Distributed computer security 8.2 Discretionary Access Control Models -Ranjitha Shivarudraiah.

Slides:



Advertisements
Similar presentations
Protection Goals of Protection Domain of Protection Access Matrix
Advertisements

Distributed Systems Major Design Issues Presented by: Christopher Hector CS8320 – Advanced Operating Systems Spring 2007 – Section 2.6 Presentation Dr.
Silberschatz, Galvin and Gagne ©2009 Operating System Concepts – 8 th Edition, Chapter 14: Protection.
Issues Relevant To Distributed Security xuhong Zhang.
Vinay Kumar Madhadi 10/28/2009 CSC Outline  Part 1 : Mandatory Flow Control Models? MAC vs. DAC Information Flow Control  Part 2 : Different Models-Lattice.
CMSC 414 Computer (and Network) Security Lecture 13 Jonathan Katz.
Lakshmi Narayana Gupta Kollepara 10/26/2009 CSC-8320.
8.2 Discretionary Access Control Models Weiling Li.
Database Management System
Fundamentals of Computer Security Geetika Sharma Fall 2008.
Bilkent University Department of Computer Engineering
19: Protection1 PROTECTION Protection is the mechanism for controlling access to computer resources. Security concerns the physical integrity of the system.
Silberschatz, Galvin and Gagne ©2009 Operating System Concepts – 8 th Edition, Chapter 14: Protection.
CS-550 (M.Soneru): Protection and Security - 1 [SaS] 1 Protection and Security.
CMSC 414 Computer and Network Security Lecture 10 Jonathan Katz.
1 Clark Wilson Implementation Shilpa Venkataramana.
Chapter 14: Protection.
SE571 Security in Computing
Definition of terms Definition of terms Explain business conditions driving distributed databases Explain business conditions driving distributed databases.
G Robert Grimm New York University Protection and the Control of Information Sharing in Multics.
Distributed Computer Security 8.2 Discretionary Access Control Models - Liang Zhao.
Lecture 7 Access Control
Distributed Computer Security 8.2 Discretionary Access Control Models - Sai Phalgun Tatavarthy.
Summary For Chapter 8 Student: Zhibo Wang Professor: Yanqing Zhang.
Complex Security Policies Dave Andersen Advanced Operating Systems Georgia State University.
CS-550 (M.Soneru): Protection and Security - 2 [SaS] 1 Protection and Security - 2.
Page 19/4/2015 CSE 30341: Operating Systems Principles Raid storage  Raid – 0: Striping  Good I/O performance if spread across disks (equivalent to n.
Protection.
14.1 Silberschatz, Galvin and Gagne ©2005 Operating System Concepts Chapter 14: Protection Goals of Protection Principles of Protection Domain of Protection.
Issues Relevant To Distributed Security CSC 8320 Nidhi Gahlot.
Announcements Assignment 3 due. Invite friends, co-workers to your presentations. Course evaluations on Friday.
Chapter 14 Protection Bernard Chen Spring Goal of Protection Protection was originally conceived as an adjunct to multiprogramming operation.
Silberschatz, Galvin and Gagne ©2009 Operating System Concepts – 8 th Edition, Chapter 14: Protection.
CMSC 414 Computer and Network Security Lecture 10 Jonathan Katz.
8.2 D ISCRETIONARY A CCESS C ONTROL M ODELS Shuman Guo CSc8320.
G53SEC 1 Access Control principals, objects and their operations.
Access Control. What is Access Control? The ability to allow only authorized users, programs or processes system or resource access The ability to disallow.
Silberschatz, Galvin and Gagne  Operating System Concepts Chapter 18: Protection Goals of Protection Objects and Domains Access Matrix Implementation.
Silberschatz, Galvin and Gagne ©2009 Operating System Concepts – 8 th Edition, Protection (Chapter 14)
CE Operating Systems Lecture 21 Operating Systems Protection with examples from Linux & Windows.
14.1/21 Part 5: protection and security Protection mechanisms control access to a system by limiting the types of file access permitted to users. In addition,
COEN 350: Network Security Authorization. Fundamental Mechanisms: Access Matrix Subjects Objects (Subjects can be objects, too.) Access Rights Example:
Chapter 14: Protection Silberschatz, Galvin and Gagne ©2005 Operating System Concepts – 7 th Edition, Apr 11, 2005 Chapter 14: Protection Goals.
Discretionary Access Control Models Adith Srinivasan.
Chapter 14: Protection Silberschatz, Galvin and Gagne ©2005 Operating System Concepts – 7 th Edition, Apr 11, 2005 Goals of Protection Operating.
Computer Security: Principles and Practice
CSC 8320 Advanced Operating System Discretionary Access Control Models Presenter: Ke Gao Instructor: Professor Zhang.
Protection & Security Greg Bilodeau CS 5204 October 13, 2009.
CSE Operating System Principles Protection.
ACCESS MATRIX IMPLEMENTATION AND COMPARISON By: Rushabh Dharwadkar Roll no: TE COMP.
Chap5: Designing Trusted Operating Systems.  What makes an operating system “secure”? Or “trustworthy”?  How are trusted systems designed, and which.
Access Control Model SAM-5.
PROTECTION.
Protection and Security
Operating Systems Protection Alok Kumar Jagadev.
Chapter 14: Protection Modified by Dr. Neerja Mhaskar for CS 3SH3.
Chapter 14: System Protection
Chapter 14: Protection.
Distributed System Concepts and Architectures
Chapter 14: Protection.
Chapter 14: Protection.
CE Operating Systems Lecture 21
Chapter 14: Protection.
Chapter 14: Protection.
Chapter 14: Protection.
Chapter 14: Protection.
Chapter 14: Protection.
Access Control.
Chapter 14: Protection.
Chapter 14: Protection.
Presentation transcript:

Distributed computer security 8.2 Discretionary Access Control Models -Ranjitha Shivarudraiah

Agenda Concepts  What are security policies?  What is Access control?  Different types of ACM.  Concept of distributed compartment  ACM implementations  ACL vs CL Research  Case study: ACM for grid networks  Example of an ACM for Mobile devices by virtualization. Future expectations

CONCEPTS

Security policy There are two kinds of security policies:  Simple security policies Access control matrix (ACM) models are widely used to enforce the simple security policies.  Complex Security policies Security requirements how and when the accesses are performed( special constraints are involved). Relevant to the distributed systems.

An access control is a function that given a subject and object pair i.e. (s,o) and a requested operation r, from s to o, returns a true value if requested is permitted. R = P(s,o). P – access matrix R – set of allowable operations.( ‘r’ is a particular operation belonging to set ‘R’ ). s – subject o – object Access control

Access Control contd.. The process of access validation is performed by a ‘reference monitor’ with an ACM for all subjects and objects Practically it is preferable to have separate reference monitors for different categories of subjects and objects.

Resource ACM In a resource ACM subjects are users, objects are the files to be accessed. Access Rights may include “read”, ”write”, ”execute”, ”append”. Special privileges may be the “owner” and copy privilege.[1] [1]Randy Chow & Theodore Johnson, 1997,“Distributed Operating Systems & Algorithms”,

Process ACM In process ACM the subjects and objects are both processes. Operations are basically related to communication and synchronization.[1] [1]Randy Chow & Theodore Johnson, 1997,“Distributed Operating Systems & Algorithms”,

Domain ACM Set of objects with same access rights.[1] [1]Randy Chow & Theodore Johnson, 1997,“Distributed Operating Systems & Algorithms”,

ACM contd.. Reducing the Size of Access Control Matrix  Subject rows in the ACM that have identical entries i.e subjects that have similar access rights on common objects, could be merged into groups.  If a user belongs to more than one group, its access rights is the union of all access rights of all the groups it belongs to.  Similarly Object columns with same entries could be merged into ‘categories’.

Distributed compartment. Figure: Distributed Compartment [1] [1] Randy 1997

Distributed compartment. Contd.. A distributed application with collaborating processes may consists of subject users and object resources crossing the physical boundaries of physical resources. Here, a logical ACM called a ‘distributed compartment’ that regulates access among the collaborating users would serve a better purpose. Access to the distributed compartments are based on ‘distributed handles’. These handles are application oriented and they provide a protective wall around an application and are authenticated by the application

DCM contd.. The distributed compartment model has a number of advantages  The grouping of subjects and objects is logical and application specific.  The accesses are more transparent since they do not depend on the operating systems and administrative units.  Since the application manages the distributed handles, it allows different security policies to be implemented

ACM implementations For efficiency and organizational purposes, access control matrices need to be partitioned The Linked list structure that contains all entries in a column for a particular object is called a Access control List (ACL) for the object.  An ACL specifies the permissible rights that various subjects have on the object Likewise all entries in a row for a subject is called a Capability List (CL) for the subject.  A CL specifies privileges to various objects held by a subject

ACL vs CL Comparison between ACLs and capabilities for protecting objects. Using an ACL  Using capabilities.  Source: Randy 1997

Lock –Key implementation

ACL vs CL contd.. Comparison in terms of management functions  Authentication  Reviewing of Access Rights  Propagation of Access Rights  Revocation of Access Rights  Conversion between ACL and CL

Authentication  ACL Authenticates subjects, which is performed by the system  While in CL, authentication is performed on capabilities of objects, by the object server.  Objects have knowledge of the capabilities,but do not know the users or processors. This is one of the reasons why many Distributed implementations favor the CL approach

Review Of Access Rights  To know which subjects are authorized to use a certain objects.  Easier to review ACL, because ACL contains exactly this information. For storage efficiency subject grouping, wildcards,prohibitive rights could also be used.  It is difficult to review for a CL unless some type of activity log is kept for all subjects that are given the capability

Propagation of access rights  Access rights must be replicable to facilitate sharing.  Propagation is Duplication of some or all the privileges from one subject to the others.  Propagation is not transfer of rights, it is only duplication.  In ACL, propagation of rights is explicitly initiated by a request to the object server, which modifies or adds an entry to its ACL.

Propagation of access rights contd..  Propagation of rights must adhere to the principle of least principles.  i.e. Only the minimum privileges required to perform the tasks are given when propagating the rights  In CL, theoretically it is propagate rights between subjects without intervention of object server.  This could result in an uncontrollable system and hence is avoided.

Revocation of access rights  Revocation is trivial in ACL because it is easy to delete subject entries from the ACL.  It is difficult for CL’s to revoke access selectively.

Conversion between ACL & CL  Interactions among processes involving different Access control models would require gateways for conversions.  Conversion to ACL is straightforward.  Consider example of processes in a CL requiring to access remote objects in ACL Gateway Authenticates the process identifier. It Then verifies the operation in the capability list. The request is then converted to ACL and is presented to the remote host

Research

Case study: ACM for grid networks[2] “Access control of global distributed storage system”(Dr Xie et al,2004)

Local distributed storage system. Source: “Access control of global distributed storage system” (Dr Xie et al ) Certification and Authentication Server Name Server

3. Requirements of Access Control in Data grid Environment Single sign on Separation of duties High efficiency Centralized management and autonomy Support Qos( Quality of service).

Source: “Access control of global distributed storage system” Dr Xie et al )

Access control methods for mobile devices[5]

[5] ACM for mobile devices( Dr Lee et.al ). Root of trust. Rom has The master key. Virtual Machine Monitor ACM for Mobile devices. Provides security Provides Flexibilty

Future Expectations Absolute trust mechanism in access control system is an important subject of P2P security research. Also secure efficient ACM for huge networks especially the data-centric networks will be effectively realized. Excellent Access control methods for highly dynamic real time systems.

References [1]Randy Chow & Theodore Johnson, 1997,“Distributed Operating Systems & Algorithms”, (Addison- Wesley), p. 271 to 278. [2] Access control of global distributed storage system Chao Xie; Hai Jin; Song Wu; Shengli Li; Zhiping Wang; Computer and Information Technology, CIT '04. Computer and Information Technology, CIT '04. [3] Samarati, P.; Bertino, E.; Ciampichetti, A.; Jajodia, S.; “Information flow control in object-oriented systems”. Knowledge and Data Engineering, IEEE Transactions on Volume 9, Issue 4, July-Aug Page(s): [4] Lin, Tsau Young (T. Y.); “Managing Information Flows on Discretionary Access Control Models” Systems, Man and Cybernetics, ICSMC '06. IEEE International Conference onVolume 6, 8-11 Oct Page(s): Systems, Man and Cybernetics, ICSMC '06. IEEE International Conference on [5] A Multi-Layer Mandatory Access Control Mechanism for Mobile Devices Based on Virtualization Sung-Min Lee; Sang-bum Suh; Bokdeuk Jeong; Sangdok Mo; Consumer Communications and Networking Conference, CCNC th IEEE Consumer Communications and Networking Conference, CCNC th IEEE [6] Accessed on 27th October 2008). Accessed on 27th