SlideShare una empresa de Scribd logo
1 de 9
SeaCat: an SDN End-to-end
Application Containment ArchitecTure
Enabling Secure Role Based Network Access in Healthcare
- US Ignite Project -
Kobus Van der Merwe
and Brent Elieson
Motivation
• “Everything” is networked
– Nearly all business applications assume network
availability
• Also true in healthcare
– Accessing patient records
– Remote diagnoses and consultation
– In-home monitoring
– Healthcare analytics
– Plus “regular” vocational applications
• HR/payroll functions, accessing domain specific literature
– Plus non vocational use
• Browsing the web, social networking etc.
Motivation cont.
• Problem:
– Same individual, using same device potentially
using several of these applications simultaneously
– Applications have very different security and
performance constraints:
• Healthcare records: stringent regulatory privacy and
security requirements
• In-home patient monitoring: different privacy and
security needs + reliability and soft real time
guarantees
• Web use: no impact on core healthcare applications
Motivation cont.
• Current approaches, combinations of:
– Devices scans when new devices attach to network
– Run applications on application servers with thin clients on
devices
– Complex network and server access control polices
• Inadequate:
– Device with up-to-date patch levels might still contain
malware
– Application servers with thin clients constrain the type of
applications that can be used
– Access control policies only deal with access. Provide no
protection once data is accessed
SeaCat Approach
• Combine SDN and
application
containment:
– End-to-end application
containment
• Non-healthcare app:
– default context
• Healthcare app:
– dynamic app specific
context
– from server, through
network, into device
– app and data contained in
this context
– protect against data leakage
and malicious actors
Threat Model
• Concerned with security and performance of health care
applications used from variety of devices in a health care
environment
• Assume healthcare applications can be trusted
– different from conventional threat model where device needs to be
protected against untrusted applications
• Specific concerns:
– Unauthorized access
• role based authentication and policies
– Data leakage
• end-to-end application containment
– Resource guarantees
• context based resource allocation with preemption
– Denial of service
• resource guarantees plus separation of resources
SeaCat Architecture
• SDN to create
contexts for
apps
• Extend contexts
into endpoint:
– Controller
creates virtual
interfaces on
host switch
– Bind
applications to
these interfaces
SeaCat Architecture
Default context to bootstrap:
1. App uses default
context ->
authentication and
policy entity
2. Request: create
network context
3. Create context in
network and host SDN
4. Application gets
credentials to bind to
virtual NIC (unbind from
default NIC/context)
5. Traffic constrained to
dedicated context
Challenges and status
• Create secure end-to-end contexts
– Network and host SDN as basis
– Authentication and policy driven control framework
– Host application containment
– Secure binding mechanisms
– Need for encryption
• Status and plans
– Just got started
• Work in progress
– Explore architecture with specific healthcare apps
• Electronic health records (EHR)
• Medical imaging

Más contenido relacionado

La actualidad más candente

Viewfinity Application Control and Monitoring 2015
Viewfinity Application Control and Monitoring 2015Viewfinity Application Control and Monitoring 2015
Viewfinity Application Control and Monitoring 2015Joseph Iannelli
 
Internet of Things - An Architectural Perspective
Internet of Things - An Architectural PerspectiveInternet of Things - An Architectural Perspective
Internet of Things - An Architectural PerspectiveGaurav Awasthi
 
Private Data - Keep Out!
Private Data - Keep Out!Private Data - Keep Out!
Private Data - Keep Out!Greg Parmer
 
Soc security-analytics
Soc security-analyticsSoc security-analytics
Soc security-analyticsbharti singhal
 
Needle in the Haystack—User Behavior Anomaly Detection for Information Securi...
Needle in the Haystack—User Behavior Anomaly Detection for Information Securi...Needle in the Haystack—User Behavior Anomaly Detection for Information Securi...
Needle in the Haystack—User Behavior Anomaly Detection for Information Securi...Databricks
 
Soc security-analyticsof leotechnosoft
Soc security-analyticsof leotechnosoftSoc security-analyticsof leotechnosoft
Soc security-analyticsof leotechnosofthardik soni
 
Cybernetic protectors
Cybernetic protectorsCybernetic protectors
Cybernetic protectorsvishnuRajan20
 
Security Architecture
Security ArchitectureSecurity Architecture
Security ArchitectureJoben Domingo
 
Crime Investigation with Cybernetic Protector
Crime Investigation with Cybernetic ProtectorCrime Investigation with Cybernetic Protector
Crime Investigation with Cybernetic ProtectorIRJET Journal
 
International Journal on Cryptography and Information Security ( IJCIS)
International Journal on Cryptography and Information Security ( IJCIS)International Journal on Cryptography and Information Security ( IJCIS)
International Journal on Cryptography and Information Security ( IJCIS)ijcisjournal
 
International Journal on Cryptography and Information Security (IJCIS)
International Journal on Cryptography and Information Security (IJCIS)International Journal on Cryptography and Information Security (IJCIS)
International Journal on Cryptography and Information Security (IJCIS)ijcisjournal
 
Logs in Security and Compliance flare
Logs in Security and Compliance flareLogs in Security and Compliance flare
Logs in Security and Compliance flarezilberberg
 
JPA1404 Context-based Access Control Systems for Mobile Devices
JPA1404  Context-based Access Control Systems for Mobile DevicesJPA1404  Context-based Access Control Systems for Mobile Devices
JPA1404 Context-based Access Control Systems for Mobile Deviceschennaijp
 
Ieee project-2014-2015-context-based-access-control-systems
Ieee project-2014-2015-context-based-access-control-systemsIeee project-2014-2015-context-based-access-control-systems
Ieee project-2014-2015-context-based-access-control-systemsSteph Cliche
 

La actualidad más candente (19)

Viewfinity Application Control and Monitoring 2015
Viewfinity Application Control and Monitoring 2015Viewfinity Application Control and Monitoring 2015
Viewfinity Application Control and Monitoring 2015
 
Internet of Things - An Architectural Perspective
Internet of Things - An Architectural PerspectiveInternet of Things - An Architectural Perspective
Internet of Things - An Architectural Perspective
 
Security Software
Security SoftwareSecurity Software
Security Software
 
Private Data - Keep Out!
Private Data - Keep Out!Private Data - Keep Out!
Private Data - Keep Out!
 
Slides
SlidesSlides
Slides
 
Soc security-analytics
Soc security-analyticsSoc security-analytics
Soc security-analytics
 
Gs Ch1
Gs Ch1Gs Ch1
Gs Ch1
 
Needle in the Haystack—User Behavior Anomaly Detection for Information Securi...
Needle in the Haystack—User Behavior Anomaly Detection for Information Securi...Needle in the Haystack—User Behavior Anomaly Detection for Information Securi...
Needle in the Haystack—User Behavior Anomaly Detection for Information Securi...
 
Soc security-analyticsof leotechnosoft
Soc security-analyticsof leotechnosoftSoc security-analyticsof leotechnosoft
Soc security-analyticsof leotechnosoft
 
Cybernetic protectors
Cybernetic protectorsCybernetic protectors
Cybernetic protectors
 
Security Architecture
Security ArchitectureSecurity Architecture
Security Architecture
 
Ijisa
IjisaIjisa
Ijisa
 
Crime Investigation with Cybernetic Protector
Crime Investigation with Cybernetic ProtectorCrime Investigation with Cybernetic Protector
Crime Investigation with Cybernetic Protector
 
International Journal on Cryptography and Information Security ( IJCIS)
International Journal on Cryptography and Information Security ( IJCIS)International Journal on Cryptography and Information Security ( IJCIS)
International Journal on Cryptography and Information Security ( IJCIS)
 
International Journal on Cryptography and Information Security (IJCIS)
International Journal on Cryptography and Information Security (IJCIS)International Journal on Cryptography and Information Security (IJCIS)
International Journal on Cryptography and Information Security (IJCIS)
 
Ijisa
IjisaIjisa
Ijisa
 
Logs in Security and Compliance flare
Logs in Security and Compliance flareLogs in Security and Compliance flare
Logs in Security and Compliance flare
 
JPA1404 Context-based Access Control Systems for Mobile Devices
JPA1404  Context-based Access Control Systems for Mobile DevicesJPA1404  Context-based Access Control Systems for Mobile Devices
JPA1404 Context-based Access Control Systems for Mobile Devices
 
Ieee project-2014-2015-context-based-access-control-systems
Ieee project-2014-2015-context-based-access-control-systemsIeee project-2014-2015-context-based-access-control-systems
Ieee project-2014-2015-context-based-access-control-systems
 

Destacado

Network scoring for 2015 healthcare conferences
Network scoring for 2015 healthcare conferencesNetwork scoring for 2015 healthcare conferences
Network scoring for 2015 healthcare conferencesW2O Group
 
Social Network Gaming
Social Network GamingSocial Network Gaming
Social Network GamingAshkan Mehran
 
Use case diagram
Use case diagramUse case diagram
Use case diagramRaz Friman
 
Nonprofits, Healthcare, and Social Media
Nonprofits, Healthcare, and Social MediaNonprofits, Healthcare, and Social Media
Nonprofits, Healthcare, and Social MediaBeth Kanter
 
Obstetrics, Gynecology, and Twitter: A Primer on Strategic Social Media to Im...
Obstetrics, Gynecology, and Twitter: A Primer on Strategic Social Media to Im...Obstetrics, Gynecology, and Twitter: A Primer on Strategic Social Media to Im...
Obstetrics, Gynecology, and Twitter: A Primer on Strategic Social Media to Im...Neel Shah
 
Healthcare Professionals' Social Networks: The Beginning of the End of Pharma...
Healthcare Professionals' Social Networks: The Beginning of the End of Pharma...Healthcare Professionals' Social Networks: The Beginning of the End of Pharma...
Healthcare Professionals' Social Networks: The Beginning of the End of Pharma...Len Starnes
 
Aurkut - A social Networking website
Aurkut - A social Networking websiteAurkut - A social Networking website
Aurkut - A social Networking websiteAbhijeet Kalsi
 
The New Era of Healthcare Communications
The New Era of Healthcare CommunicationsThe New Era of Healthcare Communications
The New Era of Healthcare CommunicationsLee Aase
 
Social Networking Website
Social Networking WebsiteSocial Networking Website
Social Networking Websiteguestec05a4
 
SRS Of Social Networking
SRS Of Social NetworkingSRS Of Social Networking
SRS Of Social Networkingmaaano786
 
Healthcare Social Networking: Is Pharma Ready to Join the Conversation?
Healthcare Social Networking: Is Pharma Ready to Join the Conversation?Healthcare Social Networking: Is Pharma Ready to Join the Conversation?
Healthcare Social Networking: Is Pharma Ready to Join the Conversation?Len Starnes
 
Edge Talk 1 April 2016 with Tom Lee of Symplur presentation
Edge Talk 1 April 2016 with Tom Lee of Symplur presentationEdge Talk 1 April 2016 with Tom Lee of Symplur presentation
Edge Talk 1 April 2016 with Tom Lee of Symplur presentationHorizons NHS
 
project report of social networking web sites
project report of social networking web sitesproject report of social networking web sites
project report of social networking web sitesGyanendra Pratap Singh
 
Hand gesture recognition system(FYP REPORT)
Hand gesture recognition system(FYP REPORT)Hand gesture recognition system(FYP REPORT)
Hand gesture recognition system(FYP REPORT)Afnan Rehman
 
Social Networking Project
Social Networking ProjectSocial Networking Project
Social Networking Projectjessduff44
 
10 Tech Trends in Healthcare
10 Tech Trends in Healthcare10 Tech Trends in Healthcare
10 Tech Trends in HealthcareVala Afshar
 
Social Networking Project (website) full documentation
Social Networking Project (website) full documentation Social Networking Project (website) full documentation
Social Networking Project (website) full documentation Tenzin Tendar
 
Social Media In Healthcare: Coming of Age
Social Media In Healthcare: Coming of AgeSocial Media In Healthcare: Coming of Age
Social Media In Healthcare: Coming of AgeLee Aase
 

Destacado (20)

Network scoring for 2015 healthcare conferences
Network scoring for 2015 healthcare conferencesNetwork scoring for 2015 healthcare conferences
Network scoring for 2015 healthcare conferences
 
Social Network Gaming
Social Network GamingSocial Network Gaming
Social Network Gaming
 
Use case diagram
Use case diagramUse case diagram
Use case diagram
 
Nonprofits, Healthcare, and Social Media
Nonprofits, Healthcare, and Social MediaNonprofits, Healthcare, and Social Media
Nonprofits, Healthcare, and Social Media
 
Obstetrics, Gynecology, and Twitter: A Primer on Strategic Social Media to Im...
Obstetrics, Gynecology, and Twitter: A Primer on Strategic Social Media to Im...Obstetrics, Gynecology, and Twitter: A Primer on Strategic Social Media to Im...
Obstetrics, Gynecology, and Twitter: A Primer on Strategic Social Media to Im...
 
Healthcare Professionals' Social Networks: The Beginning of the End of Pharma...
Healthcare Professionals' Social Networks: The Beginning of the End of Pharma...Healthcare Professionals' Social Networks: The Beginning of the End of Pharma...
Healthcare Professionals' Social Networks: The Beginning of the End of Pharma...
 
Aurkut - A social Networking website
Aurkut - A social Networking websiteAurkut - A social Networking website
Aurkut - A social Networking website
 
The New Era of Healthcare Communications
The New Era of Healthcare CommunicationsThe New Era of Healthcare Communications
The New Era of Healthcare Communications
 
Social Networking Website
Social Networking WebsiteSocial Networking Website
Social Networking Website
 
SRS Of Social Networking
SRS Of Social NetworkingSRS Of Social Networking
SRS Of Social Networking
 
social networking site
social networking sitesocial networking site
social networking site
 
Healthcare Social Networking: Is Pharma Ready to Join the Conversation?
Healthcare Social Networking: Is Pharma Ready to Join the Conversation?Healthcare Social Networking: Is Pharma Ready to Join the Conversation?
Healthcare Social Networking: Is Pharma Ready to Join the Conversation?
 
Edge Talk 1 April 2016 with Tom Lee of Symplur presentation
Edge Talk 1 April 2016 with Tom Lee of Symplur presentationEdge Talk 1 April 2016 with Tom Lee of Symplur presentation
Edge Talk 1 April 2016 with Tom Lee of Symplur presentation
 
project report of social networking web sites
project report of social networking web sitesproject report of social networking web sites
project report of social networking web sites
 
Social networking
Social networkingSocial networking
Social networking
 
Hand gesture recognition system(FYP REPORT)
Hand gesture recognition system(FYP REPORT)Hand gesture recognition system(FYP REPORT)
Hand gesture recognition system(FYP REPORT)
 
Social Networking Project
Social Networking ProjectSocial Networking Project
Social Networking Project
 
10 Tech Trends in Healthcare
10 Tech Trends in Healthcare10 Tech Trends in Healthcare
10 Tech Trends in Healthcare
 
Social Networking Project (website) full documentation
Social Networking Project (website) full documentation Social Networking Project (website) full documentation
Social Networking Project (website) full documentation
 
Social Media In Healthcare: Coming of Age
Social Media In Healthcare: Coming of AgeSocial Media In Healthcare: Coming of Age
Social Media In Healthcare: Coming of Age
 

Similar a SeaCat: and SDN End-to-end Application Containment ArchitecTure

12-Dynamic Resource Provisioning, Security Aspects, Module-5-Cognitive comput...
12-Dynamic Resource Provisioning, Security Aspects, Module-5-Cognitive comput...12-Dynamic Resource Provisioning, Security Aspects, Module-5-Cognitive comput...
12-Dynamic Resource Provisioning, Security Aspects, Module-5-Cognitive comput...RahulJain989779
 
Securing elastic applications_on_mobile_devices
Securing elastic applications_on_mobile_devicesSecuring elastic applications_on_mobile_devices
Securing elastic applications_on_mobile_devicesfirzhan naqash
 
Anya-Kim-Bhargava-MCCWorkshop.ppt
Anya-Kim-Bhargava-MCCWorkshop.pptAnya-Kim-Bhargava-MCCWorkshop.ppt
Anya-Kim-Bhargava-MCCWorkshop.pptTaskinKhaleque
 
Cloud Security: A matter of trust?
Cloud Security: A matter of trust?Cloud Security: A matter of trust?
Cloud Security: A matter of trust?Mark Williams
 
Security issue in cloud by himanshu tiwari
Security issue in cloud by himanshu tiwariSecurity issue in cloud by himanshu tiwari
Security issue in cloud by himanshu tiwaribhanu krishna
 
BeyondCorp and Zero Trust
BeyondCorp and Zero TrustBeyondCorp and Zero Trust
BeyondCorp and Zero TrustIvan Dwyer
 
Security Issues of Cloud Computing
Security Issues of Cloud ComputingSecurity Issues of Cloud Computing
Security Issues of Cloud ComputingFalgun Rathod
 
System Security Sem 2(Module 1).pptx
System Security Sem 2(Module     1).pptxSystem Security Sem 2(Module     1).pptx
System Security Sem 2(Module 1).pptxrahulkumarcscsf21
 
Beyond Boundaries-The Power of Zero Trust Networking By Mohammed Danish Amber...
Beyond Boundaries-The Power of Zero Trust Networking By Mohammed Danish Amber...Beyond Boundaries-The Power of Zero Trust Networking By Mohammed Danish Amber...
Beyond Boundaries-The Power of Zero Trust Networking By Mohammed Danish Amber...null - The Open Security Community
 
Security and Compliance for Enterprise Cloud Infrastructure
Security and Compliance for Enterprise Cloud InfrastructureSecurity and Compliance for Enterprise Cloud Infrastructure
Security and Compliance for Enterprise Cloud InfrastructureCloudPassage
 
Cp7101 design and management of computer networks-requirements analysis
Cp7101 design and management of computer networks-requirements analysisCp7101 design and management of computer networks-requirements analysis
Cp7101 design and management of computer networks-requirements analysisDr Geetha Mohan
 
Integration of 5G and Block-Chain Technologies in Smart Telemedicine Using IoT
Integration of 5G and Block-Chain Technologies in Smart Telemedicine Using IoTIntegration of 5G and Block-Chain Technologies in Smart Telemedicine Using IoT
Integration of 5G and Block-Chain Technologies in Smart Telemedicine Using IoTzaman174
 
HIT 200-400 presentation handout!.ppt
HIT 200-400 presentation handout!.pptHIT 200-400 presentation handout!.ppt
HIT 200-400 presentation handout!.pptCleophasTakueNgwenya
 
Embracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifyEmbracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifySumana Mehta
 
Cloud Computing Security
Cloud Computing SecurityCloud Computing Security
Cloud Computing SecurityNithin Raj
 
BYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, WestBYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, WestJay McLaughlin
 
Lecture27 cc-security2
Lecture27 cc-security2Lecture27 cc-security2
Lecture27 cc-security2Ankit Gupta
 
10-IoT Data Analytics, Cloud Computing for IoT, Cloud Based platforms, ML for...
10-IoT Data Analytics, Cloud Computing for IoT, Cloud Based platforms, ML for...10-IoT Data Analytics, Cloud Computing for IoT, Cloud Based platforms, ML for...
10-IoT Data Analytics, Cloud Computing for IoT, Cloud Based platforms, ML for...RahulJain989779
 

Similar a SeaCat: and SDN End-to-end Application Containment ArchitecTure (20)

Secure Cloud Issues
Secure Cloud IssuesSecure Cloud Issues
Secure Cloud Issues
 
12-Dynamic Resource Provisioning, Security Aspects, Module-5-Cognitive comput...
12-Dynamic Resource Provisioning, Security Aspects, Module-5-Cognitive comput...12-Dynamic Resource Provisioning, Security Aspects, Module-5-Cognitive comput...
12-Dynamic Resource Provisioning, Security Aspects, Module-5-Cognitive comput...
 
Ccna sec 01
Ccna sec 01Ccna sec 01
Ccna sec 01
 
Securing elastic applications_on_mobile_devices
Securing elastic applications_on_mobile_devicesSecuring elastic applications_on_mobile_devices
Securing elastic applications_on_mobile_devices
 
Anya-Kim-Bhargava-MCCWorkshop.ppt
Anya-Kim-Bhargava-MCCWorkshop.pptAnya-Kim-Bhargava-MCCWorkshop.ppt
Anya-Kim-Bhargava-MCCWorkshop.ppt
 
Cloud Security: A matter of trust?
Cloud Security: A matter of trust?Cloud Security: A matter of trust?
Cloud Security: A matter of trust?
 
Security issue in cloud by himanshu tiwari
Security issue in cloud by himanshu tiwariSecurity issue in cloud by himanshu tiwari
Security issue in cloud by himanshu tiwari
 
BeyondCorp and Zero Trust
BeyondCorp and Zero TrustBeyondCorp and Zero Trust
BeyondCorp and Zero Trust
 
Security Issues of Cloud Computing
Security Issues of Cloud ComputingSecurity Issues of Cloud Computing
Security Issues of Cloud Computing
 
System Security Sem 2(Module 1).pptx
System Security Sem 2(Module     1).pptxSystem Security Sem 2(Module     1).pptx
System Security Sem 2(Module 1).pptx
 
Beyond Boundaries-The Power of Zero Trust Networking By Mohammed Danish Amber...
Beyond Boundaries-The Power of Zero Trust Networking By Mohammed Danish Amber...Beyond Boundaries-The Power of Zero Trust Networking By Mohammed Danish Amber...
Beyond Boundaries-The Power of Zero Trust Networking By Mohammed Danish Amber...
 
Security and Compliance for Enterprise Cloud Infrastructure
Security and Compliance for Enterprise Cloud InfrastructureSecurity and Compliance for Enterprise Cloud Infrastructure
Security and Compliance for Enterprise Cloud Infrastructure
 
Cp7101 design and management of computer networks-requirements analysis
Cp7101 design and management of computer networks-requirements analysisCp7101 design and management of computer networks-requirements analysis
Cp7101 design and management of computer networks-requirements analysis
 
Integration of 5G and Block-Chain Technologies in Smart Telemedicine Using IoT
Integration of 5G and Block-Chain Technologies in Smart Telemedicine Using IoTIntegration of 5G and Block-Chain Technologies in Smart Telemedicine Using IoT
Integration of 5G and Block-Chain Technologies in Smart Telemedicine Using IoT
 
HIT 200-400 presentation handout!.ppt
HIT 200-400 presentation handout!.pptHIT 200-400 presentation handout!.ppt
HIT 200-400 presentation handout!.ppt
 
Embracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifyEmbracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and Centrify
 
Cloud Computing Security
Cloud Computing SecurityCloud Computing Security
Cloud Computing Security
 
BYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, WestBYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, West
 
Lecture27 cc-security2
Lecture27 cc-security2Lecture27 cc-security2
Lecture27 cc-security2
 
10-IoT Data Analytics, Cloud Computing for IoT, Cloud Based platforms, ML for...
10-IoT Data Analytics, Cloud Computing for IoT, Cloud Based platforms, ML for...10-IoT Data Analytics, Cloud Computing for IoT, Cloud Based platforms, ML for...
10-IoT Data Analytics, Cloud Computing for IoT, Cloud Based platforms, ML for...
 

Más de US-Ignite

Smart Gigabit Community Lighting Round
Smart Gigabit Community Lighting Round Smart Gigabit Community Lighting Round
Smart Gigabit Community Lighting Round US-Ignite
 
NSF PI Meeting presentation on US Ignite - Nishal Mohan
NSF PI Meeting presentation on US Ignite - Nishal MohanNSF PI Meeting presentation on US Ignite - Nishal Mohan
NSF PI Meeting presentation on US Ignite - Nishal MohanUS-Ignite
 
New Smart Gigabit Community 2017 announcement - Nishal Mohan
New Smart Gigabit Community 2017 announcement - Nishal MohanNew Smart Gigabit Community 2017 announcement - Nishal Mohan
New Smart Gigabit Community 2017 announcement - Nishal MohanUS-Ignite
 
RFP announcement for new US Ignite Smart Gigabit Cities - Nishal Mohan
RFP announcement for new US Ignite Smart Gigabit Cities - Nishal MohanRFP announcement for new US Ignite Smart Gigabit Cities - Nishal Mohan
RFP announcement for new US Ignite Smart Gigabit Cities - Nishal MohanUS-Ignite
 
Holograms in Your City: Smart Training, Data Visualization and Communication ...
Holograms in Your City: Smart Training, Data Visualization and Communication ...Holograms in Your City: Smart Training, Data Visualization and Communication ...
Holograms in Your City: Smart Training, Data Visualization and Communication ...US-Ignite
 
Innovation in Gigcity, Chattanooga TN - Ken Hayes
Innovation in Gigcity, Chattanooga TN - Ken HayesInnovation in Gigcity, Chattanooga TN - Ken Hayes
Innovation in Gigcity, Chattanooga TN - Ken HayesUS-Ignite
 
Compute for Cancer - Isaiah Blackburn
Compute for Cancer - Isaiah BlackburnCompute for Cancer - Isaiah Blackburn
Compute for Cancer - Isaiah BlackburnUS-Ignite
 
Towards Wireless-Networked Real-Time Augmented Vision - Hongwei Zhang
Towards Wireless-Networked Real-Time Augmented Vision - Hongwei ZhangTowards Wireless-Networked Real-Time Augmented Vision - Hongwei Zhang
Towards Wireless-Networked Real-Time Augmented Vision - Hongwei ZhangUS-Ignite
 
The Future of Smart & Connected Communities: Driving Science and Community Im...
The Future of Smart & Connected Communities: Driving Science and Community Im...The Future of Smart & Connected Communities: Driving Science and Community Im...
The Future of Smart & Connected Communities: Driving Science and Community Im...US-Ignite
 
Data-Driven Green Design Case Studies - Dominique Davison
Data-Driven Green Design Case Studies - Dominique DavisonData-Driven Green Design Case Studies - Dominique Davison
Data-Driven Green Design Case Studies - Dominique DavisonUS-Ignite
 
Innovation in Phoenix: City on the Rise - Dominic Papa
Innovation in Phoenix: City on the Rise - Dominic PapaInnovation in Phoenix: City on the Rise - Dominic Papa
Innovation in Phoenix: City on the Rise - Dominic PapaUS-Ignite
 
Preparing an NSF16 610 proposal
Preparing an NSF16 610 proposalPreparing an NSF16 610 proposal
Preparing an NSF16 610 proposalUS-Ignite
 
Next Generation Broadband Cities - Lightning Talks
Next Generation Broadband Cities - Lightning  TalksNext Generation Broadband Cities - Lightning  Talks
Next Generation Broadband Cities - Lightning TalksUS-Ignite
 
Innovation economy remarks to ignite! january 2016
Innovation economy  remarks to ignite! january 2016Innovation economy  remarks to ignite! january 2016
Innovation economy remarks to ignite! january 2016US-Ignite
 
The Geni Experiment Engine
The Geni Experiment EngineThe Geni Experiment Engine
The Geni Experiment EngineUS-Ignite
 
Harnessing the Power of Data, Technology and Innovation to Unlock Talent
Harnessing the Power of Data, Technology and Innovation to Unlock TalentHarnessing the Power of Data, Technology and Innovation to Unlock Talent
Harnessing the Power of Data, Technology and Innovation to Unlock TalentUS-Ignite
 
Kickoff Agenda
Kickoff AgendaKickoff Agenda
Kickoff AgendaUS-Ignite
 
2016/01/26 Glenn Ricart - Smart Gigabit Communities
2016/01/26 Glenn Ricart - Smart Gigabit Communities2016/01/26 Glenn Ricart - Smart Gigabit Communities
2016/01/26 Glenn Ricart - Smart Gigabit CommunitiesUS-Ignite
 
21 - Smart Gigabit Communities Launch - Madison
21 - Smart Gigabit Communities Launch - Madison21 - Smart Gigabit Communities Launch - Madison
21 - Smart Gigabit Communities Launch - MadisonUS-Ignite
 
20 - Smart Gigabit Communities Launch - Lafayette, LA
20 - Smart Gigabit Communities Launch - Lafayette, LA20 - Smart Gigabit Communities Launch - Lafayette, LA
20 - Smart Gigabit Communities Launch - Lafayette, LAUS-Ignite
 

Más de US-Ignite (20)

Smart Gigabit Community Lighting Round
Smart Gigabit Community Lighting Round Smart Gigabit Community Lighting Round
Smart Gigabit Community Lighting Round
 
NSF PI Meeting presentation on US Ignite - Nishal Mohan
NSF PI Meeting presentation on US Ignite - Nishal MohanNSF PI Meeting presentation on US Ignite - Nishal Mohan
NSF PI Meeting presentation on US Ignite - Nishal Mohan
 
New Smart Gigabit Community 2017 announcement - Nishal Mohan
New Smart Gigabit Community 2017 announcement - Nishal MohanNew Smart Gigabit Community 2017 announcement - Nishal Mohan
New Smart Gigabit Community 2017 announcement - Nishal Mohan
 
RFP announcement for new US Ignite Smart Gigabit Cities - Nishal Mohan
RFP announcement for new US Ignite Smart Gigabit Cities - Nishal MohanRFP announcement for new US Ignite Smart Gigabit Cities - Nishal Mohan
RFP announcement for new US Ignite Smart Gigabit Cities - Nishal Mohan
 
Holograms in Your City: Smart Training, Data Visualization and Communication ...
Holograms in Your City: Smart Training, Data Visualization and Communication ...Holograms in Your City: Smart Training, Data Visualization and Communication ...
Holograms in Your City: Smart Training, Data Visualization and Communication ...
 
Innovation in Gigcity, Chattanooga TN - Ken Hayes
Innovation in Gigcity, Chattanooga TN - Ken HayesInnovation in Gigcity, Chattanooga TN - Ken Hayes
Innovation in Gigcity, Chattanooga TN - Ken Hayes
 
Compute for Cancer - Isaiah Blackburn
Compute for Cancer - Isaiah BlackburnCompute for Cancer - Isaiah Blackburn
Compute for Cancer - Isaiah Blackburn
 
Towards Wireless-Networked Real-Time Augmented Vision - Hongwei Zhang
Towards Wireless-Networked Real-Time Augmented Vision - Hongwei ZhangTowards Wireless-Networked Real-Time Augmented Vision - Hongwei Zhang
Towards Wireless-Networked Real-Time Augmented Vision - Hongwei Zhang
 
The Future of Smart & Connected Communities: Driving Science and Community Im...
The Future of Smart & Connected Communities: Driving Science and Community Im...The Future of Smart & Connected Communities: Driving Science and Community Im...
The Future of Smart & Connected Communities: Driving Science and Community Im...
 
Data-Driven Green Design Case Studies - Dominique Davison
Data-Driven Green Design Case Studies - Dominique DavisonData-Driven Green Design Case Studies - Dominique Davison
Data-Driven Green Design Case Studies - Dominique Davison
 
Innovation in Phoenix: City on the Rise - Dominic Papa
Innovation in Phoenix: City on the Rise - Dominic PapaInnovation in Phoenix: City on the Rise - Dominic Papa
Innovation in Phoenix: City on the Rise - Dominic Papa
 
Preparing an NSF16 610 proposal
Preparing an NSF16 610 proposalPreparing an NSF16 610 proposal
Preparing an NSF16 610 proposal
 
Next Generation Broadband Cities - Lightning Talks
Next Generation Broadband Cities - Lightning  TalksNext Generation Broadband Cities - Lightning  Talks
Next Generation Broadband Cities - Lightning Talks
 
Innovation economy remarks to ignite! january 2016
Innovation economy  remarks to ignite! january 2016Innovation economy  remarks to ignite! january 2016
Innovation economy remarks to ignite! january 2016
 
The Geni Experiment Engine
The Geni Experiment EngineThe Geni Experiment Engine
The Geni Experiment Engine
 
Harnessing the Power of Data, Technology and Innovation to Unlock Talent
Harnessing the Power of Data, Technology and Innovation to Unlock TalentHarnessing the Power of Data, Technology and Innovation to Unlock Talent
Harnessing the Power of Data, Technology and Innovation to Unlock Talent
 
Kickoff Agenda
Kickoff AgendaKickoff Agenda
Kickoff Agenda
 
2016/01/26 Glenn Ricart - Smart Gigabit Communities
2016/01/26 Glenn Ricart - Smart Gigabit Communities2016/01/26 Glenn Ricart - Smart Gigabit Communities
2016/01/26 Glenn Ricart - Smart Gigabit Communities
 
21 - Smart Gigabit Communities Launch - Madison
21 - Smart Gigabit Communities Launch - Madison21 - Smart Gigabit Communities Launch - Madison
21 - Smart Gigabit Communities Launch - Madison
 
20 - Smart Gigabit Communities Launch - Lafayette, LA
20 - Smart Gigabit Communities Launch - Lafayette, LA20 - Smart Gigabit Communities Launch - Lafayette, LA
20 - Smart Gigabit Communities Launch - Lafayette, LA
 

Último

Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 

Último (20)

Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 

SeaCat: and SDN End-to-end Application Containment ArchitecTure

  • 1. SeaCat: an SDN End-to-end Application Containment ArchitecTure Enabling Secure Role Based Network Access in Healthcare - US Ignite Project - Kobus Van der Merwe and Brent Elieson
  • 2. Motivation • “Everything” is networked – Nearly all business applications assume network availability • Also true in healthcare – Accessing patient records – Remote diagnoses and consultation – In-home monitoring – Healthcare analytics – Plus “regular” vocational applications • HR/payroll functions, accessing domain specific literature – Plus non vocational use • Browsing the web, social networking etc.
  • 3. Motivation cont. • Problem: – Same individual, using same device potentially using several of these applications simultaneously – Applications have very different security and performance constraints: • Healthcare records: stringent regulatory privacy and security requirements • In-home patient monitoring: different privacy and security needs + reliability and soft real time guarantees • Web use: no impact on core healthcare applications
  • 4. Motivation cont. • Current approaches, combinations of: – Devices scans when new devices attach to network – Run applications on application servers with thin clients on devices – Complex network and server access control polices • Inadequate: – Device with up-to-date patch levels might still contain malware – Application servers with thin clients constrain the type of applications that can be used – Access control policies only deal with access. Provide no protection once data is accessed
  • 5. SeaCat Approach • Combine SDN and application containment: – End-to-end application containment • Non-healthcare app: – default context • Healthcare app: – dynamic app specific context – from server, through network, into device – app and data contained in this context – protect against data leakage and malicious actors
  • 6. Threat Model • Concerned with security and performance of health care applications used from variety of devices in a health care environment • Assume healthcare applications can be trusted – different from conventional threat model where device needs to be protected against untrusted applications • Specific concerns: – Unauthorized access • role based authentication and policies – Data leakage • end-to-end application containment – Resource guarantees • context based resource allocation with preemption – Denial of service • resource guarantees plus separation of resources
  • 7. SeaCat Architecture • SDN to create contexts for apps • Extend contexts into endpoint: – Controller creates virtual interfaces on host switch – Bind applications to these interfaces
  • 8. SeaCat Architecture Default context to bootstrap: 1. App uses default context -> authentication and policy entity 2. Request: create network context 3. Create context in network and host SDN 4. Application gets credentials to bind to virtual NIC (unbind from default NIC/context) 5. Traffic constrained to dedicated context
  • 9. Challenges and status • Create secure end-to-end contexts – Network and host SDN as basis – Authentication and policy driven control framework – Host application containment – Secure binding mechanisms – Need for encryption • Status and plans – Just got started • Work in progress – Explore architecture with specific healthcare apps • Electronic health records (EHR) • Medical imaging