jini

10
JINI An Authentication and Authorization Architecture for Jini Services

Upload: dieter

Post on 05-Jan-2016

37 views

Category:

Documents


2 download

DESCRIPTION

JINI. An Authentication and Authorization Architecture for Jini Services. An ICSI Story. Clients needs services  ICSI newcomers need a flat Services needs clients  Landlords want to lease their flats Marketplace needed  Home Finders Bulletin (or ask Diane) - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: JINI

JINI

An Authentication and Authorization Architecture for Jini Services

Page 2: JINI

An ICSI Story

• Clients needs services ICSI newcomers need a flat

• Services needs clients Landlords want to lease their flats

• Marketplace needed Home Finders Bulletin (or ask Diane)

• How to find marketplace Yellow Pages

Page 3: JINI

An ICSI Story, Part 2

• Communication marketplace -> Specify preferences -> List of offerings, + Tel-No.

• Client-Server communication -> ICSI newcomer calls a landlord

• Problems -> List out of date

• Solution -> Landlord must lease entry in list, renewal, otherwise remove from list

Page 4: JINI

LookupService

Service

= Housing Broker ???

Client

ProxyProxyProxyProxyProxy

Templ

ateProxy Proxy

Proxy

Page 5: JINI

Jini Concepts

• Discovery (Yellow Pages)

• Lookup (Home Finders Bulletin)

• Leasing (Leasing of list entry)

• Remote Events– ICSI newcomers receives new offers

• Transaction– Key exchange at HFB: Key Money

Page 6: JINI

Home Environment

• TV service + Storage service = VCR service• lawn sprinkler + weather service• defect -> maintenance service -> appointment

service• general: leasing appropriate for spontaneous

networking• PDA -> conference room -> printer access

Page 7: JINI

Why Security?

• Only subscribers should get offers– authentication needed

• Different packages are offered: standard $30, premium $50; restricted access– authorization required

• Internet communication insecure: data can be read, altered or replayed– Integrity, Confidentiality required

Page 8: JINI

Secure Communication

• Proxies are signed (Integrity + Identity)

• All communication is encrypted using a secret session key (Confidentiality)

• Message Authentication Code (Integrity)

• Transaction Numbers (Replay attacks)

Page 9: JINI

The Architecture

Client &Proxy

Client &Proxy

RemoteCbHandler

RemoteCbHandler

ServiceService

Challenge Resp. Srv.

Challenge Resp. Srv.

BlueDotService

BlueDotService

PolicyService

PolicyService

LoginService

LoginService

UserDBService

UserDBService

Page 10: JINI

Highlights

• Uses standard Java technology

• Transparency for the client

• Minimal Overhead at server side

• Powerful login policies

• First Prototype up and running

• Internal Java Authorizations mechanisms

• Well adapted for home services: TV, fridge