SlideShare a Scribd company logo
SeaCat: an SDN End-to-end Application
Containment ArchitecTure
Enabling Secure Role Based Access To Sensitive Healthcare Data
Junguk Cho, David Johnson, Makito Kano,
Kobus Van der Merwe and Brent Elieson
Motivation
• “Everything” is networked
– Nearly all business applications assume network
availability
• Also true in healthcare
– Accessing patient records
– Remote diagnoses and consultation
– In-home monitoring
– Healthcare analytics
– Plus “regular” vocational applications
• HR/payroll functions, accessing domain specific literature
– Plus non vocational use
• Browsing the web, social networking etc.
Motivation cont.
• Problem:
– Same individual, using same device potentially using
several of these applications simultaneously
– Applications have very different security and performance
constraints:
• Healthcare records: stringent regulatory privacy and security
requirements
• In-home patient monitoring: different privacy and security needs +
reliability and soft real time guarantees
• Web use: no impact on core healthcare applications
– Devices are increasingly mobile (tablets, laptops,
smartphones)
• Often not part of managed and trusted enterprise environment
Motivation cont.
• Current approaches, combinations of:
– Device scans when new devices attach to network
– Run applications on application servers with thin clients on
devices
– Complex network and server access control policies
• Inadequate:
– Device with up-to-date patch levels might still contain
malware
– Application servers with thin clients constrain the type of
applications that can be used
– Access control policies only deal with access. Provide no
protection once data is accessed
Motivation cont.
• Problem generalizes to broad range of access to
sensitive data
• Different sets of regulations/practices
– Protected health information (PHI)
• HIPAA regulations
– Student educational records
• FERPA regulations
– Federal government work
• FISMA regulations
– Business requirements
• PCI DSS regulations
– Institutional requirements
• IRB regulations
SeaCat Approach
• Combine SDN and
application
containment:
– End-to-end application
containment
• Non-healthcare apps:
– default context
• Healthcare app:
– dynamic app specific
context
– app and data contained in
this end-to-end context
• Treat mobile device as
“semi-trusted” SDN
domain
– Inter-domain SDN
interaction to tie in
Threat Model
• Concerned with security and performance of health care
applications used from variety of devices in a health care
environment
• Assume healthcare applications can be trusted
– different from conventional threat model where device needs to be
protected against untrusted applications
• Specific concerns:
– Unauthorized access
• role based authentication and policies
– Data leakage
• end-to-end application containment
– Resource guarantees
• context based resource allocation with preemption
– Denial of service
• resource guarantees plus separation of resources
SeaCat Architecture:
Endpoint Containment
• Uses lightweight
containers
– Linux containers
• All applications execute
in containers:
– move “regular apps”
into default
container
• Minimize trusted
computing base:
– Only SeaCat Trusted
Daemon left in root
namespace
Motivation cont.
• Problem:
– Same individual, using same device potentially using
several of these applications simultaneously
– Applications have very different security and performance
constraints:
• Healthcare records: stringent regulatory privacy and security
requirements
• In-home patient monitoring: different privacy and security needs +
reliability and soft real time guarantees
• Web use: no impact on core healthcare applications
– Devices are increasingly mobile (tablets, laptops,
smartphones)
• Often not part of managed and trusted enterprise environment
SeaCat Architecture:
Endpoint Network Containment
• SeaCat Trusted
Daemon:
– Manages endpoint
SDN domain
• Single switch
domain:
– Sets up context for
default apps
– Sets up context for
secure apps: based
on interaction with
enterprise SDN
SeaCat Architecture:
Enterprise Network Containment
• SeaCat Server:
– Manages enterprise SDN domain
• Sets up context for secure apps
• Includes SDN-enabled WiFi
– Interacts with SeaCat trusted daemon in endpoint
• Instructs trusted daemon to start secure container
• Coordinates SDN across domains
SeaCat Architecture:
Putting it all together
• Enterprise network treats each mobile endpoint as semi-
trusted SDN domain
• Secure app user: authenticates using “normal” single-sign-on
(SSO) technology
– SeaCat server integrated with SSO
– Successful authentication triggers:
• Creation of app specific SDN context in enterprise
• Signaling to endpoint SDN to:
– Create secure container
– Create endpoint app specific SDN context
– Ties to enterprise SDN context
• App and data remains in this secure end-to-end context
• When app exits:
– Complete context is destroyed
SeaCat Workflow/Interaction
Motivation cont.
• Current approaches, combinations of:
– Device scans when new devices attach to network
– Run applications on application servers with thin clients on
devices
– Complex network and server access control policies
• Inadequate:
– Device with up-to-date patch levels might still contain
malware
– Application servers with thin clients constrain the type of
applications that can be used
– Access control policies only deal with access. Provide no
protection once data is accessed
SeaCat Workflow/Interaction
EHR
Server
Default Context
Other
Apps
Other
Apps
Other
Apps
Internet/
Non Healthcare
Resources
Mobile Endpoint
SeaCat
Enterprise/Campus
Network
SeaCat
SSO
Secure Context
1
2
SeaCat Workflow/Interaction
EHR
Server
Default Context
Other
Apps
Other
Apps
Other
Apps
Internet/
Non Healthcare
Resources
Mobile Endpoint
SeaCat
Enterprise/Campus
Network
SeaCat
SSO
Secure Context
3
SeaCat Workflow/Interaction
EHR
Server
Default Context
Other
Apps
Other
Apps
Other
Apps
Internet/
Non Healthcare
Resources
Mobile Endpoint
SeaCat
Enterprise/Campus
Network
SeaCat
SSO
Secure Context
4
5
SeaCat Workflow/Interaction
Motivation cont.
• Problem generalizes to broad range of access to
sensitive data
• Different sets of regulations/practices
– Protected health information (PHI)
• HIPAA regulations
– Student educational records
• FERPA regulations
– Federal government work
• FISMA regulations
– Business requirements
• PCI DSS regulations
– Institutional requirements
• IRB regulations
SeaCat Demo
• Mobile endpoint:
– Linux WiFi-enabled tablet
– With SeaCat Trusted Daemon:
• Container and SDN management
• Enterprise network:
– SDN enabled WiFi access point
• Tallac Networks
• Virtual APs
• Mapped to OpenFlow switch
– Rest of enterprise SDN emulated in a Mininet instance
• Single Sign On (SSO):
– Uses Shibboleth SSO
– SeaCat (Service Provider) to realize SeaCat functionality
• Medical application:
– OpenMRS (Medical Record System)
SeaCat Demo
WiFi AP
Emulated Network
HUB
Enterprise SDN Controller
VIF1
OVS
Other
Apps
Client tablet
lxc
VIF0
Ryu controller
DHCP
FLOW
MANAGER
ETH2
OVS
OpenMRS
server
SSO:
SeaCat
Service
ProviderSSO:
Identity
Provider
ETH3
H1
H2
H3
MININET
ETH0
Policy
VAP
Default
VAP
OVS
ETH0
ETH1
Wireless network
Real Ethernet network
Virtual Ethernet network
Trusted Daemon
LXC
CONTROLLER
OVS
CONTROLLER
Other
Server
H4
Enterprise/Campus Network
lxc
Status and plans
• Have working prototype…
• Current focus on access to electronic health
records
• SeaCat is a general application framework…
– other health care apps
– other apps that require access to sensitive data
• Interested in exploring possibility of trial
deployment…

More Related Content

What's hot

Medical device security presentation - Frank Siepmann
Medical device security presentation - Frank SiepmannMedical device security presentation - Frank Siepmann
Medical device security presentation - Frank Siepmann
Frank Siepmann
 
It security cognic_systems
It security cognic_systemsIt security cognic_systems
It security cognic_systems
Cognic Systems Pvt Ltd
 
Best Practices for implementing Database Security Comprehensive Database Secu...
Best Practices for implementing Database Security Comprehensive Database Secu...Best Practices for implementing Database Security Comprehensive Database Secu...
Best Practices for implementing Database Security Comprehensive Database Secu...
Kal BO
 
Reference Security Architecture for Mobility- Insurance
Reference Security Architecture for Mobility- InsuranceReference Security Architecture for Mobility- Insurance
Reference Security Architecture for Mobility- Insurance
Priyanka Aash
 
Database security
Database securityDatabase security
Database security
MaryamAsghar9
 
Database Security Management
Database Security Management Database Security Management
Database Security Management
Ahsin Yousaf
 
Cloud computing risks
Cloud computing risksCloud computing risks
Cloud computing risks
sripriya78
 
Database Security Concepts | Introduction to Database Security
Database Security Concepts | Introduction to Database SecurityDatabase Security Concepts | Introduction to Database Security
Database Security Concepts | Introduction to Database Security
Raj vardhan
 
Is iso 27001, an answer to security
Is iso 27001, an answer to securityIs iso 27001, an answer to security
Is iso 27001, an answer to security
Raghunath G
 
Data Security Explained
Data Security ExplainedData Security Explained
Data Security Explained
Happiest Minds Technologies
 
Computer Hacking Forensic Investigator - CHFI
Computer Hacking Forensic Investigator - CHFIComputer Hacking Forensic Investigator - CHFI
Computer Hacking Forensic Investigator - CHFI
EC-Council
 
#MFSummit2016 Secure: How Security and Identity Analytics can Drive Adaptive ...
#MFSummit2016 Secure: How Security and Identity Analytics can Drive Adaptive ...#MFSummit2016 Secure: How Security and Identity Analytics can Drive Adaptive ...
#MFSummit2016 Secure: How Security and Identity Analytics can Drive Adaptive ...
Micro Focus
 
Soc security-analytics
Soc security-analyticsSoc security-analytics
Soc security-analytics
bharti singhal
 
Brochure Imperva Vormetric
Brochure Imperva VormetricBrochure Imperva Vormetric
Brochure Imperva Vormetric
Michelle Guerrero Montalvo
 
U nit 4
U nit 4U nit 4
Soc security-analyticsof leotechnosoft
Soc security-analyticsof leotechnosoftSoc security-analyticsof leotechnosoft
Soc security-analyticsof leotechnosoft
hardik soni
 
Internet of Things - An Architectural Perspective
Internet of Things - An Architectural PerspectiveInternet of Things - An Architectural Perspective
Internet of Things - An Architectural Perspective
Gaurav Awasthi
 
Data security
Data securityData security
Data security
AbdulBasit938
 
Database Security
Database SecurityDatabase Security
Database Security
Ferdous Pathan
 
Final Presentation
Final PresentationFinal Presentation
Final Presentation
chris odle
 

What's hot (20)

Medical device security presentation - Frank Siepmann
Medical device security presentation - Frank SiepmannMedical device security presentation - Frank Siepmann
Medical device security presentation - Frank Siepmann
 
It security cognic_systems
It security cognic_systemsIt security cognic_systems
It security cognic_systems
 
Best Practices for implementing Database Security Comprehensive Database Secu...
Best Practices for implementing Database Security Comprehensive Database Secu...Best Practices for implementing Database Security Comprehensive Database Secu...
Best Practices for implementing Database Security Comprehensive Database Secu...
 
Reference Security Architecture for Mobility- Insurance
Reference Security Architecture for Mobility- InsuranceReference Security Architecture for Mobility- Insurance
Reference Security Architecture for Mobility- Insurance
 
Database security
Database securityDatabase security
Database security
 
Database Security Management
Database Security Management Database Security Management
Database Security Management
 
Cloud computing risks
Cloud computing risksCloud computing risks
Cloud computing risks
 
Database Security Concepts | Introduction to Database Security
Database Security Concepts | Introduction to Database SecurityDatabase Security Concepts | Introduction to Database Security
Database Security Concepts | Introduction to Database Security
 
Is iso 27001, an answer to security
Is iso 27001, an answer to securityIs iso 27001, an answer to security
Is iso 27001, an answer to security
 
Data Security Explained
Data Security ExplainedData Security Explained
Data Security Explained
 
Computer Hacking Forensic Investigator - CHFI
Computer Hacking Forensic Investigator - CHFIComputer Hacking Forensic Investigator - CHFI
Computer Hacking Forensic Investigator - CHFI
 
#MFSummit2016 Secure: How Security and Identity Analytics can Drive Adaptive ...
#MFSummit2016 Secure: How Security and Identity Analytics can Drive Adaptive ...#MFSummit2016 Secure: How Security and Identity Analytics can Drive Adaptive ...
#MFSummit2016 Secure: How Security and Identity Analytics can Drive Adaptive ...
 
Soc security-analytics
Soc security-analyticsSoc security-analytics
Soc security-analytics
 
Brochure Imperva Vormetric
Brochure Imperva VormetricBrochure Imperva Vormetric
Brochure Imperva Vormetric
 
U nit 4
U nit 4U nit 4
U nit 4
 
Soc security-analyticsof leotechnosoft
Soc security-analyticsof leotechnosoftSoc security-analyticsof leotechnosoft
Soc security-analyticsof leotechnosoft
 
Internet of Things - An Architectural Perspective
Internet of Things - An Architectural PerspectiveInternet of Things - An Architectural Perspective
Internet of Things - An Architectural Perspective
 
Data security
Data securityData security
Data security
 
Database Security
Database SecurityDatabase Security
Database Security
 
Final Presentation
Final PresentationFinal Presentation
Final Presentation
 

Viewers also liked

ParaDrop
ParaDropParaDrop
ParaDrop
US-Ignite
 
Access control
Access controlAccess control
Access control
arj_presenter
 
Context-aware mobile messages
Context-aware mobile messagesContext-aware mobile messages
Context-aware mobile messages
Coldbeans Software
 
SecureDroid: An Android Security Framework Extension for Context-Aware policy...
SecureDroid: An Android Security Framework Extension for Context-Aware policy...SecureDroid: An Android Security Framework Extension for Context-Aware policy...
SecureDroid: An Android Security Framework Extension for Context-Aware policy...
Giuseppe La Torre
 
Usability Assessment of a Context-Aware and Personality-Based Mobile Recommen...
Usability Assessment of a Context-Aware and Personality-Based Mobile Recommen...Usability Assessment of a Context-Aware and Personality-Based Mobile Recommen...
Usability Assessment of a Context-Aware and Personality-Based Mobile Recommen...
Matthias Braunhofer
 
Ieee project-2014-2015-context-based-access-control-systems
Ieee project-2014-2015-context-based-access-control-systemsIeee project-2014-2015-context-based-access-control-systems
Ieee project-2014-2015-context-based-access-control-systems
Steph Cliche
 
Semantic security framework and context-aware role-based access control ontol...
Semantic security framework and context-aware role-based access control ontol...Semantic security framework and context-aware role-based access control ontol...
Semantic security framework and context-aware role-based access control ontol...
Natalia Díaz Rodríguez
 
Con8819 context and risk aware access control any device any where - final
Con8819   context and risk aware access control any device any where - finalCon8819   context and risk aware access control any device any where - final
Con8819 context and risk aware access control any device any where - final
OracleIDM
 

Viewers also liked (8)

ParaDrop
ParaDropParaDrop
ParaDrop
 
Access control
Access controlAccess control
Access control
 
Context-aware mobile messages
Context-aware mobile messagesContext-aware mobile messages
Context-aware mobile messages
 
SecureDroid: An Android Security Framework Extension for Context-Aware policy...
SecureDroid: An Android Security Framework Extension for Context-Aware policy...SecureDroid: An Android Security Framework Extension for Context-Aware policy...
SecureDroid: An Android Security Framework Extension for Context-Aware policy...
 
Usability Assessment of a Context-Aware and Personality-Based Mobile Recommen...
Usability Assessment of a Context-Aware and Personality-Based Mobile Recommen...Usability Assessment of a Context-Aware and Personality-Based Mobile Recommen...
Usability Assessment of a Context-Aware and Personality-Based Mobile Recommen...
 
Ieee project-2014-2015-context-based-access-control-systems
Ieee project-2014-2015-context-based-access-control-systemsIeee project-2014-2015-context-based-access-control-systems
Ieee project-2014-2015-context-based-access-control-systems
 
Semantic security framework and context-aware role-based access control ontol...
Semantic security framework and context-aware role-based access control ontol...Semantic security framework and context-aware role-based access control ontol...
Semantic security framework and context-aware role-based access control ontol...
 
Con8819 context and risk aware access control any device any where - final
Con8819   context and risk aware access control any device any where - finalCon8819   context and risk aware access control any device any where - final
Con8819 context and risk aware access control any device any where - final
 

Similar to SeaCat: SDN End-to-End Application Containment

BYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, WestBYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, West
Jay McLaughlin
 
Embracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifyEmbracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and Centrify
Sumana Mehta
 
Cloud Security: A matter of trust?
Cloud Security: A matter of trust?Cloud Security: A matter of trust?
Cloud Security: A matter of trust?
Mark Williams
 
Infosec policies to appsec standards ed final
Infosec policies to appsec standards   ed finalInfosec policies to appsec standards   ed final
Infosec policies to appsec standards ed final
eadams2330
 
Mobile Middleware and Mobility in the Enterprise - Yad Jaura, Marketing Manag...
Mobile Middleware and Mobility in the Enterprise - Yad Jaura, Marketing Manag...Mobile Middleware and Mobility in the Enterprise - Yad Jaura, Marketing Manag...
Mobile Middleware and Mobility in the Enterprise - Yad Jaura, Marketing Manag...
mfrancis
 
Security and Compliance for Enterprise Cloud Infrastructure
Security and Compliance for Enterprise Cloud InfrastructureSecurity and Compliance for Enterprise Cloud Infrastructure
Security and Compliance for Enterprise Cloud Infrastructure
CloudPassage
 
Regulatory Intelligence
Regulatory IntelligenceRegulatory Intelligence
Regulatory Intelligence
Armin Torres
 
Bringing Government and Enterprise Security Controls to the Android Endpoint
Bringing Government and Enterprise Security Controls to the Android EndpointBringing Government and Enterprise Security Controls to the Android Endpoint
Bringing Government and Enterprise Security Controls to the Android Endpoint
Hamilton Turner
 
Dealing with Web Application Security, Regulation Style
Dealing with Web Application Security, Regulation StyleDealing with Web Application Security, Regulation Style
Dealing with Web Application Security, Regulation Style
Rochester Security Summit
 
2015 Angelbeat_ConvergenceMsg-FINAL
2015 Angelbeat_ConvergenceMsg-FINAL2015 Angelbeat_ConvergenceMsg-FINAL
2015 Angelbeat_ConvergenceMsg-FINAL
Rick Kingsley
 
NTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon Swain
NTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon SwainNTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon Swain
NTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon Swain
North Texas Chapter of the ISSA
 
Prism presentation
Prism presentationPrism presentation
Prism presentation
Lakshmi .
 
Aplication data security compliances
Aplication data security compliancesAplication data security compliances
Aplication data security compliances
Ahmadi Madi
 
[Sencha 엔터프라이즈 웹애플리케이션 세미나] BYOD - Sencha space
[Sencha 엔터프라이즈 웹애플리케이션 세미나] BYOD - Sencha space[Sencha 엔터프라이즈 웹애플리케이션 세미나] BYOD - Sencha space
[Sencha 엔터프라이즈 웹애플리케이션 세미나] BYOD - Sencha space
미래웹기술연구소 (MIRAE WEB)
 
Secure Cloud Issues
Secure Cloud IssuesSecure Cloud Issues
Secure Cloud Issues
Devyani Vaidya
 
Develop and Enforce a Bring-Your-Own-Device (BYOD) Policy
Develop and Enforce a Bring-Your-Own-Device (BYOD) PolicyDevelop and Enforce a Bring-Your-Own-Device (BYOD) Policy
Develop and Enforce a Bring-Your-Own-Device (BYOD) Policy
OracleIDM
 
Security Management in Cloud Computing by Shivani Gogia - Aravali College of ...
Security Management in Cloud Computing by Shivani Gogia - Aravali College of ...Security Management in Cloud Computing by Shivani Gogia - Aravali College of ...
Security Management in Cloud Computing by Shivani Gogia - Aravali College of ...
acemindia
 
talk6securingcloudamarprusty-191030091632.pptx
talk6securingcloudamarprusty-191030091632.pptxtalk6securingcloudamarprusty-191030091632.pptx
talk6securingcloudamarprusty-191030091632.pptx
TrongMinhHoang1
 
Himss 2016 Lunch & Learn: Data Security in IoT (and ePHI Risks)
Himss 2016 Lunch & Learn: Data Security in IoT (and ePHI Risks)Himss 2016 Lunch & Learn: Data Security in IoT (and ePHI Risks)
Himss 2016 Lunch & Learn: Data Security in IoT (and ePHI Risks)
OnRamp
 
Securing your Cloud Deployment
Securing your Cloud DeploymentSecuring your Cloud Deployment
Securing your Cloud Deployment
Hrusostomos Vicatos
 

Similar to SeaCat: SDN End-to-End Application Containment (20)

BYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, WestBYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, West
 
Embracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifyEmbracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and Centrify
 
Cloud Security: A matter of trust?
Cloud Security: A matter of trust?Cloud Security: A matter of trust?
Cloud Security: A matter of trust?
 
Infosec policies to appsec standards ed final
Infosec policies to appsec standards   ed finalInfosec policies to appsec standards   ed final
Infosec policies to appsec standards ed final
 
Mobile Middleware and Mobility in the Enterprise - Yad Jaura, Marketing Manag...
Mobile Middleware and Mobility in the Enterprise - Yad Jaura, Marketing Manag...Mobile Middleware and Mobility in the Enterprise - Yad Jaura, Marketing Manag...
Mobile Middleware and Mobility in the Enterprise - Yad Jaura, Marketing Manag...
 
Security and Compliance for Enterprise Cloud Infrastructure
Security and Compliance for Enterprise Cloud InfrastructureSecurity and Compliance for Enterprise Cloud Infrastructure
Security and Compliance for Enterprise Cloud Infrastructure
 
Regulatory Intelligence
Regulatory IntelligenceRegulatory Intelligence
Regulatory Intelligence
 
Bringing Government and Enterprise Security Controls to the Android Endpoint
Bringing Government and Enterprise Security Controls to the Android EndpointBringing Government and Enterprise Security Controls to the Android Endpoint
Bringing Government and Enterprise Security Controls to the Android Endpoint
 
Dealing with Web Application Security, Regulation Style
Dealing with Web Application Security, Regulation StyleDealing with Web Application Security, Regulation Style
Dealing with Web Application Security, Regulation Style
 
2015 Angelbeat_ConvergenceMsg-FINAL
2015 Angelbeat_ConvergenceMsg-FINAL2015 Angelbeat_ConvergenceMsg-FINAL
2015 Angelbeat_ConvergenceMsg-FINAL
 
NTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon Swain
NTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon SwainNTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon Swain
NTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon Swain
 
Prism presentation
Prism presentationPrism presentation
Prism presentation
 
Aplication data security compliances
Aplication data security compliancesAplication data security compliances
Aplication data security compliances
 
[Sencha 엔터프라이즈 웹애플리케이션 세미나] BYOD - Sencha space
[Sencha 엔터프라이즈 웹애플리케이션 세미나] BYOD - Sencha space[Sencha 엔터프라이즈 웹애플리케이션 세미나] BYOD - Sencha space
[Sencha 엔터프라이즈 웹애플리케이션 세미나] BYOD - Sencha space
 
Secure Cloud Issues
Secure Cloud IssuesSecure Cloud Issues
Secure Cloud Issues
 
Develop and Enforce a Bring-Your-Own-Device (BYOD) Policy
Develop and Enforce a Bring-Your-Own-Device (BYOD) PolicyDevelop and Enforce a Bring-Your-Own-Device (BYOD) Policy
Develop and Enforce a Bring-Your-Own-Device (BYOD) Policy
 
Security Management in Cloud Computing by Shivani Gogia - Aravali College of ...
Security Management in Cloud Computing by Shivani Gogia - Aravali College of ...Security Management in Cloud Computing by Shivani Gogia - Aravali College of ...
Security Management in Cloud Computing by Shivani Gogia - Aravali College of ...
 
talk6securingcloudamarprusty-191030091632.pptx
talk6securingcloudamarprusty-191030091632.pptxtalk6securingcloudamarprusty-191030091632.pptx
talk6securingcloudamarprusty-191030091632.pptx
 
Himss 2016 Lunch & Learn: Data Security in IoT (and ePHI Risks)
Himss 2016 Lunch & Learn: Data Security in IoT (and ePHI Risks)Himss 2016 Lunch & Learn: Data Security in IoT (and ePHI Risks)
Himss 2016 Lunch & Learn: Data Security in IoT (and ePHI Risks)
 
Securing your Cloud Deployment
Securing your Cloud DeploymentSecuring your Cloud Deployment
Securing your Cloud Deployment
 

More from US-Ignite

Smart Gigabit Community Lighting Round
Smart Gigabit Community Lighting Round Smart Gigabit Community Lighting Round
Smart Gigabit Community Lighting Round
US-Ignite
 
NSF PI Meeting presentation on US Ignite - Nishal Mohan
NSF PI Meeting presentation on US Ignite - Nishal MohanNSF PI Meeting presentation on US Ignite - Nishal Mohan
NSF PI Meeting presentation on US Ignite - Nishal Mohan
US-Ignite
 
New Smart Gigabit Community 2017 announcement - Nishal Mohan
New Smart Gigabit Community 2017 announcement - Nishal MohanNew Smart Gigabit Community 2017 announcement - Nishal Mohan
New Smart Gigabit Community 2017 announcement - Nishal Mohan
US-Ignite
 
RFP announcement for new US Ignite Smart Gigabit Cities - Nishal Mohan
RFP announcement for new US Ignite Smart Gigabit Cities - Nishal MohanRFP announcement for new US Ignite Smart Gigabit Cities - Nishal Mohan
RFP announcement for new US Ignite Smart Gigabit Cities - Nishal Mohan
US-Ignite
 
Holograms in Your City: Smart Training, Data Visualization and Communication ...
Holograms in Your City: Smart Training, Data Visualization and Communication ...Holograms in Your City: Smart Training, Data Visualization and Communication ...
Holograms in Your City: Smart Training, Data Visualization and Communication ...
US-Ignite
 
Innovation in Gigcity, Chattanooga TN - Ken Hayes
Innovation in Gigcity, Chattanooga TN - Ken HayesInnovation in Gigcity, Chattanooga TN - Ken Hayes
Innovation in Gigcity, Chattanooga TN - Ken Hayes
US-Ignite
 
Compute for Cancer - Isaiah Blackburn
Compute for Cancer - Isaiah BlackburnCompute for Cancer - Isaiah Blackburn
Compute for Cancer - Isaiah Blackburn
US-Ignite
 
Towards Wireless-Networked Real-Time Augmented Vision - Hongwei Zhang
Towards Wireless-Networked Real-Time Augmented Vision - Hongwei ZhangTowards Wireless-Networked Real-Time Augmented Vision - Hongwei Zhang
Towards Wireless-Networked Real-Time Augmented Vision - Hongwei Zhang
US-Ignite
 
The Future of Smart & Connected Communities: Driving Science and Community Im...
The Future of Smart & Connected Communities: Driving Science and Community Im...The Future of Smart & Connected Communities: Driving Science and Community Im...
The Future of Smart & Connected Communities: Driving Science and Community Im...
US-Ignite
 
Data-Driven Green Design Case Studies - Dominique Davison
Data-Driven Green Design Case Studies - Dominique DavisonData-Driven Green Design Case Studies - Dominique Davison
Data-Driven Green Design Case Studies - Dominique Davison
US-Ignite
 
Innovation in Phoenix: City on the Rise - Dominic Papa
Innovation in Phoenix: City on the Rise - Dominic PapaInnovation in Phoenix: City on the Rise - Dominic Papa
Innovation in Phoenix: City on the Rise - Dominic Papa
US-Ignite
 
Preparing an NSF16 610 proposal
Preparing an NSF16 610 proposalPreparing an NSF16 610 proposal
Preparing an NSF16 610 proposal
US-Ignite
 
Next Generation Broadband Cities - Lightning Talks
Next Generation Broadband Cities - Lightning  TalksNext Generation Broadband Cities - Lightning  Talks
Next Generation Broadband Cities - Lightning Talks
US-Ignite
 
Innovation economy remarks to ignite! january 2016
Innovation economy  remarks to ignite! january 2016Innovation economy  remarks to ignite! january 2016
Innovation economy remarks to ignite! january 2016
US-Ignite
 
The Geni Experiment Engine
The Geni Experiment EngineThe Geni Experiment Engine
The Geni Experiment Engine
US-Ignite
 
Harnessing the Power of Data, Technology and Innovation to Unlock Talent
Harnessing the Power of Data, Technology and Innovation to Unlock TalentHarnessing the Power of Data, Technology and Innovation to Unlock Talent
Harnessing the Power of Data, Technology and Innovation to Unlock Talent
US-Ignite
 
Kickoff Agenda
Kickoff AgendaKickoff Agenda
Kickoff Agenda
US-Ignite
 
2016/01/26 Glenn Ricart - Smart Gigabit Communities
2016/01/26 Glenn Ricart - Smart Gigabit Communities2016/01/26 Glenn Ricart - Smart Gigabit Communities
2016/01/26 Glenn Ricart - Smart Gigabit Communities
US-Ignite
 
21 - Smart Gigabit Communities Launch - Madison
21 - Smart Gigabit Communities Launch - Madison21 - Smart Gigabit Communities Launch - Madison
21 - Smart Gigabit Communities Launch - Madison
US-Ignite
 
20 - Smart Gigabit Communities Launch - Lafayette, LA
20 - Smart Gigabit Communities Launch - Lafayette, LA20 - Smart Gigabit Communities Launch - Lafayette, LA
20 - Smart Gigabit Communities Launch - Lafayette, LA
US-Ignite
 

More from US-Ignite (20)

Smart Gigabit Community Lighting Round
Smart Gigabit Community Lighting Round Smart Gigabit Community Lighting Round
Smart Gigabit Community Lighting Round
 
NSF PI Meeting presentation on US Ignite - Nishal Mohan
NSF PI Meeting presentation on US Ignite - Nishal MohanNSF PI Meeting presentation on US Ignite - Nishal Mohan
NSF PI Meeting presentation on US Ignite - Nishal Mohan
 
New Smart Gigabit Community 2017 announcement - Nishal Mohan
New Smart Gigabit Community 2017 announcement - Nishal MohanNew Smart Gigabit Community 2017 announcement - Nishal Mohan
New Smart Gigabit Community 2017 announcement - Nishal Mohan
 
RFP announcement for new US Ignite Smart Gigabit Cities - Nishal Mohan
RFP announcement for new US Ignite Smart Gigabit Cities - Nishal MohanRFP announcement for new US Ignite Smart Gigabit Cities - Nishal Mohan
RFP announcement for new US Ignite Smart Gigabit Cities - Nishal Mohan
 
Holograms in Your City: Smart Training, Data Visualization and Communication ...
Holograms in Your City: Smart Training, Data Visualization and Communication ...Holograms in Your City: Smart Training, Data Visualization and Communication ...
Holograms in Your City: Smart Training, Data Visualization and Communication ...
 
Innovation in Gigcity, Chattanooga TN - Ken Hayes
Innovation in Gigcity, Chattanooga TN - Ken HayesInnovation in Gigcity, Chattanooga TN - Ken Hayes
Innovation in Gigcity, Chattanooga TN - Ken Hayes
 
Compute for Cancer - Isaiah Blackburn
Compute for Cancer - Isaiah BlackburnCompute for Cancer - Isaiah Blackburn
Compute for Cancer - Isaiah Blackburn
 
Towards Wireless-Networked Real-Time Augmented Vision - Hongwei Zhang
Towards Wireless-Networked Real-Time Augmented Vision - Hongwei ZhangTowards Wireless-Networked Real-Time Augmented Vision - Hongwei Zhang
Towards Wireless-Networked Real-Time Augmented Vision - Hongwei Zhang
 
The Future of Smart & Connected Communities: Driving Science and Community Im...
The Future of Smart & Connected Communities: Driving Science and Community Im...The Future of Smart & Connected Communities: Driving Science and Community Im...
The Future of Smart & Connected Communities: Driving Science and Community Im...
 
Data-Driven Green Design Case Studies - Dominique Davison
Data-Driven Green Design Case Studies - Dominique DavisonData-Driven Green Design Case Studies - Dominique Davison
Data-Driven Green Design Case Studies - Dominique Davison
 
Innovation in Phoenix: City on the Rise - Dominic Papa
Innovation in Phoenix: City on the Rise - Dominic PapaInnovation in Phoenix: City on the Rise - Dominic Papa
Innovation in Phoenix: City on the Rise - Dominic Papa
 
Preparing an NSF16 610 proposal
Preparing an NSF16 610 proposalPreparing an NSF16 610 proposal
Preparing an NSF16 610 proposal
 
Next Generation Broadband Cities - Lightning Talks
Next Generation Broadband Cities - Lightning  TalksNext Generation Broadband Cities - Lightning  Talks
Next Generation Broadband Cities - Lightning Talks
 
Innovation economy remarks to ignite! january 2016
Innovation economy  remarks to ignite! january 2016Innovation economy  remarks to ignite! january 2016
Innovation economy remarks to ignite! january 2016
 
The Geni Experiment Engine
The Geni Experiment EngineThe Geni Experiment Engine
The Geni Experiment Engine
 
Harnessing the Power of Data, Technology and Innovation to Unlock Talent
Harnessing the Power of Data, Technology and Innovation to Unlock TalentHarnessing the Power of Data, Technology and Innovation to Unlock Talent
Harnessing the Power of Data, Technology and Innovation to Unlock Talent
 
Kickoff Agenda
Kickoff AgendaKickoff Agenda
Kickoff Agenda
 
2016/01/26 Glenn Ricart - Smart Gigabit Communities
2016/01/26 Glenn Ricart - Smart Gigabit Communities2016/01/26 Glenn Ricart - Smart Gigabit Communities
2016/01/26 Glenn Ricart - Smart Gigabit Communities
 
21 - Smart Gigabit Communities Launch - Madison
21 - Smart Gigabit Communities Launch - Madison21 - Smart Gigabit Communities Launch - Madison
21 - Smart Gigabit Communities Launch - Madison
 
20 - Smart Gigabit Communities Launch - Lafayette, LA
20 - Smart Gigabit Communities Launch - Lafayette, LA20 - Smart Gigabit Communities Launch - Lafayette, LA
20 - Smart Gigabit Communities Launch - Lafayette, LA
 

Recently uploaded

How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
Chart Kalyan
 
GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)
Javier Junquera
 
JavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green MasterplanJavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green Masterplan
Miro Wengner
 
Apps Break Data
Apps Break DataApps Break Data
Apps Break Data
Ivo Velitchkov
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
panagenda
 
What is an RPA CoE? Session 1 – CoE Vision
What is an RPA CoE?  Session 1 – CoE VisionWhat is an RPA CoE?  Session 1 – CoE Vision
What is an RPA CoE? Session 1 – CoE Vision
DianaGray10
 
Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |
AstuteBusiness
 
Y-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PPY-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PP
c5vrf27qcz
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
akankshawande
 
Principle of conventional tomography-Bibash Shahi ppt..pptx
Principle of conventional tomography-Bibash Shahi ppt..pptxPrinciple of conventional tomography-Bibash Shahi ppt..pptx
Principle of conventional tomography-Bibash Shahi ppt..pptx
BibashShahi
 
Mutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented ChatbotsMutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented Chatbots
Pablo Gómez Abajo
 
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectorsConnector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
DianaGray10
 
Harnessing the Power of NLP and Knowledge Graphs for Opioid Research
Harnessing the Power of NLP and Knowledge Graphs for Opioid ResearchHarnessing the Power of NLP and Knowledge Graphs for Opioid Research
Harnessing the Power of NLP and Knowledge Graphs for Opioid Research
Neo4j
 
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
saastr
 
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge GraphGraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
Neo4j
 
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-EfficiencyFreshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
ScyllaDB
 
Essentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation ParametersEssentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation Parameters
Safe Software
 
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
DanBrown980551
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 

Recently uploaded (20)

How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
 
GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)
 
JavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green MasterplanJavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green Masterplan
 
Apps Break Data
Apps Break DataApps Break Data
Apps Break Data
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
 
What is an RPA CoE? Session 1 – CoE Vision
What is an RPA CoE?  Session 1 – CoE VisionWhat is an RPA CoE?  Session 1 – CoE Vision
What is an RPA CoE? Session 1 – CoE Vision
 
Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |
 
Y-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PPY-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PP
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
 
Principle of conventional tomography-Bibash Shahi ppt..pptx
Principle of conventional tomography-Bibash Shahi ppt..pptxPrinciple of conventional tomography-Bibash Shahi ppt..pptx
Principle of conventional tomography-Bibash Shahi ppt..pptx
 
Mutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented ChatbotsMutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented Chatbots
 
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectorsConnector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
 
Harnessing the Power of NLP and Knowledge Graphs for Opioid Research
Harnessing the Power of NLP and Knowledge Graphs for Opioid ResearchHarnessing the Power of NLP and Knowledge Graphs for Opioid Research
Harnessing the Power of NLP and Knowledge Graphs for Opioid Research
 
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
 
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge GraphGraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
 
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-EfficiencyFreshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
 
Essentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation ParametersEssentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation Parameters
 
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 

SeaCat: SDN End-to-End Application Containment

  • 1. SeaCat: an SDN End-to-end Application Containment ArchitecTure Enabling Secure Role Based Access To Sensitive Healthcare Data Junguk Cho, David Johnson, Makito Kano, Kobus Van der Merwe and Brent Elieson
  • 2. Motivation • “Everything” is networked – Nearly all business applications assume network availability • Also true in healthcare – Accessing patient records – Remote diagnoses and consultation – In-home monitoring – Healthcare analytics – Plus “regular” vocational applications • HR/payroll functions, accessing domain specific literature – Plus non vocational use • Browsing the web, social networking etc.
  • 3. Motivation cont. • Problem: – Same individual, using same device potentially using several of these applications simultaneously – Applications have very different security and performance constraints: • Healthcare records: stringent regulatory privacy and security requirements • In-home patient monitoring: different privacy and security needs + reliability and soft real time guarantees • Web use: no impact on core healthcare applications – Devices are increasingly mobile (tablets, laptops, smartphones) • Often not part of managed and trusted enterprise environment
  • 4. Motivation cont. • Current approaches, combinations of: – Device scans when new devices attach to network – Run applications on application servers with thin clients on devices – Complex network and server access control policies • Inadequate: – Device with up-to-date patch levels might still contain malware – Application servers with thin clients constrain the type of applications that can be used – Access control policies only deal with access. Provide no protection once data is accessed
  • 5. Motivation cont. • Problem generalizes to broad range of access to sensitive data • Different sets of regulations/practices – Protected health information (PHI) • HIPAA regulations – Student educational records • FERPA regulations – Federal government work • FISMA regulations – Business requirements • PCI DSS regulations – Institutional requirements • IRB regulations
  • 6. SeaCat Approach • Combine SDN and application containment: – End-to-end application containment • Non-healthcare apps: – default context • Healthcare app: – dynamic app specific context – app and data contained in this end-to-end context • Treat mobile device as “semi-trusted” SDN domain – Inter-domain SDN interaction to tie in
  • 7. Threat Model • Concerned with security and performance of health care applications used from variety of devices in a health care environment • Assume healthcare applications can be trusted – different from conventional threat model where device needs to be protected against untrusted applications • Specific concerns: – Unauthorized access • role based authentication and policies – Data leakage • end-to-end application containment – Resource guarantees • context based resource allocation with preemption – Denial of service • resource guarantees plus separation of resources
  • 8. SeaCat Architecture: Endpoint Containment • Uses lightweight containers – Linux containers • All applications execute in containers: – move “regular apps” into default container • Minimize trusted computing base: – Only SeaCat Trusted Daemon left in root namespace
  • 9. Motivation cont. • Problem: – Same individual, using same device potentially using several of these applications simultaneously – Applications have very different security and performance constraints: • Healthcare records: stringent regulatory privacy and security requirements • In-home patient monitoring: different privacy and security needs + reliability and soft real time guarantees • Web use: no impact on core healthcare applications – Devices are increasingly mobile (tablets, laptops, smartphones) • Often not part of managed and trusted enterprise environment
  • 10. SeaCat Architecture: Endpoint Network Containment • SeaCat Trusted Daemon: – Manages endpoint SDN domain • Single switch domain: – Sets up context for default apps – Sets up context for secure apps: based on interaction with enterprise SDN
  • 11. SeaCat Architecture: Enterprise Network Containment • SeaCat Server: – Manages enterprise SDN domain • Sets up context for secure apps • Includes SDN-enabled WiFi – Interacts with SeaCat trusted daemon in endpoint • Instructs trusted daemon to start secure container • Coordinates SDN across domains
  • 12. SeaCat Architecture: Putting it all together • Enterprise network treats each mobile endpoint as semi- trusted SDN domain • Secure app user: authenticates using “normal” single-sign-on (SSO) technology – SeaCat server integrated with SSO – Successful authentication triggers: • Creation of app specific SDN context in enterprise • Signaling to endpoint SDN to: – Create secure container – Create endpoint app specific SDN context – Ties to enterprise SDN context • App and data remains in this secure end-to-end context • When app exits: – Complete context is destroyed
  • 14. Motivation cont. • Current approaches, combinations of: – Device scans when new devices attach to network – Run applications on application servers with thin clients on devices – Complex network and server access control policies • Inadequate: – Device with up-to-date patch levels might still contain malware – Application servers with thin clients constrain the type of applications that can be used – Access control policies only deal with access. Provide no protection once data is accessed
  • 16. EHR Server Default Context Other Apps Other Apps Other Apps Internet/ Non Healthcare Resources Mobile Endpoint SeaCat Enterprise/Campus Network SeaCat SSO Secure Context 1 2 SeaCat Workflow/Interaction
  • 17. EHR Server Default Context Other Apps Other Apps Other Apps Internet/ Non Healthcare Resources Mobile Endpoint SeaCat Enterprise/Campus Network SeaCat SSO Secure Context 3 SeaCat Workflow/Interaction
  • 18. EHR Server Default Context Other Apps Other Apps Other Apps Internet/ Non Healthcare Resources Mobile Endpoint SeaCat Enterprise/Campus Network SeaCat SSO Secure Context 4 5 SeaCat Workflow/Interaction
  • 19. Motivation cont. • Problem generalizes to broad range of access to sensitive data • Different sets of regulations/practices – Protected health information (PHI) • HIPAA regulations – Student educational records • FERPA regulations – Federal government work • FISMA regulations – Business requirements • PCI DSS regulations – Institutional requirements • IRB regulations
  • 20. SeaCat Demo • Mobile endpoint: – Linux WiFi-enabled tablet – With SeaCat Trusted Daemon: • Container and SDN management • Enterprise network: – SDN enabled WiFi access point • Tallac Networks • Virtual APs • Mapped to OpenFlow switch – Rest of enterprise SDN emulated in a Mininet instance • Single Sign On (SSO): – Uses Shibboleth SSO – SeaCat (Service Provider) to realize SeaCat functionality • Medical application: – OpenMRS (Medical Record System)
  • 21. SeaCat Demo WiFi AP Emulated Network HUB Enterprise SDN Controller VIF1 OVS Other Apps Client tablet lxc VIF0 Ryu controller DHCP FLOW MANAGER ETH2 OVS OpenMRS server SSO: SeaCat Service ProviderSSO: Identity Provider ETH3 H1 H2 H3 MININET ETH0 Policy VAP Default VAP OVS ETH0 ETH1 Wireless network Real Ethernet network Virtual Ethernet network Trusted Daemon LXC CONTROLLER OVS CONTROLLER Other Server H4 Enterprise/Campus Network lxc
  • 22. Status and plans • Have working prototype… • Current focus on access to electronic health records • SeaCat is a general application framework… – other health care apps – other apps that require access to sensitive data • Interested in exploring possibility of trial deployment…