Providing assurance of security and privacy is becoming more difficult with current trends towards building computing infrastructure out of distributed components connected by networks, including untrusted client machines. Important to this assurance are the confidentiality and integrity properties of distributed systems that serve principals whose trust in each other is incomplete. This description encompasses, among others, clinical information systems, joint military information systems, and financial information systems.

A new security mechanism, secure program partitioning, can provide stronger, end-to-end assurance that data remains confidential. In this approach, programs are transformed according to strong security policies, resulting in secure distributed systems. This is an attractive way to specify and enforce confidentiality and integrity in environments that include untrusted, possibly malicious host machines.

Because the integrity of distributed computations and data is difficult to maintain in the presence of untrusted hosts, this research investigates an extension of secure program partitioning to use redundant computation to preserve integrity. In addition, new models of information flow in concurrent systems are being explored because the current theory and practice of security for concurrent systems is restrictive, yet also unsound. This is especially important because distributed systems are naturally concurrent. Solutions to these problems are being implemented as part of the Jif language system.

Agency
National Science Foundation (NSF)
Institute
Division of Computer and Network Systems (CNS)
Application #
0208642
Program Officer
Karl Levitt
Project Start
Project End
Budget Start
2002-07-15
Budget End
2005-12-31
Support Year
Fiscal Year
2002
Total Cost
$330,000
Indirect Cost
Name
Cornell University
Department
Type
DUNS #
City
Ithaca
State
NY
Country
United States
Zip Code
14850