SECURITY MANAGEMENT IN DISTRIBUTED SYSTEMS.pptx

BlessingsMinga1 127 views 21 slides Jun 06, 2024
Slide 1
Slide 1 of 21
Slide 1
1
Slide 2
2
Slide 3
3
Slide 4
4
Slide 5
5
Slide 6
6
Slide 7
7
Slide 8
8
Slide 9
9
Slide 10
10
Slide 11
11
Slide 12
12
Slide 13
13
Slide 14
14
Slide 15
15
Slide 16
16
Slide 17
17
Slide 18
18
Slide 19
19
Slide 20
20
Slide 21
21

About This Presentation

In a distributed system, one must consider many possible security risks. To mitigate these risks there are a number of strategies that can be employed: Encryption algorithms that protect data in transit and at rest. Firewalls that limit access to specific ports/cables.


Slide Content

SECURITY IN DISTRIBUTED SYSTEM Key Management and Secure Group Management

WHAT IS THE SECURITY IN DS? security in distributed systems is a complex area that requires a comprehensive approach to address the challenges posed by distributed environments. Key management and secure group management are two critical aspects of ensuring security in distributed systems.

DEFINITION A distributed system is a collection of Multiple interconnected computers that communicate and coordinate actions. Examples of distributed systems: Cloud computing Sensor network Blockchain

IMPORTANCE OF SECURITY IN DS Distributed systems handle sensitive data, exposing them to various security threats - Government and military data: Breaches can threaten national security. Hackers can exploit vulnerabilities in distributed systems to gain unauthorized access to resources.

SECURITY CONCERNS IN DS Data confidentiality Data integrity Access control Secure communication Availability and resilience

KEY MANAGEMENT IN DS Key management is a process of creating, distributing, storing, and managing cryptographic keys used to secure data in a distributed system Cryptographic keys are the foundation of secure communication.

EXAMPLE OF CRYPTOGRAPHIC KEYS Symmetric keys; also known as secret keys Asymmetric keys; also known as public keys Session keys Key derivation keys Certificate keys

FUNCTIONS OF KEY MANAGEMENT Helps in Key generation that creates strong, random keys. Also in Key distribution which securely delivers keys to authorized parties. Key storage which protects keys from unauthorized access and compromise. In Key usage which provides employing keys for encryption and decryption tasks.

KEY MANAGEMENT APPROACHES Centralized Key Management: Involves storing and managing all encryption keys in a centralized system for enhanced security and operational efficiency. Support for Multiple Encryption Standards: Enables compatibility with various encryption algorithms. Regular Key Backups: Ensures regular backup of encryption keys to prevent data loss in case of key compromise or system failures.

TECHNIQUES FOR KEY MANAGEMENT Inventory and Cataloging Secure Key Generation Secure Key Distribution Secure Key Storage

…CONT Inventory and Cataloging Create a list of all cryptographic keys and their owners. Maintain a central record of key details. Secure Key Generation Use reliable methods to create strong, unique keys. Ensure keys have enough complexity to prevent attacks. Secure Key Distribution Safely transfer keys to authorized systems or users. Use secure protocols to prevent unauthorized access. Secure Key Storage Store keys in secure locations, like hardware devices. Control who can access the stored keys.

SECURE GROUP MANAGEMENT IN DS involves effectively managing groups containing numerous members with high rates of membership turnover to ensure secure communication and data access. It focuses on : implementing cryptographic techniques, key management, and secure protocols to maintain confidentiality. The goal is to address challenges like controlling access to preventing unauthorized access and managing group interactions securely.

FUNCTIONS OF SECURE GROUP MANAGEMENT User Categorization : Organizing users based on roles or departments. Permission Assignment : Efficiently assigning access rights to group members. Access Control : Controlling resource access for multiple users at once. Member Management : Ensuring former members can't access group materials. Content Security : Restricting new members from accessing past materials.

GROUP COMMUNICATION MODELS Linear Model: One-way communication flow, with a sender and receivers. Interactive Model: Two-way communication with continuous feedback between participants. Transactional Model: Continuous, back-and-forth communication with shared responsibility. Network Model: Complex communication patterns within a group, with multiple senders and receivers.

SECURE GROUP COMMUNICATION PROTOCOLS A set of cryptographic techniques and procedures used to establish and maintain secure communication within a group of participants. Signal Protocol: Widely used for secure mobile messaging. Vulnerabilities in group conversations related to consistency and integrity. Centralized and Distributed Schemes: Centralized: Managed by a central authority. Distributed: Collaboration among group members.

SECURE GROUP MANAGEMENT CHALLENGES Group Proliferation : Rapid growth and sprawl of groups can make them difficult to manage. Membership Maintenance : Keeping track of who is in each group and updating memberships is challenging. Nested Groups : Complex hierarchies of nested groups add complexity to access control. Granular Access Control : Providing the right level of access to resources for each group is difficult. Auditing and Compliance : Demonstrating proper access controls and group management for compliance purposes is complex.

SECURE GROUP MANAGEMENT USE CASES Group Creation : Setting up new groups for specific projects, teams, or access control purposes. Adding/Removing Members : Efficiently managing group membership by adding and removing users as needed. Key Distribution : Updating and securely distributing keys or access credentials within groups.

AIMS OF SECURE GROUP MANAGEMENT Protect group data and resources from unauthorized access. Manage group membership and access rights effectively. Maintain secure communication channels within the group. Implement robust cryptographic methods and key management. Ensure the overall confidentiality, integrity, and availability of group-related information.

TECHNIQUES OF SECURE GROUP MANAGEMENT Categorizing Users : Organizing users based on roles, departments, or project teams to efficiently assign permissions and control resource access for multiple users simultaneously. Secure Network Management System (SNMS): Introducing a new protocol called SNMS and provide secure channels between network managers and agents. Access Control and Authentication : putting in place authentication procedures and access control systems to confirm group members.

CHALLENGES OF SECURITY IN DISTRIBUTED SYSTEM Complexity: makes it difficult to implement and manage security controls consistently across the entire system. Divergence : The variety of the system makes it difficult to ensure consistent security standards and practices. Data Sharing Risks: Addressing the risks associated with reckless data sharing that can increase exposure to threats and security costs.

THANK YOU!!!