeaCat Workflow/Interaction
EHR
Server
Default Context
Other
Apps
Other
Apps
Other
Apps
Internet/
Non Healthcare
Resources
Mobile Endpoint
SeaCat
Enterprise/Campus
Network
SeaCat
SSO
Secure Context
4
5
SeaCat Workflow/Interaction
Motivation cont.
• Problem generalizes to broad range of access to
sensitive data
• Different sets of regulations/practices
– Protected health information (PHI)
• HIPAA regulations
– Student educational records
• FERPA regulations
– Federal government work
• FISMA regulations
– Business requirements
• PCI DSS regulations
– Institutional requirements
• IRB regulations
SeaCat Demo
• Mobile endpoint:
– Linux WiFi-enabled tablet
– With SeaCat Trusted Daemon:
• Container and SDN management
• Enterprise network:
– SDN enabled WiFi access point
• Tallac Networks
• Virtual APs
• Mapped to OpenFlow switch
– Rest of enterprise SDN emulated in a Mininet instance
• Single Sign On (SSO):
– Uses Shibboleth SSO
– SeaCat (Service Provider) to realize SeaCat functionality
• Medical application:
– OpenMRS (Medical Record System)
SeaCat Demo
WiFi AP
Emulated Network
HUB
Enterprise SDN Controller
VIF1
OVS
Other
Apps
Client tablet
lxc
VIF0
Ryu controller
DHCP
FLOW
MANAGER
ETH2
OVS
OpenMRS
server
SSO:
SeaCat
Service
ProviderSSO:
Identity
Provider
ETH3
H1
H2
H3
MININET
ETH0
Policy
VAP
Default
VAP
OVS
ETH0
ETH1
Wireless network
Real Ethernet network
Virtual Ethernet network
Trusted Daemon
LXC
CONTROLLER
OVS
CONTROLLER
Other
Server
H4
Enterprise/Campus Network
lxc
Status and plans
• Have working prototype…
• Current focus on access to electronic health
records
• SeaCat is a general application framework…
– other health care apps
– other apps that require access to sensitive data
• Interested in exploring possibility of trial
deployment…

Mais conteúdo relacionado

Mais procurados

Medical device security presentation - Frank Siepmann
Medical device security presentation - Frank SiepmannMedical device security presentation - Frank Siepmann
Medical device security presentation - Frank SiepmannFrank Siepmann
 
Best Practices for implementing Database Security Comprehensive Database Secu...
Best Practices for implementing Database Security Comprehensive Database Secu...Best Practices for implementing Database Security Comprehensive Database Secu...
Best Practices for implementing Database Security Comprehensive Database Secu...Kal BO
 
Reference Security Architecture for Mobility- Insurance
Reference Security Architecture for Mobility- InsuranceReference Security Architecture for Mobility- Insurance
Reference Security Architecture for Mobility- InsurancePriyanka Aash
 
Database Security Management
Database Security Management Database Security Management
Database Security Management Ahsin Yousaf
 
Cloud computing risks
Cloud computing risksCloud computing risks
Cloud computing riskssripriya78
 
Database Security Concepts | Introduction to Database Security
Database Security Concepts | Introduction to Database SecurityDatabase Security Concepts | Introduction to Database Security
Database Security Concepts | Introduction to Database SecurityRaj vardhan
 
Is iso 27001, an answer to security
Is iso 27001, an answer to securityIs iso 27001, an answer to security
Is iso 27001, an answer to securityRaghunath G
 
Computer Hacking Forensic Investigator - CHFI
Computer Hacking Forensic Investigator - CHFIComputer Hacking Forensic Investigator - CHFI
Computer Hacking Forensic Investigator - CHFIEC-Council
 
#MFSummit2016 Secure: How Security and Identity Analytics can Drive Adaptive ...
#MFSummit2016 Secure: How Security and Identity Analytics can Drive Adaptive ...#MFSummit2016 Secure: How Security and Identity Analytics can Drive Adaptive ...
#MFSummit2016 Secure: How Security and Identity Analytics can Drive Adaptive ...Micro Focus
 
Soc security-analytics
Soc security-analyticsSoc security-analytics
Soc security-analyticsbharti singhal
 
Soc security-analyticsof leotechnosoft
Soc security-analyticsof leotechnosoftSoc security-analyticsof leotechnosoft
Soc security-analyticsof leotechnosofthardik soni
 
Internet of Things - An Architectural Perspective
Internet of Things - An Architectural PerspectiveInternet of Things - An Architectural Perspective
Internet of Things - An Architectural PerspectiveGaurav Awasthi
 
Final Presentation
Final PresentationFinal Presentation
Final Presentationchris odle
 

Mais procurados (20)

Medical device security presentation - Frank Siepmann
Medical device security presentation - Frank SiepmannMedical device security presentation - Frank Siepmann
Medical device security presentation - Frank Siepmann
 
It security cognic_systems
It security cognic_systemsIt security cognic_systems
It security cognic_systems
 
Best Practices for implementing Database Security Comprehensive Database Secu...
Best Practices for implementing Database Security Comprehensive Database Secu...Best Practices for implementing Database Security Comprehensive Database Secu...
Best Practices for implementing Database Security Comprehensive Database Secu...
 
Reference Security Architecture for Mobility- Insurance
Reference Security Architecture for Mobility- InsuranceReference Security Architecture for Mobility- Insurance
Reference Security Architecture for Mobility- Insurance
 
Database security
Database securityDatabase security
Database security
 
Database Security Management
Database Security Management Database Security Management
Database Security Management
 
Cloud computing risks
Cloud computing risksCloud computing risks
Cloud computing risks
 
Database Security Concepts | Introduction to Database Security
Database Security Concepts | Introduction to Database SecurityDatabase Security Concepts | Introduction to Database Security
Database Security Concepts | Introduction to Database Security
 
Is iso 27001, an answer to security
Is iso 27001, an answer to securityIs iso 27001, an answer to security
Is iso 27001, an answer to security
 
Data Security Explained
Data Security ExplainedData Security Explained
Data Security Explained
 
Computer Hacking Forensic Investigator - CHFI
Computer Hacking Forensic Investigator - CHFIComputer Hacking Forensic Investigator - CHFI
Computer Hacking Forensic Investigator - CHFI
 
#MFSummit2016 Secure: How Security and Identity Analytics can Drive Adaptive ...
#MFSummit2016 Secure: How Security and Identity Analytics can Drive Adaptive ...#MFSummit2016 Secure: How Security and Identity Analytics can Drive Adaptive ...
#MFSummit2016 Secure: How Security and Identity Analytics can Drive Adaptive ...
 
Soc security-analytics
Soc security-analyticsSoc security-analytics
Soc security-analytics
 
Brochure Imperva Vormetric
Brochure Imperva VormetricBrochure Imperva Vormetric
Brochure Imperva Vormetric
 
U nit 4
U nit 4U nit 4
U nit 4
 
Soc security-analyticsof leotechnosoft
Soc security-analyticsof leotechnosoftSoc security-analyticsof leotechnosoft
Soc security-analyticsof leotechnosoft
 
Internet of Things - An Architectural Perspective
Internet of Things - An Architectural PerspectiveInternet of Things - An Architectural Perspective
Internet of Things - An Architectural Perspective
 
Data security
Data securityData security
Data security
 
Database Security
Database SecurityDatabase Security
Database Security
 
Final Presentation
Final PresentationFinal Presentation
Final Presentation
 

Destaque

SecureDroid: An Android Security Framework Extension for Context-Aware policy...
SecureDroid: An Android Security Framework Extension for Context-Aware policy...SecureDroid: An Android Security Framework Extension for Context-Aware policy...
SecureDroid: An Android Security Framework Extension for Context-Aware policy...Giuseppe La Torre
 
Usability Assessment of a Context-Aware and Personality-Based Mobile Recommen...
Usability Assessment of a Context-Aware and Personality-Based Mobile Recommen...Usability Assessment of a Context-Aware and Personality-Based Mobile Recommen...
Usability Assessment of a Context-Aware and Personality-Based Mobile Recommen...Matthias Braunhofer
 
Ieee project-2014-2015-context-based-access-control-systems
Ieee project-2014-2015-context-based-access-control-systemsIeee project-2014-2015-context-based-access-control-systems
Ieee project-2014-2015-context-based-access-control-systemsSteph Cliche
 
Semantic security framework and context-aware role-based access control ontol...
Semantic security framework and context-aware role-based access control ontol...Semantic security framework and context-aware role-based access control ontol...
Semantic security framework and context-aware role-based access control ontol...Natalia Díaz Rodríguez
 
Con8819 context and risk aware access control any device any where - final
Con8819   context and risk aware access control any device any where - finalCon8819   context and risk aware access control any device any where - final
Con8819 context and risk aware access control any device any where - finalOracleIDM
 

Destaque (8)

ParaDrop
ParaDropParaDrop
ParaDrop
 
Access control
Access controlAccess control
Access control
 
Context-aware mobile messages
Context-aware mobile messagesContext-aware mobile messages
Context-aware mobile messages
 
SecureDroid: An Android Security Framework Extension for Context-Aware policy...
SecureDroid: An Android Security Framework Extension for Context-Aware policy...SecureDroid: An Android Security Framework Extension for Context-Aware policy...
SecureDroid: An Android Security Framework Extension for Context-Aware policy...
 
Usability Assessment of a Context-Aware and Personality-Based Mobile Recommen...
Usability Assessment of a Context-Aware and Personality-Based Mobile Recommen...Usability Assessment of a Context-Aware and Personality-Based Mobile Recommen...
Usability Assessment of a Context-Aware and Personality-Based Mobile Recommen...
 
Ieee project-2014-2015-context-based-access-control-systems
Ieee project-2014-2015-context-based-access-control-systemsIeee project-2014-2015-context-based-access-control-systems
Ieee project-2014-2015-context-based-access-control-systems
 
Semantic security framework and context-aware role-based access control ontol...
Semantic security framework and context-aware role-based access control ontol...Semantic security framework and context-aware role-based access control ontol...
Semantic security framework and context-aware role-based access control ontol...
 
Con8819 context and risk aware access control any device any where - final
Con8819   context and risk aware access control any device any where - finalCon8819   context and risk aware access control any device any where - final
Con8819 context and risk aware access control any device any where - final
 

Semelhante a SeaCat: SDN End-to-End Application Containment

BYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, WestBYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, WestJay McLaughlin
 
Embracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifyEmbracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifySumana Mehta
 
Cloud Security: A matter of trust?
Cloud Security: A matter of trust?Cloud Security: A matter of trust?
Cloud Security: A matter of trust?Mark Williams
 
Infosec policies to appsec standards ed final
Infosec policies to appsec standards   ed finalInfosec policies to appsec standards   ed final
Infosec policies to appsec standards ed finaleadams2330
 
Mobile Middleware and Mobility in the Enterprise - Yad Jaura, Marketing Manag...
Mobile Middleware and Mobility in the Enterprise - Yad Jaura, Marketing Manag...Mobile Middleware and Mobility in the Enterprise - Yad Jaura, Marketing Manag...
Mobile Middleware and Mobility in the Enterprise - Yad Jaura, Marketing Manag...mfrancis
 
Security and Compliance for Enterprise Cloud Infrastructure
Security and Compliance for Enterprise Cloud InfrastructureSecurity and Compliance for Enterprise Cloud Infrastructure
Security and Compliance for Enterprise Cloud InfrastructureCloudPassage
 
Regulatory Intelligence
Regulatory IntelligenceRegulatory Intelligence
Regulatory IntelligenceArmin Torres
 
Bringing Government and Enterprise Security Controls to the Android Endpoint
Bringing Government and Enterprise Security Controls to the Android EndpointBringing Government and Enterprise Security Controls to the Android Endpoint
Bringing Government and Enterprise Security Controls to the Android EndpointHamilton Turner
 
Dealing with Web Application Security, Regulation Style
Dealing with Web Application Security, Regulation StyleDealing with Web Application Security, Regulation Style
Dealing with Web Application Security, Regulation StyleRochester Security Summit
 
2015 Angelbeat_ConvergenceMsg-FINAL
2015 Angelbeat_ConvergenceMsg-FINAL2015 Angelbeat_ConvergenceMsg-FINAL
2015 Angelbeat_ConvergenceMsg-FINALRick Kingsley
 
NTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon Swain
NTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon SwainNTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon Swain
NTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon SwainNorth Texas Chapter of the ISSA
 
Prism presentation
Prism presentationPrism presentation
Prism presentationLakshmi .
 
Aplication data security compliances
Aplication data security compliancesAplication data security compliances
Aplication data security compliancesAhmadi Madi
 
[Sencha 엔터프라이즈 웹애플리케이션 세미나] BYOD - Sencha space
[Sencha 엔터프라이즈 웹애플리케이션 세미나] BYOD - Sencha space[Sencha 엔터프라이즈 웹애플리케이션 세미나] BYOD - Sencha space
[Sencha 엔터프라이즈 웹애플리케이션 세미나] BYOD - Sencha space미래웹기술연구소 (MIRAE WEB)
 
Develop and Enforce a Bring-Your-Own-Device (BYOD) Policy
Develop and Enforce a Bring-Your-Own-Device (BYOD) PolicyDevelop and Enforce a Bring-Your-Own-Device (BYOD) Policy
Develop and Enforce a Bring-Your-Own-Device (BYOD) PolicyOracleIDM
 
Security Management in Cloud Computing by Shivani Gogia - Aravali College of ...
Security Management in Cloud Computing by Shivani Gogia - Aravali College of ...Security Management in Cloud Computing by Shivani Gogia - Aravali College of ...
Security Management in Cloud Computing by Shivani Gogia - Aravali College of ...acemindia
 
talk6securingcloudamarprusty-191030091632.pptx
talk6securingcloudamarprusty-191030091632.pptxtalk6securingcloudamarprusty-191030091632.pptx
talk6securingcloudamarprusty-191030091632.pptxTrongMinhHoang1
 
Himss 2016 Lunch & Learn: Data Security in IoT (and ePHI Risks)
Himss 2016 Lunch & Learn: Data Security in IoT (and ePHI Risks)Himss 2016 Lunch & Learn: Data Security in IoT (and ePHI Risks)
Himss 2016 Lunch & Learn: Data Security in IoT (and ePHI Risks)OnRamp
 

Semelhante a SeaCat: SDN End-to-End Application Containment (20)

BYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, WestBYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, West
 
Embracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifyEmbracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and Centrify
 
Cloud Security: A matter of trust?
Cloud Security: A matter of trust?Cloud Security: A matter of trust?
Cloud Security: A matter of trust?
 
Infosec policies to appsec standards ed final
Infosec policies to appsec standards   ed finalInfosec policies to appsec standards   ed final
Infosec policies to appsec standards ed final
 
Mobile Middleware and Mobility in the Enterprise - Yad Jaura, Marketing Manag...
Mobile Middleware and Mobility in the Enterprise - Yad Jaura, Marketing Manag...Mobile Middleware and Mobility in the Enterprise - Yad Jaura, Marketing Manag...
Mobile Middleware and Mobility in the Enterprise - Yad Jaura, Marketing Manag...
 
Security and Compliance for Enterprise Cloud Infrastructure
Security and Compliance for Enterprise Cloud InfrastructureSecurity and Compliance for Enterprise Cloud Infrastructure
Security and Compliance for Enterprise Cloud Infrastructure
 
Regulatory Intelligence
Regulatory IntelligenceRegulatory Intelligence
Regulatory Intelligence
 
Bringing Government and Enterprise Security Controls to the Android Endpoint
Bringing Government and Enterprise Security Controls to the Android EndpointBringing Government and Enterprise Security Controls to the Android Endpoint
Bringing Government and Enterprise Security Controls to the Android Endpoint
 
Dealing with Web Application Security, Regulation Style
Dealing with Web Application Security, Regulation StyleDealing with Web Application Security, Regulation Style
Dealing with Web Application Security, Regulation Style
 
2015 Angelbeat_ConvergenceMsg-FINAL
2015 Angelbeat_ConvergenceMsg-FINAL2015 Angelbeat_ConvergenceMsg-FINAL
2015 Angelbeat_ConvergenceMsg-FINAL
 
NTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon Swain
NTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon SwainNTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon Swain
NTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon Swain
 
Prism presentation
Prism presentationPrism presentation
Prism presentation
 
Aplication data security compliances
Aplication data security compliancesAplication data security compliances
Aplication data security compliances
 
[Sencha 엔터프라이즈 웹애플리케이션 세미나] BYOD - Sencha space
[Sencha 엔터프라이즈 웹애플리케이션 세미나] BYOD - Sencha space[Sencha 엔터프라이즈 웹애플리케이션 세미나] BYOD - Sencha space
[Sencha 엔터프라이즈 웹애플리케이션 세미나] BYOD - Sencha space
 
Secure Cloud Issues
Secure Cloud IssuesSecure Cloud Issues
Secure Cloud Issues
 
Develop and Enforce a Bring-Your-Own-Device (BYOD) Policy
Develop and Enforce a Bring-Your-Own-Device (BYOD) PolicyDevelop and Enforce a Bring-Your-Own-Device (BYOD) Policy
Develop and Enforce a Bring-Your-Own-Device (BYOD) Policy
 
Security Management in Cloud Computing by Shivani Gogia - Aravali College of ...
Security Management in Cloud Computing by Shivani Gogia - Aravali College of ...Security Management in Cloud Computing by Shivani Gogia - Aravali College of ...
Security Management in Cloud Computing by Shivani Gogia - Aravali College of ...
 
talk6securingcloudamarprusty-191030091632.pptx
talk6securingcloudamarprusty-191030091632.pptxtalk6securingcloudamarprusty-191030091632.pptx
talk6securingcloudamarprusty-191030091632.pptx
 
Himss 2016 Lunch & Learn: Data Security in IoT (and ePHI Risks)
Himss 2016 Lunch & Learn: Data Security in IoT (and ePHI Risks)Himss 2016 Lunch & Learn: Data Security in IoT (and ePHI Risks)
Himss 2016 Lunch & Learn: Data Security in IoT (and ePHI Risks)
 
Securing your Cloud Deployment
Securing your Cloud DeploymentSecuring your Cloud Deployment
Securing your Cloud Deployment
 

Mais de US-Ignite

Smart Gigabit Community Lighting Round
Smart Gigabit Community Lighting Round Smart Gigabit Community Lighting Round
Smart Gigabit Community Lighting Round US-Ignite
 
NSF PI Meeting presentation on US Ignite - Nishal Mohan
NSF PI Meeting presentation on US Ignite - Nishal MohanNSF PI Meeting presentation on US Ignite - Nishal Mohan
NSF PI Meeting presentation on US Ignite - Nishal MohanUS-Ignite
 
New Smart Gigabit Community 2017 announcement - Nishal Mohan
New Smart Gigabit Community 2017 announcement - Nishal MohanNew Smart Gigabit Community 2017 announcement - Nishal Mohan
New Smart Gigabit Community 2017 announcement - Nishal MohanUS-Ignite
 
RFP announcement for new US Ignite Smart Gigabit Cities - Nishal Mohan
RFP announcement for new US Ignite Smart Gigabit Cities - Nishal MohanRFP announcement for new US Ignite Smart Gigabit Cities - Nishal Mohan
RFP announcement for new US Ignite Smart Gigabit Cities - Nishal MohanUS-Ignite
 
Holograms in Your City: Smart Training, Data Visualization and Communication ...
Holograms in Your City: Smart Training, Data Visualization and Communication ...Holograms in Your City: Smart Training, Data Visualization and Communication ...
Holograms in Your City: Smart Training, Data Visualization and Communication ...US-Ignite
 
Innovation in Gigcity, Chattanooga TN - Ken Hayes
Innovation in Gigcity, Chattanooga TN - Ken HayesInnovation in Gigcity, Chattanooga TN - Ken Hayes
Innovation in Gigcity, Chattanooga TN - Ken HayesUS-Ignite
 
Compute for Cancer - Isaiah Blackburn
Compute for Cancer - Isaiah BlackburnCompute for Cancer - Isaiah Blackburn
Compute for Cancer - Isaiah BlackburnUS-Ignite
 
Towards Wireless-Networked Real-Time Augmented Vision - Hongwei Zhang
Towards Wireless-Networked Real-Time Augmented Vision - Hongwei ZhangTowards Wireless-Networked Real-Time Augmented Vision - Hongwei Zhang
Towards Wireless-Networked Real-Time Augmented Vision - Hongwei ZhangUS-Ignite
 
The Future of Smart & Connected Communities: Driving Science and Community Im...
The Future of Smart & Connected Communities: Driving Science and Community Im...The Future of Smart & Connected Communities: Driving Science and Community Im...
The Future of Smart & Connected Communities: Driving Science and Community Im...US-Ignite
 
Data-Driven Green Design Case Studies - Dominique Davison
Data-Driven Green Design Case Studies - Dominique DavisonData-Driven Green Design Case Studies - Dominique Davison
Data-Driven Green Design Case Studies - Dominique DavisonUS-Ignite
 
Innovation in Phoenix: City on the Rise - Dominic Papa
Innovation in Phoenix: City on the Rise - Dominic PapaInnovation in Phoenix: City on the Rise - Dominic Papa
Innovation in Phoenix: City on the Rise - Dominic PapaUS-Ignite
 
Preparing an NSF16 610 proposal
Preparing an NSF16 610 proposalPreparing an NSF16 610 proposal
Preparing an NSF16 610 proposalUS-Ignite
 
Next Generation Broadband Cities - Lightning Talks
Next Generation Broadband Cities - Lightning  TalksNext Generation Broadband Cities - Lightning  Talks
Next Generation Broadband Cities - Lightning TalksUS-Ignite
 
Innovation economy remarks to ignite! january 2016
Innovation economy  remarks to ignite! january 2016Innovation economy  remarks to ignite! january 2016
Innovation economy remarks to ignite! january 2016US-Ignite
 
The Geni Experiment Engine
The Geni Experiment EngineThe Geni Experiment Engine
The Geni Experiment EngineUS-Ignite
 
Harnessing the Power of Data, Technology and Innovation to Unlock Talent
Harnessing the Power of Data, Technology and Innovation to Unlock TalentHarnessing the Power of Data, Technology and Innovation to Unlock Talent
Harnessing the Power of Data, Technology and Innovation to Unlock TalentUS-Ignite
 
Kickoff Agenda
Kickoff AgendaKickoff Agenda
Kickoff AgendaUS-Ignite
 
2016/01/26 Glenn Ricart - Smart Gigabit Communities
2016/01/26 Glenn Ricart - Smart Gigabit Communities2016/01/26 Glenn Ricart - Smart Gigabit Communities
2016/01/26 Glenn Ricart - Smart Gigabit CommunitiesUS-Ignite
 
21 - Smart Gigabit Communities Launch - Madison
21 - Smart Gigabit Communities Launch - Madison21 - Smart Gigabit Communities Launch - Madison
21 - Smart Gigabit Communities Launch - MadisonUS-Ignite
 
20 - Smart Gigabit Communities Launch - Lafayette, LA
20 - Smart Gigabit Communities Launch - Lafayette, LA20 - Smart Gigabit Communities Launch - Lafayette, LA
20 - Smart Gigabit Communities Launch - Lafayette, LAUS-Ignite
 

Mais de US-Ignite (20)

Smart Gigabit Community Lighting Round
Smart Gigabit Community Lighting Round Smart Gigabit Community Lighting Round
Smart Gigabit Community Lighting Round
 
NSF PI Meeting presentation on US Ignite - Nishal Mohan
NSF PI Meeting presentation on US Ignite - Nishal MohanNSF PI Meeting presentation on US Ignite - Nishal Mohan
NSF PI Meeting presentation on US Ignite - Nishal Mohan
 
New Smart Gigabit Community 2017 announcement - Nishal Mohan
New Smart Gigabit Community 2017 announcement - Nishal MohanNew Smart Gigabit Community 2017 announcement - Nishal Mohan
New Smart Gigabit Community 2017 announcement - Nishal Mohan
 
RFP announcement for new US Ignite Smart Gigabit Cities - Nishal Mohan
RFP announcement for new US Ignite Smart Gigabit Cities - Nishal MohanRFP announcement for new US Ignite Smart Gigabit Cities - Nishal Mohan
RFP announcement for new US Ignite Smart Gigabit Cities - Nishal Mohan
 
Holograms in Your City: Smart Training, Data Visualization and Communication ...
Holograms in Your City: Smart Training, Data Visualization and Communication ...Holograms in Your City: Smart Training, Data Visualization and Communication ...
Holograms in Your City: Smart Training, Data Visualization and Communication ...
 
Innovation in Gigcity, Chattanooga TN - Ken Hayes
Innovation in Gigcity, Chattanooga TN - Ken HayesInnovation in Gigcity, Chattanooga TN - Ken Hayes
Innovation in Gigcity, Chattanooga TN - Ken Hayes
 
Compute for Cancer - Isaiah Blackburn
Compute for Cancer - Isaiah BlackburnCompute for Cancer - Isaiah Blackburn
Compute for Cancer - Isaiah Blackburn
 
Towards Wireless-Networked Real-Time Augmented Vision - Hongwei Zhang
Towards Wireless-Networked Real-Time Augmented Vision - Hongwei ZhangTowards Wireless-Networked Real-Time Augmented Vision - Hongwei Zhang
Towards Wireless-Networked Real-Time Augmented Vision - Hongwei Zhang
 
The Future of Smart & Connected Communities: Driving Science and Community Im...
The Future of Smart & Connected Communities: Driving Science and Community Im...The Future of Smart & Connected Communities: Driving Science and Community Im...
The Future of Smart & Connected Communities: Driving Science and Community Im...
 
Data-Driven Green Design Case Studies - Dominique Davison
Data-Driven Green Design Case Studies - Dominique DavisonData-Driven Green Design Case Studies - Dominique Davison
Data-Driven Green Design Case Studies - Dominique Davison
 
Innovation in Phoenix: City on the Rise - Dominic Papa
Innovation in Phoenix: City on the Rise - Dominic PapaInnovation in Phoenix: City on the Rise - Dominic Papa
Innovation in Phoenix: City on the Rise - Dominic Papa
 
Preparing an NSF16 610 proposal
Preparing an NSF16 610 proposalPreparing an NSF16 610 proposal
Preparing an NSF16 610 proposal
 
Next Generation Broadband Cities - Lightning Talks
Next Generation Broadband Cities - Lightning  TalksNext Generation Broadband Cities - Lightning  Talks
Next Generation Broadband Cities - Lightning Talks
 
Innovation economy remarks to ignite! january 2016
Innovation economy  remarks to ignite! january 2016Innovation economy  remarks to ignite! january 2016
Innovation economy remarks to ignite! january 2016
 
The Geni Experiment Engine
The Geni Experiment EngineThe Geni Experiment Engine
The Geni Experiment Engine
 
Harnessing the Power of Data, Technology and Innovation to Unlock Talent
Harnessing the Power of Data, Technology and Innovation to Unlock TalentHarnessing the Power of Data, Technology and Innovation to Unlock Talent
Harnessing the Power of Data, Technology and Innovation to Unlock Talent
 
Kickoff Agenda
Kickoff AgendaKickoff Agenda
Kickoff Agenda
 
2016/01/26 Glenn Ricart - Smart Gigabit Communities
2016/01/26 Glenn Ricart - Smart Gigabit Communities2016/01/26 Glenn Ricart - Smart Gigabit Communities
2016/01/26 Glenn Ricart - Smart Gigabit Communities
 
21 - Smart Gigabit Communities Launch - Madison
21 - Smart Gigabit Communities Launch - Madison21 - Smart Gigabit Communities Launch - Madison
21 - Smart Gigabit Communities Launch - Madison
 
20 - Smart Gigabit Communities Launch - Lafayette, LA
20 - Smart Gigabit Communities Launch - Lafayette, LA20 - Smart Gigabit Communities Launch - Lafayette, LA
20 - Smart Gigabit Communities Launch - Lafayette, LA
 

Último

A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesBoston Institute of Analytics
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024SynarionITSolutions
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 

Último (20)

A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 

SeaCat: SDN End-to-End Application Containment

  • 1. SeaCat: an SDN End-to-end Application Containment ArchitecTure Enabling Secure Role Based Access To Sensitive Healthcare Data Junguk Cho, David Johnson, Makito Kano, Kobus Van der Merwe and Brent Elieson
  • 2. Motivation • “Everything” is networked – Nearly all business applications assume network availability • Also true in healthcare – Accessing patient records – Remote diagnoses and consultation – In-home monitoring – Healthcare analytics – Plus “regular” vocational applications • HR/payroll functions, accessing domain specific literature – Plus non vocational use • Browsing the web, social networking etc.
  • 3. Motivation cont. • Problem: – Same individual, using same device potentially using several of these applications simultaneously – Applications have very different security and performance constraints: • Healthcare records: stringent regulatory privacy and security requirements • In-home patient monitoring: different privacy and security needs + reliability and soft real time guarantees • Web use: no impact on core healthcare applications – Devices are increasingly mobile (tablets, laptops, smartphones) • Often not part of managed and trusted enterprise environment
  • 4. Motivation cont. • Current approaches, combinations of: – Device scans when new devices attach to network – Run applications on application servers with thin clients on devices – Complex network and server access control policies • Inadequate: – Device with up-to-date patch levels might still contain malware – Application servers with thin clients constrain the type of applications that can be used – Access control policies only deal with access. Provide no protection once data is accessed
  • 5. Motivation cont. • Problem generalizes to broad range of access to sensitive data • Different sets of regulations/practices – Protected health information (PHI) • HIPAA regulations – Student educational records • FERPA regulations – Federal government work • FISMA regulations – Business requirements • PCI DSS regulations – Institutional requirements • IRB regulations
  • 6. SeaCat Approach • Combine SDN and application containment: – End-to-end application containment • Non-healthcare apps: – default context • Healthcare app: – dynamic app specific context – app and data contained in this end-to-end context • Treat mobile device as “semi-trusted” SDN domain – Inter-domain SDN interaction to tie in
  • 7. Threat Model • Concerned with security and performance of health care applications used from variety of devices in a health care environment • Assume healthcare applications can be trusted – different from conventional threat model where device needs to be protected against untrusted applications • Specific concerns: – Unauthorized access • role based authentication and policies – Data leakage • end-to-end application containment – Resource guarantees • context based resource allocation with preemption – Denial of service • resource guarantees plus separation of resources
  • 8. SeaCat Architecture: Endpoint Containment • Uses lightweight containers – Linux containers • All applications execute in containers: – move “regular apps” into default container • Minimize trusted computing base: – Only SeaCat Trusted Daemon left in root namespace
  • 9. Motivation cont. • Problem: – Same individual, using same device potentially using several of these applications simultaneously – Applications have very different security and performance constraints: • Healthcare records: stringent regulatory privacy and security requirements • In-home patient monitoring: different privacy and security needs + reliability and soft real time guarantees • Web use: no impact on core healthcare applications – Devices are increasingly mobile (tablets, laptops, smartphones) • Often not part of managed and trusted enterprise environment
  • 10. SeaCat Architecture: Endpoint Network Containment • SeaCat Trusted Daemon: – Manages endpoint SDN domain • Single switch domain: – Sets up context for default apps – Sets up context for secure apps: based on interaction with enterprise SDN
  • 11. SeaCat Architecture: Enterprise Network Containment • SeaCat Server: – Manages enterprise SDN domain • Sets up context for secure apps • Includes SDN-enabled WiFi – Interacts with SeaCat trusted daemon in endpoint • Instructs trusted daemon to start secure container • Coordinates SDN across domains
  • 12. SeaCat Architecture: Putting it all together • Enterprise network treats each mobile endpoint as semi- trusted SDN domain • Secure app user: authenticates using “normal” single-sign-on (SSO) technology – SeaCat server integrated with SSO – Successful authentication triggers: • Creation of app specific SDN context in enterprise • Signaling to endpoint SDN to: – Create secure container – Create endpoint app specific SDN context – Ties to enterprise SDN context • App and data remains in this secure end-to-end context • When app exits: – Complete context is destroyed
  • 14. Motivation cont. • Current approaches, combinations of: – Device scans when new devices attach to network – Run applications on application servers with thin clients on devices – Complex network and server access control policies • Inadequate: – Device with up-to-date patch levels might still contain malware – Application servers with thin clients constrain the type of applications that can be used – Access control policies only deal with access. Provide no protection once data is accessed
  • 16. EHR Server Default Context Other Apps Other Apps Other Apps Internet/ Non Healthcare Resources Mobile Endpoint SeaCat Enterprise/Campus Network SeaCat SSO Secure Context 1 2 SeaCat Workflow/Interaction
  • 17. EHR Server Default Context Other Apps Other Apps Other Apps Internet/ Non Healthcare Resources Mobile Endpoint SeaCat Enterprise/Campus Network SeaCat SSO Secure Context 3 SeaCat Workflow/Interaction
  • 18. EHR Server Default Context Other Apps Other Apps Other Apps Internet/ Non Healthcare Resources Mobile Endpoint SeaCat Enterprise/Campus Network SeaCat SSO Secure Context 4 5 SeaCat Workflow/Interaction
  • 19. Motivation cont. • Problem generalizes to broad range of access to sensitive data • Different sets of regulations/practices – Protected health information (PHI) • HIPAA regulations – Student educational records • FERPA regulations – Federal government work • FISMA regulations – Business requirements • PCI DSS regulations – Institutional requirements • IRB regulations
  • 20. SeaCat Demo • Mobile endpoint: – Linux WiFi-enabled tablet – With SeaCat Trusted Daemon: • Container and SDN management • Enterprise network: – SDN enabled WiFi access point • Tallac Networks • Virtual APs • Mapped to OpenFlow switch – Rest of enterprise SDN emulated in a Mininet instance • Single Sign On (SSO): – Uses Shibboleth SSO – SeaCat (Service Provider) to realize SeaCat functionality • Medical application: – OpenMRS (Medical Record System)
  • 21. SeaCat Demo WiFi AP Emulated Network HUB Enterprise SDN Controller VIF1 OVS Other Apps Client tablet lxc VIF0 Ryu controller DHCP FLOW MANAGER ETH2 OVS OpenMRS server SSO: SeaCat Service ProviderSSO: Identity Provider ETH3 H1 H2 H3 MININET ETH0 Policy VAP Default VAP OVS ETH0 ETH1 Wireless network Real Ethernet network Virtual Ethernet network Trusted Daemon LXC CONTROLLER OVS CONTROLLER Other Server H4 Enterprise/Campus Network lxc
  • 22. Status and plans • Have working prototype… • Current focus on access to electronic health records • SeaCat is a general application framework… – other health care apps – other apps that require access to sensitive data • Interested in exploring possibility of trial deployment…