A SECURE GRID ENABLED SIGNATURE VERIFICATION SYSTEM
-
Upload
janna-mcclain -
Category
Documents
-
view
45 -
download
7
description
Transcript of A SECURE GRID ENABLED SIGNATURE VERIFICATION SYSTEM
![Page 1: A SECURE GRID ENABLED SIGNATURE VERIFICATION SYSTEM](https://reader035.fdocuments.us/reader035/viewer/2022062422/56813524550346895d9c8c6f/html5/thumbnails/1.jpg)
A SECURE GRID ENABLED
SIGNATURE VERIFICATION SYSTEM
Mohammad F. Tolba
Mohammad S. Abdel-Wahab
Ismail A. Taha
Ahmad M. Al-Shishtawy
Scientific Computing Department
Faculty of Computer and Information Sciences
Ain Shams University
Cairo, Egypt
![Page 2: A SECURE GRID ENABLED SIGNATURE VERIFICATION SYSTEM](https://reader035.fdocuments.us/reader035/viewer/2022062422/56813524550346895d9c8c6f/html5/thumbnails/2.jpg)
Agenda
● Introduction.● Possible Scenarios.● The Grid Approach.● Implementation and Results.● Conclusions & Future Work.
![Page 3: A SECURE GRID ENABLED SIGNATURE VERIFICATION SYSTEM](https://reader035.fdocuments.us/reader035/viewer/2022062422/56813524550346895d9c8c6f/html5/thumbnails/3.jpg)
The Signature Verification
Problem
● Signatures databases.● Signature verification algorithms.● Suspected signature.● User's QoS.
![Page 4: A SECURE GRID ENABLED SIGNATURE VERIFICATION SYSTEM](https://reader035.fdocuments.us/reader035/viewer/2022062422/56813524550346895d9c8c6f/html5/thumbnails/4.jpg)
Agenda
✔ Introduction.● Possible Scenarios.● The Grid Approach.● Implementation and Results.● Conclusions & Future Work.
![Page 5: A SECURE GRID ENABLED SIGNATURE VERIFICATION SYSTEM](https://reader035.fdocuments.us/reader035/viewer/2022062422/56813524550346895d9c8c6f/html5/thumbnails/5.jpg)
The Old Scenario
![Page 6: A SECURE GRID ENABLED SIGNATURE VERIFICATION SYSTEM](https://reader035.fdocuments.us/reader035/viewer/2022062422/56813524550346895d9c8c6f/html5/thumbnails/6.jpg)
The Old Scenario
(Requirements)● DBMS + DB with all signatures sets.● All algorithms needed by the user(s).● Dedicated computer with sufficient
power.● Administration, maintenance, and
upgrades.
![Page 7: A SECURE GRID ENABLED SIGNATURE VERIFICATION SYSTEM](https://reader035.fdocuments.us/reader035/viewer/2022062422/56813524550346895d9c8c6f/html5/thumbnails/7.jpg)
The Old Scenario (Problems)
● Large DB size.● High maintenance cost.● Update with new alg. & signatures.
Security:● DB integrity (not compromised).● Verify source of alg. & DB (correctness).● Risky to give all DB to the users.
![Page 8: A SECURE GRID ENABLED SIGNATURE VERIFICATION SYSTEM](https://reader035.fdocuments.us/reader035/viewer/2022062422/56813524550346895d9c8c6f/html5/thumbnails/8.jpg)
The Modern Scenario
![Page 9: A SECURE GRID ENABLED SIGNATURE VERIFICATION SYSTEM](https://reader035.fdocuments.us/reader035/viewer/2022062422/56813524550346895d9c8c6f/html5/thumbnails/9.jpg)
The Modern Scenario
![Page 10: A SECURE GRID ENABLED SIGNATURE VERIFICATION SYSTEM](https://reader035.fdocuments.us/reader035/viewer/2022062422/56813524550346895d9c8c6f/html5/thumbnails/10.jpg)
The Modern Scenario
(Requirements)
User:● Credentials (Password, Private Key, ...).● Web browser.
Server:● Suitable processing power.● Signature verification algorithms.● Signatures database.
![Page 11: A SECURE GRID ENABLED SIGNATURE VERIFICATION SYSTEM](https://reader035.fdocuments.us/reader035/viewer/2022062422/56813524550346895d9c8c6f/html5/thumbnails/11.jpg)
The Modern Scenario
(Problems)
● Mirrors have same problems as old
scenario.● Implement a complex and secure
infrastructure specifically for this
problem.● Define standards for inter-operation.
![Page 12: A SECURE GRID ENABLED SIGNATURE VERIFICATION SYSTEM](https://reader035.fdocuments.us/reader035/viewer/2022062422/56813524550346895d9c8c6f/html5/thumbnails/12.jpg)
Agenda
✔ Introduction.✔ Possible Scenarios.● The Grid Approach.● Implementation and Results.● Conclusions & Future Work.
![Page 13: A SECURE GRID ENABLED SIGNATURE VERIFICATION SYSTEM](https://reader035.fdocuments.us/reader035/viewer/2022062422/56813524550346895d9c8c6f/html5/thumbnails/13.jpg)
Basic Grid Services
Resource
Management
Information
Services
Data
Management
Security
![Page 14: A SECURE GRID ENABLED SIGNATURE VERIFICATION SYSTEM](https://reader035.fdocuments.us/reader035/viewer/2022062422/56813524550346895d9c8c6f/html5/thumbnails/14.jpg)
The Grid Scenario
![Page 15: A SECURE GRID ENABLED SIGNATURE VERIFICATION SYSTEM](https://reader035.fdocuments.us/reader035/viewer/2022062422/56813524550346895d9c8c6f/html5/thumbnails/15.jpg)
The Grid Scenario
![Page 16: A SECURE GRID ENABLED SIGNATURE VERIFICATION SYSTEM](https://reader035.fdocuments.us/reader035/viewer/2022062422/56813524550346895d9c8c6f/html5/thumbnails/16.jpg)
The Grid Scenario
![Page 17: A SECURE GRID ENABLED SIGNATURE VERIFICATION SYSTEM](https://reader035.fdocuments.us/reader035/viewer/2022062422/56813524550346895d9c8c6f/html5/thumbnails/17.jpg)
The Grid Scenario
![Page 18: A SECURE GRID ENABLED SIGNATURE VERIFICATION SYSTEM](https://reader035.fdocuments.us/reader035/viewer/2022062422/56813524550346895d9c8c6f/html5/thumbnails/18.jpg)
The Grid Scenario
![Page 19: A SECURE GRID ENABLED SIGNATURE VERIFICATION SYSTEM](https://reader035.fdocuments.us/reader035/viewer/2022062422/56813524550346895d9c8c6f/html5/thumbnails/19.jpg)
The Grid Scenario
![Page 20: A SECURE GRID ENABLED SIGNATURE VERIFICATION SYSTEM](https://reader035.fdocuments.us/reader035/viewer/2022062422/56813524550346895d9c8c6f/html5/thumbnails/20.jpg)
The Grid Scenario
(Requirements)● User:
– Globus ToolKit installed.– Appropriate certificates.– Grid enabled application.
● Server:– Globus ToolKit installed.– Appropriate certificates.– Signature verification algorithms.– and/or signatures database.– Information service.
![Page 21: A SECURE GRID ENABLED SIGNATURE VERIFICATION SYSTEM](https://reader035.fdocuments.us/reader035/viewer/2022062422/56813524550346895d9c8c6f/html5/thumbnails/21.jpg)
The Grid Scenario (Security)
● GIS provides authentication & login.● GASS & GridFTP for secure transfer of
signatures sets.● Different trust relationships through
Certificate Authorities.● Database kept at secure locations.● Trusted source for algorithm and processing.
![Page 22: A SECURE GRID ENABLED SIGNATURE VERIFICATION SYSTEM](https://reader035.fdocuments.us/reader035/viewer/2022062422/56813524550346895d9c8c6f/html5/thumbnails/22.jpg)
The Grid Scenario (Advantages)
● Dynamic environment.● Reduced cost.● Secure.● Complex issues hidden by Grid services● Different user QoS.● Reliable & Fault Tolerant.
![Page 23: A SECURE GRID ENABLED SIGNATURE VERIFICATION SYSTEM](https://reader035.fdocuments.us/reader035/viewer/2022062422/56813524550346895d9c8c6f/html5/thumbnails/23.jpg)
Agenda
✔ Introduction.✔ Possible Scenarios.✔ The Grid Approach.● Implementation and Results.● Conclusions & Future Work.
![Page 24: A SECURE GRID ENABLED SIGNATURE VERIFICATION SYSTEM](https://reader035.fdocuments.us/reader035/viewer/2022062422/56813524550346895d9c8c6f/html5/thumbnails/24.jpg)
Implementation
● Joint project between:– Ain Shams University in Egypt– George Washington University in USA
● Three Grid Nodes:– GWU Node: Processing Cluster + Database– ASU1 Node: Processing Cluster– ASU2 Node: Database
![Page 25: A SECURE GRID ENABLED SIGNATURE VERIFICATION SYSTEM](https://reader035.fdocuments.us/reader035/viewer/2022062422/56813524550346895d9c8c6f/html5/thumbnails/25.jpg)
ResultsDatabase
EGYPT ASU1 ASU2 GWU
ASU1 X 0.27 1.27
ASU2 X X X
Pro
cess
ing
GWU X 1.31 0.51
Database USA
ASU1 ASU2 GWU ASU1 X 0.45 1.26
ASU2 X X X P
roce
ssin
g
GWU X 1.14 0.25
![Page 26: A SECURE GRID ENABLED SIGNATURE VERIFICATION SYSTEM](https://reader035.fdocuments.us/reader035/viewer/2022062422/56813524550346895d9c8c6f/html5/thumbnails/26.jpg)
Results
● Sequential Single Machine:– Average of 34 Seconds
● The Grid Enabled System:– Average of 49 Seconds
![Page 27: A SECURE GRID ENABLED SIGNATURE VERIFICATION SYSTEM](https://reader035.fdocuments.us/reader035/viewer/2022062422/56813524550346895d9c8c6f/html5/thumbnails/27.jpg)
Agenda
✔ Introduction.✔ Possible Scenarios.✔ The Grid Approach.✔ Implementation and Results.● Conclusions & Future Work.
![Page 28: A SECURE GRID ENABLED SIGNATURE VERIFICATION SYSTEM](https://reader035.fdocuments.us/reader035/viewer/2022062422/56813524550346895d9c8c6f/html5/thumbnails/28.jpg)
Conclusions
● Grid enables new applications.● Grid infrastructure hide complexities
(seamless access to resources).● Increased Security (GSI).● Acceptable performance.● Other similar applications can use Grid
Technologies.
![Page 29: A SECURE GRID ENABLED SIGNATURE VERIFICATION SYSTEM](https://reader035.fdocuments.us/reader035/viewer/2022062422/56813524550346895d9c8c6f/html5/thumbnails/29.jpg)
Future Work
● Add More Signature Verification
Algorithms.● Improve Algorithms for locating and
choosing best algorithms.● Address the financial issues.
![Page 30: A SECURE GRID ENABLED SIGNATURE VERIFICATION SYSTEM](https://reader035.fdocuments.us/reader035/viewer/2022062422/56813524550346895d9c8c6f/html5/thumbnails/30.jpg)
The End
Thank you for careful listening