SlideShare uma empresa Scribd logo
1 de 9
SeaCat: an SDN End-to-end
Application Containment ArchitecTure
Enabling Secure Role Based Network Access in Healthcare
- US Ignite Project -
Kobus Van der Merwe
and Brent Elieson
Motivation
• “Everything” is networked
– Nearly all business applications assume network
availability
• Also true in healthcare
– Accessing patient records
– Remote diagnoses and consultation
– In-home monitoring
– Healthcare analytics
– Plus “regular” vocational applications
• HR/payroll functions, accessing domain specific literature
– Plus non vocational use
• Browsing the web, social networking etc.
Motivation cont.
• Problem:
– Same individual, using same device potentially
using several of these applications simultaneously
– Applications have very different security and
performance constraints:
• Healthcare records: stringent regulatory privacy and
security requirements
• In-home patient monitoring: different privacy and
security needs + reliability and soft real time
guarantees
• Web use: no impact on core healthcare applications
Motivation cont.
• Current approaches, combinations of:
– Devices scans when new devices attach to network
– Run applications on application servers with thin clients on
devices
– Complex network and server access control polices
• Inadequate:
– Device with up-to-date patch levels might still contain
malware
– Application servers with thin clients constrain the type of
applications that can be used
– Access control policies only deal with access. Provide no
protection once data is accessed
SeaCat Approach
• Combine SDN and
application
containment:
– End-to-end application
containment
• Non-healthcare app:
– default context
• Healthcare app:
– dynamic app specific
context
– from server, through
network, into device
– app and data contained in
this context
– protect against data leakage
and malicious actors
Threat Model
• Concerned with security and performance of health care
applications used from variety of devices in a health care
environment
• Assume healthcare applications can be trusted
– different from conventional threat model where device needs to be
protected against untrusted applications
• Specific concerns:
– Unauthorized access
• role based authentication and policies
– Data leakage
• end-to-end application containment
– Resource guarantees
• context based resource allocation with preemption
– Denial of service
• resource guarantees plus separation of resources
SeaCat Architecture
• SDN to create
contexts for
apps
• Extend contexts
into endpoint:
– Controller
creates virtual
interfaces on
host switch
– Bind
applications to
these interfaces
SeaCat Architecture
Default context to bootstrap:
1. App uses default
context ->
authentication and
policy entity
2. Request: create
network context
3. Create context in
network and host SDN
4. Application gets
credentials to bind to
virtual NIC (unbind from
default NIC/context)
5. Traffic constrained to
dedicated context
Challenges and status
• Create secure end-to-end contexts
– Network and host SDN as basis
– Authentication and policy driven control framework
– Host application containment
– Secure binding mechanisms
– Need for encryption
• Status and plans
– Just got started
• Work in progress
– Explore architecture with specific healthcare apps
• Electronic health records (EHR)
• Medical imaging

Mais conteúdo relacionado

Mais procurados

Viewfinity Application Control and Monitoring 2015
Viewfinity Application Control and Monitoring 2015Viewfinity Application Control and Monitoring 2015
Viewfinity Application Control and Monitoring 2015Joseph Iannelli
 
Internet of Things - An Architectural Perspective
Internet of Things - An Architectural PerspectiveInternet of Things - An Architectural Perspective
Internet of Things - An Architectural PerspectiveGaurav Awasthi
 
Private Data - Keep Out!
Private Data - Keep Out!Private Data - Keep Out!
Private Data - Keep Out!Greg Parmer
 
Soc security-analytics
Soc security-analyticsSoc security-analytics
Soc security-analyticsbharti singhal
 
Needle in the Haystack—User Behavior Anomaly Detection for Information Securi...
Needle in the Haystack—User Behavior Anomaly Detection for Information Securi...Needle in the Haystack—User Behavior Anomaly Detection for Information Securi...
Needle in the Haystack—User Behavior Anomaly Detection for Information Securi...Databricks
 
Soc security-analyticsof leotechnosoft
Soc security-analyticsof leotechnosoftSoc security-analyticsof leotechnosoft
Soc security-analyticsof leotechnosofthardik soni
 
Cybernetic protectors
Cybernetic protectorsCybernetic protectors
Cybernetic protectorsvishnuRajan20
 
Security Architecture
Security ArchitectureSecurity Architecture
Security ArchitectureJoben Domingo
 
Crime Investigation with Cybernetic Protector
Crime Investigation with Cybernetic ProtectorCrime Investigation with Cybernetic Protector
Crime Investigation with Cybernetic ProtectorIRJET Journal
 
International Journal on Cryptography and Information Security ( IJCIS)
International Journal on Cryptography and Information Security ( IJCIS)International Journal on Cryptography and Information Security ( IJCIS)
International Journal on Cryptography and Information Security ( IJCIS)ijcisjournal
 
International Journal on Cryptography and Information Security (IJCIS)
International Journal on Cryptography and Information Security (IJCIS)International Journal on Cryptography and Information Security (IJCIS)
International Journal on Cryptography and Information Security (IJCIS)ijcisjournal
 
Logs in Security and Compliance flare
Logs in Security and Compliance flareLogs in Security and Compliance flare
Logs in Security and Compliance flarezilberberg
 
JPA1404 Context-based Access Control Systems for Mobile Devices
JPA1404  Context-based Access Control Systems for Mobile DevicesJPA1404  Context-based Access Control Systems for Mobile Devices
JPA1404 Context-based Access Control Systems for Mobile Deviceschennaijp
 
Ieee project-2014-2015-context-based-access-control-systems
Ieee project-2014-2015-context-based-access-control-systemsIeee project-2014-2015-context-based-access-control-systems
Ieee project-2014-2015-context-based-access-control-systemsSteph Cliche
 

Mais procurados (19)

Viewfinity Application Control and Monitoring 2015
Viewfinity Application Control and Monitoring 2015Viewfinity Application Control and Monitoring 2015
Viewfinity Application Control and Monitoring 2015
 
Internet of Things - An Architectural Perspective
Internet of Things - An Architectural PerspectiveInternet of Things - An Architectural Perspective
Internet of Things - An Architectural Perspective
 
Security Software
Security SoftwareSecurity Software
Security Software
 
Private Data - Keep Out!
Private Data - Keep Out!Private Data - Keep Out!
Private Data - Keep Out!
 
Slides
SlidesSlides
Slides
 
Soc security-analytics
Soc security-analyticsSoc security-analytics
Soc security-analytics
 
Gs Ch1
Gs Ch1Gs Ch1
Gs Ch1
 
Needle in the Haystack—User Behavior Anomaly Detection for Information Securi...
Needle in the Haystack—User Behavior Anomaly Detection for Information Securi...Needle in the Haystack—User Behavior Anomaly Detection for Information Securi...
Needle in the Haystack—User Behavior Anomaly Detection for Information Securi...
 
Soc security-analyticsof leotechnosoft
Soc security-analyticsof leotechnosoftSoc security-analyticsof leotechnosoft
Soc security-analyticsof leotechnosoft
 
Cybernetic protectors
Cybernetic protectorsCybernetic protectors
Cybernetic protectors
 
Security Architecture
Security ArchitectureSecurity Architecture
Security Architecture
 
Ijisa
IjisaIjisa
Ijisa
 
Crime Investigation with Cybernetic Protector
Crime Investigation with Cybernetic ProtectorCrime Investigation with Cybernetic Protector
Crime Investigation with Cybernetic Protector
 
International Journal on Cryptography and Information Security ( IJCIS)
International Journal on Cryptography and Information Security ( IJCIS)International Journal on Cryptography and Information Security ( IJCIS)
International Journal on Cryptography and Information Security ( IJCIS)
 
International Journal on Cryptography and Information Security (IJCIS)
International Journal on Cryptography and Information Security (IJCIS)International Journal on Cryptography and Information Security (IJCIS)
International Journal on Cryptography and Information Security (IJCIS)
 
Ijisa
IjisaIjisa
Ijisa
 
Logs in Security and Compliance flare
Logs in Security and Compliance flareLogs in Security and Compliance flare
Logs in Security and Compliance flare
 
JPA1404 Context-based Access Control Systems for Mobile Devices
JPA1404  Context-based Access Control Systems for Mobile DevicesJPA1404  Context-based Access Control Systems for Mobile Devices
JPA1404 Context-based Access Control Systems for Mobile Devices
 
Ieee project-2014-2015-context-based-access-control-systems
Ieee project-2014-2015-context-based-access-control-systemsIeee project-2014-2015-context-based-access-control-systems
Ieee project-2014-2015-context-based-access-control-systems
 

Destaque

Network scoring for 2015 healthcare conferences
Network scoring for 2015 healthcare conferencesNetwork scoring for 2015 healthcare conferences
Network scoring for 2015 healthcare conferencesW2O Group
 
Social Network Gaming
Social Network GamingSocial Network Gaming
Social Network GamingAshkan Mehran
 
Use case diagram
Use case diagramUse case diagram
Use case diagramRaz Friman
 
Nonprofits, Healthcare, and Social Media
Nonprofits, Healthcare, and Social MediaNonprofits, Healthcare, and Social Media
Nonprofits, Healthcare, and Social MediaBeth Kanter
 
Obstetrics, Gynecology, and Twitter: A Primer on Strategic Social Media to Im...
Obstetrics, Gynecology, and Twitter: A Primer on Strategic Social Media to Im...Obstetrics, Gynecology, and Twitter: A Primer on Strategic Social Media to Im...
Obstetrics, Gynecology, and Twitter: A Primer on Strategic Social Media to Im...Neel Shah
 
Healthcare Professionals' Social Networks: The Beginning of the End of Pharma...
Healthcare Professionals' Social Networks: The Beginning of the End of Pharma...Healthcare Professionals' Social Networks: The Beginning of the End of Pharma...
Healthcare Professionals' Social Networks: The Beginning of the End of Pharma...Len Starnes
 
Aurkut - A social Networking website
Aurkut - A social Networking websiteAurkut - A social Networking website
Aurkut - A social Networking websiteAbhijeet Kalsi
 
The New Era of Healthcare Communications
The New Era of Healthcare CommunicationsThe New Era of Healthcare Communications
The New Era of Healthcare CommunicationsLee Aase
 
Social Networking Website
Social Networking WebsiteSocial Networking Website
Social Networking Websiteguestec05a4
 
SRS Of Social Networking
SRS Of Social NetworkingSRS Of Social Networking
SRS Of Social Networkingmaaano786
 
Healthcare Social Networking: Is Pharma Ready to Join the Conversation?
Healthcare Social Networking: Is Pharma Ready to Join the Conversation?Healthcare Social Networking: Is Pharma Ready to Join the Conversation?
Healthcare Social Networking: Is Pharma Ready to Join the Conversation?Len Starnes
 
Edge Talk 1 April 2016 with Tom Lee of Symplur presentation
Edge Talk 1 April 2016 with Tom Lee of Symplur presentationEdge Talk 1 April 2016 with Tom Lee of Symplur presentation
Edge Talk 1 April 2016 with Tom Lee of Symplur presentationHorizons NHS
 
project report of social networking web sites
project report of social networking web sitesproject report of social networking web sites
project report of social networking web sitesGyanendra Pratap Singh
 
Hand gesture recognition system(FYP REPORT)
Hand gesture recognition system(FYP REPORT)Hand gesture recognition system(FYP REPORT)
Hand gesture recognition system(FYP REPORT)Afnan Rehman
 
Social Networking Project
Social Networking ProjectSocial Networking Project
Social Networking Projectjessduff44
 
10 Tech Trends in Healthcare
10 Tech Trends in Healthcare10 Tech Trends in Healthcare
10 Tech Trends in HealthcareVala Afshar
 
Social Networking Project (website) full documentation
Social Networking Project (website) full documentation Social Networking Project (website) full documentation
Social Networking Project (website) full documentation Tenzin Tendar
 
Social Media In Healthcare: Coming of Age
Social Media In Healthcare: Coming of AgeSocial Media In Healthcare: Coming of Age
Social Media In Healthcare: Coming of AgeLee Aase
 

Destaque (20)

Network scoring for 2015 healthcare conferences
Network scoring for 2015 healthcare conferencesNetwork scoring for 2015 healthcare conferences
Network scoring for 2015 healthcare conferences
 
Social Network Gaming
Social Network GamingSocial Network Gaming
Social Network Gaming
 
Use case diagram
Use case diagramUse case diagram
Use case diagram
 
Nonprofits, Healthcare, and Social Media
Nonprofits, Healthcare, and Social MediaNonprofits, Healthcare, and Social Media
Nonprofits, Healthcare, and Social Media
 
Obstetrics, Gynecology, and Twitter: A Primer on Strategic Social Media to Im...
Obstetrics, Gynecology, and Twitter: A Primer on Strategic Social Media to Im...Obstetrics, Gynecology, and Twitter: A Primer on Strategic Social Media to Im...
Obstetrics, Gynecology, and Twitter: A Primer on Strategic Social Media to Im...
 
Healthcare Professionals' Social Networks: The Beginning of the End of Pharma...
Healthcare Professionals' Social Networks: The Beginning of the End of Pharma...Healthcare Professionals' Social Networks: The Beginning of the End of Pharma...
Healthcare Professionals' Social Networks: The Beginning of the End of Pharma...
 
Aurkut - A social Networking website
Aurkut - A social Networking websiteAurkut - A social Networking website
Aurkut - A social Networking website
 
The New Era of Healthcare Communications
The New Era of Healthcare CommunicationsThe New Era of Healthcare Communications
The New Era of Healthcare Communications
 
Social Networking Website
Social Networking WebsiteSocial Networking Website
Social Networking Website
 
SRS Of Social Networking
SRS Of Social NetworkingSRS Of Social Networking
SRS Of Social Networking
 
social networking site
social networking sitesocial networking site
social networking site
 
Healthcare Social Networking: Is Pharma Ready to Join the Conversation?
Healthcare Social Networking: Is Pharma Ready to Join the Conversation?Healthcare Social Networking: Is Pharma Ready to Join the Conversation?
Healthcare Social Networking: Is Pharma Ready to Join the Conversation?
 
Edge Talk 1 April 2016 with Tom Lee of Symplur presentation
Edge Talk 1 April 2016 with Tom Lee of Symplur presentationEdge Talk 1 April 2016 with Tom Lee of Symplur presentation
Edge Talk 1 April 2016 with Tom Lee of Symplur presentation
 
project report of social networking web sites
project report of social networking web sitesproject report of social networking web sites
project report of social networking web sites
 
Social networking
Social networkingSocial networking
Social networking
 
Hand gesture recognition system(FYP REPORT)
Hand gesture recognition system(FYP REPORT)Hand gesture recognition system(FYP REPORT)
Hand gesture recognition system(FYP REPORT)
 
Social Networking Project
Social Networking ProjectSocial Networking Project
Social Networking Project
 
10 Tech Trends in Healthcare
10 Tech Trends in Healthcare10 Tech Trends in Healthcare
10 Tech Trends in Healthcare
 
Social Networking Project (website) full documentation
Social Networking Project (website) full documentation Social Networking Project (website) full documentation
Social Networking Project (website) full documentation
 
Social Media In Healthcare: Coming of Age
Social Media In Healthcare: Coming of AgeSocial Media In Healthcare: Coming of Age
Social Media In Healthcare: Coming of Age
 

Semelhante a SeaCat: and SDN End-to-end Application Containment ArchitecTure

12-Dynamic Resource Provisioning, Security Aspects, Module-5-Cognitive comput...
12-Dynamic Resource Provisioning, Security Aspects, Module-5-Cognitive comput...12-Dynamic Resource Provisioning, Security Aspects, Module-5-Cognitive comput...
12-Dynamic Resource Provisioning, Security Aspects, Module-5-Cognitive comput...RahulJain989779
 
Securing elastic applications_on_mobile_devices
Securing elastic applications_on_mobile_devicesSecuring elastic applications_on_mobile_devices
Securing elastic applications_on_mobile_devicesfirzhan naqash
 
Anya-Kim-Bhargava-MCCWorkshop.ppt
Anya-Kim-Bhargava-MCCWorkshop.pptAnya-Kim-Bhargava-MCCWorkshop.ppt
Anya-Kim-Bhargava-MCCWorkshop.pptTaskinKhaleque
 
Cloud Security: A matter of trust?
Cloud Security: A matter of trust?Cloud Security: A matter of trust?
Cloud Security: A matter of trust?Mark Williams
 
Security issue in cloud by himanshu tiwari
Security issue in cloud by himanshu tiwariSecurity issue in cloud by himanshu tiwari
Security issue in cloud by himanshu tiwaribhanu krishna
 
BeyondCorp and Zero Trust
BeyondCorp and Zero TrustBeyondCorp and Zero Trust
BeyondCorp and Zero TrustIvan Dwyer
 
Security Issues of Cloud Computing
Security Issues of Cloud ComputingSecurity Issues of Cloud Computing
Security Issues of Cloud ComputingFalgun Rathod
 
System Security Sem 2(Module 1).pptx
System Security Sem 2(Module     1).pptxSystem Security Sem 2(Module     1).pptx
System Security Sem 2(Module 1).pptxrahulkumarcscsf21
 
Beyond Boundaries-The Power of Zero Trust Networking By Mohammed Danish Amber...
Beyond Boundaries-The Power of Zero Trust Networking By Mohammed Danish Amber...Beyond Boundaries-The Power of Zero Trust Networking By Mohammed Danish Amber...
Beyond Boundaries-The Power of Zero Trust Networking By Mohammed Danish Amber...null - The Open Security Community
 
Security and Compliance for Enterprise Cloud Infrastructure
Security and Compliance for Enterprise Cloud InfrastructureSecurity and Compliance for Enterprise Cloud Infrastructure
Security and Compliance for Enterprise Cloud InfrastructureCloudPassage
 
Cp7101 design and management of computer networks-requirements analysis
Cp7101 design and management of computer networks-requirements analysisCp7101 design and management of computer networks-requirements analysis
Cp7101 design and management of computer networks-requirements analysisDr Geetha Mohan
 
Integration of 5G and Block-Chain Technologies in Smart Telemedicine Using IoT
Integration of 5G and Block-Chain Technologies in Smart Telemedicine Using IoTIntegration of 5G and Block-Chain Technologies in Smart Telemedicine Using IoT
Integration of 5G and Block-Chain Technologies in Smart Telemedicine Using IoTzaman174
 
HIT 200-400 presentation handout!.ppt
HIT 200-400 presentation handout!.pptHIT 200-400 presentation handout!.ppt
HIT 200-400 presentation handout!.pptCleophasTakueNgwenya
 
Embracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifyEmbracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifySumana Mehta
 
Cloud Computing Security
Cloud Computing SecurityCloud Computing Security
Cloud Computing SecurityNithin Raj
 
BYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, WestBYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, WestJay McLaughlin
 
Lecture27 cc-security2
Lecture27 cc-security2Lecture27 cc-security2
Lecture27 cc-security2Ankit Gupta
 
10-IoT Data Analytics, Cloud Computing for IoT, Cloud Based platforms, ML for...
10-IoT Data Analytics, Cloud Computing for IoT, Cloud Based platforms, ML for...10-IoT Data Analytics, Cloud Computing for IoT, Cloud Based platforms, ML for...
10-IoT Data Analytics, Cloud Computing for IoT, Cloud Based platforms, ML for...RahulJain989779
 

Semelhante a SeaCat: and SDN End-to-end Application Containment ArchitecTure (20)

Secure Cloud Issues
Secure Cloud IssuesSecure Cloud Issues
Secure Cloud Issues
 
12-Dynamic Resource Provisioning, Security Aspects, Module-5-Cognitive comput...
12-Dynamic Resource Provisioning, Security Aspects, Module-5-Cognitive comput...12-Dynamic Resource Provisioning, Security Aspects, Module-5-Cognitive comput...
12-Dynamic Resource Provisioning, Security Aspects, Module-5-Cognitive comput...
 
Ccna sec 01
Ccna sec 01Ccna sec 01
Ccna sec 01
 
Securing elastic applications_on_mobile_devices
Securing elastic applications_on_mobile_devicesSecuring elastic applications_on_mobile_devices
Securing elastic applications_on_mobile_devices
 
Anya-Kim-Bhargava-MCCWorkshop.ppt
Anya-Kim-Bhargava-MCCWorkshop.pptAnya-Kim-Bhargava-MCCWorkshop.ppt
Anya-Kim-Bhargava-MCCWorkshop.ppt
 
Cloud Security: A matter of trust?
Cloud Security: A matter of trust?Cloud Security: A matter of trust?
Cloud Security: A matter of trust?
 
Security issue in cloud by himanshu tiwari
Security issue in cloud by himanshu tiwariSecurity issue in cloud by himanshu tiwari
Security issue in cloud by himanshu tiwari
 
BeyondCorp and Zero Trust
BeyondCorp and Zero TrustBeyondCorp and Zero Trust
BeyondCorp and Zero Trust
 
Security Issues of Cloud Computing
Security Issues of Cloud ComputingSecurity Issues of Cloud Computing
Security Issues of Cloud Computing
 
System Security Sem 2(Module 1).pptx
System Security Sem 2(Module     1).pptxSystem Security Sem 2(Module     1).pptx
System Security Sem 2(Module 1).pptx
 
Beyond Boundaries-The Power of Zero Trust Networking By Mohammed Danish Amber...
Beyond Boundaries-The Power of Zero Trust Networking By Mohammed Danish Amber...Beyond Boundaries-The Power of Zero Trust Networking By Mohammed Danish Amber...
Beyond Boundaries-The Power of Zero Trust Networking By Mohammed Danish Amber...
 
Security and Compliance for Enterprise Cloud Infrastructure
Security and Compliance for Enterprise Cloud InfrastructureSecurity and Compliance for Enterprise Cloud Infrastructure
Security and Compliance for Enterprise Cloud Infrastructure
 
Cp7101 design and management of computer networks-requirements analysis
Cp7101 design and management of computer networks-requirements analysisCp7101 design and management of computer networks-requirements analysis
Cp7101 design and management of computer networks-requirements analysis
 
Integration of 5G and Block-Chain Technologies in Smart Telemedicine Using IoT
Integration of 5G and Block-Chain Technologies in Smart Telemedicine Using IoTIntegration of 5G and Block-Chain Technologies in Smart Telemedicine Using IoT
Integration of 5G and Block-Chain Technologies in Smart Telemedicine Using IoT
 
HIT 200-400 presentation handout!.ppt
HIT 200-400 presentation handout!.pptHIT 200-400 presentation handout!.ppt
HIT 200-400 presentation handout!.ppt
 
Embracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifyEmbracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and Centrify
 
Cloud Computing Security
Cloud Computing SecurityCloud Computing Security
Cloud Computing Security
 
BYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, WestBYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, West
 
Lecture27 cc-security2
Lecture27 cc-security2Lecture27 cc-security2
Lecture27 cc-security2
 
10-IoT Data Analytics, Cloud Computing for IoT, Cloud Based platforms, ML for...
10-IoT Data Analytics, Cloud Computing for IoT, Cloud Based platforms, ML for...10-IoT Data Analytics, Cloud Computing for IoT, Cloud Based platforms, ML for...
10-IoT Data Analytics, Cloud Computing for IoT, Cloud Based platforms, ML for...
 

Mais de US-Ignite

Smart Gigabit Community Lighting Round
Smart Gigabit Community Lighting Round Smart Gigabit Community Lighting Round
Smart Gigabit Community Lighting Round US-Ignite
 
NSF PI Meeting presentation on US Ignite - Nishal Mohan
NSF PI Meeting presentation on US Ignite - Nishal MohanNSF PI Meeting presentation on US Ignite - Nishal Mohan
NSF PI Meeting presentation on US Ignite - Nishal MohanUS-Ignite
 
New Smart Gigabit Community 2017 announcement - Nishal Mohan
New Smart Gigabit Community 2017 announcement - Nishal MohanNew Smart Gigabit Community 2017 announcement - Nishal Mohan
New Smart Gigabit Community 2017 announcement - Nishal MohanUS-Ignite
 
RFP announcement for new US Ignite Smart Gigabit Cities - Nishal Mohan
RFP announcement for new US Ignite Smart Gigabit Cities - Nishal MohanRFP announcement for new US Ignite Smart Gigabit Cities - Nishal Mohan
RFP announcement for new US Ignite Smart Gigabit Cities - Nishal MohanUS-Ignite
 
Holograms in Your City: Smart Training, Data Visualization and Communication ...
Holograms in Your City: Smart Training, Data Visualization and Communication ...Holograms in Your City: Smart Training, Data Visualization and Communication ...
Holograms in Your City: Smart Training, Data Visualization and Communication ...US-Ignite
 
Innovation in Gigcity, Chattanooga TN - Ken Hayes
Innovation in Gigcity, Chattanooga TN - Ken HayesInnovation in Gigcity, Chattanooga TN - Ken Hayes
Innovation in Gigcity, Chattanooga TN - Ken HayesUS-Ignite
 
Compute for Cancer - Isaiah Blackburn
Compute for Cancer - Isaiah BlackburnCompute for Cancer - Isaiah Blackburn
Compute for Cancer - Isaiah BlackburnUS-Ignite
 
Towards Wireless-Networked Real-Time Augmented Vision - Hongwei Zhang
Towards Wireless-Networked Real-Time Augmented Vision - Hongwei ZhangTowards Wireless-Networked Real-Time Augmented Vision - Hongwei Zhang
Towards Wireless-Networked Real-Time Augmented Vision - Hongwei ZhangUS-Ignite
 
The Future of Smart & Connected Communities: Driving Science and Community Im...
The Future of Smart & Connected Communities: Driving Science and Community Im...The Future of Smart & Connected Communities: Driving Science and Community Im...
The Future of Smart & Connected Communities: Driving Science and Community Im...US-Ignite
 
Data-Driven Green Design Case Studies - Dominique Davison
Data-Driven Green Design Case Studies - Dominique DavisonData-Driven Green Design Case Studies - Dominique Davison
Data-Driven Green Design Case Studies - Dominique DavisonUS-Ignite
 
Innovation in Phoenix: City on the Rise - Dominic Papa
Innovation in Phoenix: City on the Rise - Dominic PapaInnovation in Phoenix: City on the Rise - Dominic Papa
Innovation in Phoenix: City on the Rise - Dominic PapaUS-Ignite
 
Preparing an NSF16 610 proposal
Preparing an NSF16 610 proposalPreparing an NSF16 610 proposal
Preparing an NSF16 610 proposalUS-Ignite
 
Next Generation Broadband Cities - Lightning Talks
Next Generation Broadband Cities - Lightning  TalksNext Generation Broadband Cities - Lightning  Talks
Next Generation Broadband Cities - Lightning TalksUS-Ignite
 
Innovation economy remarks to ignite! january 2016
Innovation economy  remarks to ignite! january 2016Innovation economy  remarks to ignite! january 2016
Innovation economy remarks to ignite! january 2016US-Ignite
 
The Geni Experiment Engine
The Geni Experiment EngineThe Geni Experiment Engine
The Geni Experiment EngineUS-Ignite
 
Harnessing the Power of Data, Technology and Innovation to Unlock Talent
Harnessing the Power of Data, Technology and Innovation to Unlock TalentHarnessing the Power of Data, Technology and Innovation to Unlock Talent
Harnessing the Power of Data, Technology and Innovation to Unlock TalentUS-Ignite
 
Kickoff Agenda
Kickoff AgendaKickoff Agenda
Kickoff AgendaUS-Ignite
 
2016/01/26 Glenn Ricart - Smart Gigabit Communities
2016/01/26 Glenn Ricart - Smart Gigabit Communities2016/01/26 Glenn Ricart - Smart Gigabit Communities
2016/01/26 Glenn Ricart - Smart Gigabit CommunitiesUS-Ignite
 
21 - Smart Gigabit Communities Launch - Madison
21 - Smart Gigabit Communities Launch - Madison21 - Smart Gigabit Communities Launch - Madison
21 - Smart Gigabit Communities Launch - MadisonUS-Ignite
 
20 - Smart Gigabit Communities Launch - Lafayette, LA
20 - Smart Gigabit Communities Launch - Lafayette, LA20 - Smart Gigabit Communities Launch - Lafayette, LA
20 - Smart Gigabit Communities Launch - Lafayette, LAUS-Ignite
 

Mais de US-Ignite (20)

Smart Gigabit Community Lighting Round
Smart Gigabit Community Lighting Round Smart Gigabit Community Lighting Round
Smart Gigabit Community Lighting Round
 
NSF PI Meeting presentation on US Ignite - Nishal Mohan
NSF PI Meeting presentation on US Ignite - Nishal MohanNSF PI Meeting presentation on US Ignite - Nishal Mohan
NSF PI Meeting presentation on US Ignite - Nishal Mohan
 
New Smart Gigabit Community 2017 announcement - Nishal Mohan
New Smart Gigabit Community 2017 announcement - Nishal MohanNew Smart Gigabit Community 2017 announcement - Nishal Mohan
New Smart Gigabit Community 2017 announcement - Nishal Mohan
 
RFP announcement for new US Ignite Smart Gigabit Cities - Nishal Mohan
RFP announcement for new US Ignite Smart Gigabit Cities - Nishal MohanRFP announcement for new US Ignite Smart Gigabit Cities - Nishal Mohan
RFP announcement for new US Ignite Smart Gigabit Cities - Nishal Mohan
 
Holograms in Your City: Smart Training, Data Visualization and Communication ...
Holograms in Your City: Smart Training, Data Visualization and Communication ...Holograms in Your City: Smart Training, Data Visualization and Communication ...
Holograms in Your City: Smart Training, Data Visualization and Communication ...
 
Innovation in Gigcity, Chattanooga TN - Ken Hayes
Innovation in Gigcity, Chattanooga TN - Ken HayesInnovation in Gigcity, Chattanooga TN - Ken Hayes
Innovation in Gigcity, Chattanooga TN - Ken Hayes
 
Compute for Cancer - Isaiah Blackburn
Compute for Cancer - Isaiah BlackburnCompute for Cancer - Isaiah Blackburn
Compute for Cancer - Isaiah Blackburn
 
Towards Wireless-Networked Real-Time Augmented Vision - Hongwei Zhang
Towards Wireless-Networked Real-Time Augmented Vision - Hongwei ZhangTowards Wireless-Networked Real-Time Augmented Vision - Hongwei Zhang
Towards Wireless-Networked Real-Time Augmented Vision - Hongwei Zhang
 
The Future of Smart & Connected Communities: Driving Science and Community Im...
The Future of Smart & Connected Communities: Driving Science and Community Im...The Future of Smart & Connected Communities: Driving Science and Community Im...
The Future of Smart & Connected Communities: Driving Science and Community Im...
 
Data-Driven Green Design Case Studies - Dominique Davison
Data-Driven Green Design Case Studies - Dominique DavisonData-Driven Green Design Case Studies - Dominique Davison
Data-Driven Green Design Case Studies - Dominique Davison
 
Innovation in Phoenix: City on the Rise - Dominic Papa
Innovation in Phoenix: City on the Rise - Dominic PapaInnovation in Phoenix: City on the Rise - Dominic Papa
Innovation in Phoenix: City on the Rise - Dominic Papa
 
Preparing an NSF16 610 proposal
Preparing an NSF16 610 proposalPreparing an NSF16 610 proposal
Preparing an NSF16 610 proposal
 
Next Generation Broadband Cities - Lightning Talks
Next Generation Broadband Cities - Lightning  TalksNext Generation Broadband Cities - Lightning  Talks
Next Generation Broadband Cities - Lightning Talks
 
Innovation economy remarks to ignite! january 2016
Innovation economy  remarks to ignite! january 2016Innovation economy  remarks to ignite! january 2016
Innovation economy remarks to ignite! january 2016
 
The Geni Experiment Engine
The Geni Experiment EngineThe Geni Experiment Engine
The Geni Experiment Engine
 
Harnessing the Power of Data, Technology and Innovation to Unlock Talent
Harnessing the Power of Data, Technology and Innovation to Unlock TalentHarnessing the Power of Data, Technology and Innovation to Unlock Talent
Harnessing the Power of Data, Technology and Innovation to Unlock Talent
 
Kickoff Agenda
Kickoff AgendaKickoff Agenda
Kickoff Agenda
 
2016/01/26 Glenn Ricart - Smart Gigabit Communities
2016/01/26 Glenn Ricart - Smart Gigabit Communities2016/01/26 Glenn Ricart - Smart Gigabit Communities
2016/01/26 Glenn Ricart - Smart Gigabit Communities
 
21 - Smart Gigabit Communities Launch - Madison
21 - Smart Gigabit Communities Launch - Madison21 - Smart Gigabit Communities Launch - Madison
21 - Smart Gigabit Communities Launch - Madison
 
20 - Smart Gigabit Communities Launch - Lafayette, LA
20 - Smart Gigabit Communities Launch - Lafayette, LA20 - Smart Gigabit Communities Launch - Lafayette, LA
20 - Smart Gigabit Communities Launch - Lafayette, LA
 

Último

Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptxFIDO Alliance
 
Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024Hiroshi SHIBATA
 
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Skynet Technologies
 
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdfLinux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdfFIDO Alliance
 
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...FIDO Alliance
 
Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Patrick Viafore
 
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdfSimplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdfFIDO Alliance
 
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...FIDO Alliance
 
The Metaverse: Are We There Yet?
The  Metaverse:    Are   We  There  Yet?The  Metaverse:    Are   We  There  Yet?
The Metaverse: Are We There Yet?Mark Billinghurst
 
ERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctBrainSell Technologies
 
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...FIDO Alliance
 
Working together SRE & Platform Engineering
Working together SRE & Platform EngineeringWorking together SRE & Platform Engineering
Working together SRE & Platform EngineeringMarcus Vechiato
 
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The InsideCollecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The InsideStefan Dietze
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxFIDO Alliance
 
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...ScyllaDB
 
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...FIDO Alliance
 
AI mind or machine power point presentation
AI mind or machine power point presentationAI mind or machine power point presentation
AI mind or machine power point presentationyogeshlabana357357
 
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...marcuskenyatta275
 
Intro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераIntro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераMark Opanasiuk
 

Último (20)

Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
 
Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024
 
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
 
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdfLinux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
 
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
 
Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024
 
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdfSimplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
 
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
 
The Metaverse: Are We There Yet?
The  Metaverse:    Are   We  There  Yet?The  Metaverse:    Are   We  There  Yet?
The Metaverse: Are We There Yet?
 
ERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage Intacct
 
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
 
Working together SRE & Platform Engineering
Working together SRE & Platform EngineeringWorking together SRE & Platform Engineering
Working together SRE & Platform Engineering
 
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The InsideCollecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
 
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
 
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
 
AI mind or machine power point presentation
AI mind or machine power point presentationAI mind or machine power point presentation
AI mind or machine power point presentation
 
Overview of Hyperledger Foundation
Overview of Hyperledger FoundationOverview of Hyperledger Foundation
Overview of Hyperledger Foundation
 
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
 
Intro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераIntro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджера
 

SeaCat: and SDN End-to-end Application Containment ArchitecTure

  • 1. SeaCat: an SDN End-to-end Application Containment ArchitecTure Enabling Secure Role Based Network Access in Healthcare - US Ignite Project - Kobus Van der Merwe and Brent Elieson
  • 2. Motivation • “Everything” is networked – Nearly all business applications assume network availability • Also true in healthcare – Accessing patient records – Remote diagnoses and consultation – In-home monitoring – Healthcare analytics – Plus “regular” vocational applications • HR/payroll functions, accessing domain specific literature – Plus non vocational use • Browsing the web, social networking etc.
  • 3. Motivation cont. • Problem: – Same individual, using same device potentially using several of these applications simultaneously – Applications have very different security and performance constraints: • Healthcare records: stringent regulatory privacy and security requirements • In-home patient monitoring: different privacy and security needs + reliability and soft real time guarantees • Web use: no impact on core healthcare applications
  • 4. Motivation cont. • Current approaches, combinations of: – Devices scans when new devices attach to network – Run applications on application servers with thin clients on devices – Complex network and server access control polices • Inadequate: – Device with up-to-date patch levels might still contain malware – Application servers with thin clients constrain the type of applications that can be used – Access control policies only deal with access. Provide no protection once data is accessed
  • 5. SeaCat Approach • Combine SDN and application containment: – End-to-end application containment • Non-healthcare app: – default context • Healthcare app: – dynamic app specific context – from server, through network, into device – app and data contained in this context – protect against data leakage and malicious actors
  • 6. Threat Model • Concerned with security and performance of health care applications used from variety of devices in a health care environment • Assume healthcare applications can be trusted – different from conventional threat model where device needs to be protected against untrusted applications • Specific concerns: – Unauthorized access • role based authentication and policies – Data leakage • end-to-end application containment – Resource guarantees • context based resource allocation with preemption – Denial of service • resource guarantees plus separation of resources
  • 7. SeaCat Architecture • SDN to create contexts for apps • Extend contexts into endpoint: – Controller creates virtual interfaces on host switch – Bind applications to these interfaces
  • 8. SeaCat Architecture Default context to bootstrap: 1. App uses default context -> authentication and policy entity 2. Request: create network context 3. Create context in network and host SDN 4. Application gets credentials to bind to virtual NIC (unbind from default NIC/context) 5. Traffic constrained to dedicated context
  • 9. Challenges and status • Create secure end-to-end contexts – Network and host SDN as basis – Authentication and policy driven control framework – Host application containment – Secure binding mechanisms – Need for encryption • Status and plans – Just got started • Work in progress – Explore architecture with specific healthcare apps • Electronic health records (EHR) • Medical imaging