Chapter 14 Protection Bernard Chen Spring 2007. 14.1 Goal of Protection Protection was originally conceived as an adjunct to multiprogramming operation.

Slides:



Advertisements
Similar presentations
Protection Goals of Protection Domain of Protection Access Matrix
Advertisements

Silberschatz, Galvin and Gagne ©2009 Operating System Concepts – 8 th Edition, Chapter 14: Protection.
Protection. Goals of Protection Operating system consists of a collection of objects, hardware or software Each object has a unique name and can be accessed.
Bilkent University Department of Computer Engineering
1999 Chapter 8-Protection Goals of Protection Domain of Protection Access Matrix Implementation of Access Matrix Revocation of Access Rights Capability-Based.
Reasons for Protection n Prevent users from accessing information they shouldn’t have access to. n Ensure that each program component uses system resources.
19: Protection1 PROTECTION Protection is the mechanism for controlling access to computer resources. Security concerns the physical integrity of the system.
Silberschatz, Galvin and Gagne ©2009 Operating System Concepts – 8 th Edition, Chapter 14: Protection.
Chapter 14: Protection.
Chapter 14: Protection.
Chapter 14: Protection.
Silberschatz, Galvin and Gagne ©2013 Operating System Concepts – 9 th Edition Chapter 14: Protection.
Dr. Kalpakis CMSC 421, Operating Systems. Fall 2008 URL: Protection.
Page 19/4/2015 CSE 30341: Operating Systems Principles Raid storage  Raid – 0: Striping  Good I/O performance if spread across disks (equivalent to n.
14.1 Silberschatz, Galvin and Gagne ©2009 Operating System Concepts with Java – 8 th Edition Chapter 14: Protection.
Protection.
14.1 Silberschatz, Galvin and Gagne ©2005 Operating System Concepts Chapter 14: Protection Goals of Protection Principles of Protection Domain of Protection.
Silberschatz, Galvin and Gagne ©2009 Operating System Concepts – 8 th Edition, Chapter 14: Protection.
Chapter 14: Protection Silberschatz, Galvin and Gagne ©2005 AE4B33OSS Chapter 14: Protection Goals of Protection Principles of Protection Domain.
Silberschatz, Galvin, and Gagne  Applied Operating System Concepts Module 18: Protection Goals of Protection Domain of Protection Access Matrix.
Silberschatz, Galvin and Gagne  Operating System Concepts Chapter 18: Protection Goals of Protection Objects and Domains Access Matrix Implementation.
14.1 Silberschatz, Galvin and Gagne ©2009 Operating System Concepts with Java – 8 th Edition Chapter 14: Protection.
Silberschatz, Galvin and Gagne ©2009 Operating System Concepts – 8 th Edition, Protection (Chapter 14)
Cosc 4740 Chapter 13: Protection. Goals of Protection Operating system consists of a collection of objects, hardware or software Each object has a unique.
Protection Nadeem Majeed Choudhary
CE Operating Systems Lecture 21 Operating Systems Protection with examples from Linux & Windows.
Modul ke: Fakultas Program Studi Proteksi SISTEM OPERASI Misbahul Fajri, ST., MTI. 14 FASILKOM Teknik Informatika.
14.1/21 Part 5: protection and security Protection mechanisms control access to a system by limiting the types of file access permitted to users. In addition,
Chapter 14: Protection Silberschatz, Galvin and Gagne ©2005 Operating System Concepts – 7 th Edition, Apr 11, 2005 Chapter 14: Protection Goals.
14.1 Silberschatz, Galvin and Gagne ©2009 Operating System Concepts with Java – 8 th Edition Protection.
Chapter 14: Protection Silberschatz, Galvin and Gagne ©2005 Operating System Concepts – 7 th Edition, Apr 11, 2005 Goals of Protection Operating.
Chapter 14: Protection Silberschatz, Galvin and Gagne ©2005 Operating System Concepts Goals of Protection Operating system consists of a collection.
Silberschatz, Galvin and Gagne ©2013 Operating System Concepts – 9 th Edition Chapter 14: Protection.
11.1 CSE Department MAITSandeep Tayal 11: Protection Goals of Protection Domain of Protection Access Matrix Implementation of Access Matrix Revocation.
ANKITA NAIK. INTRODUCTION g598 An access matrix is a model of system resources protection. It consists of rows and columns. The rows of access matrix.
CSS430 Protection1 Textbook Ch14 These slides were compiled from the OSC textbook slides (Silberschatz, Galvin, and Gagne) and the instructor’s class materials.
CSE Operating System Principles Protection.
ACCESS MATRIX IMPLEMENTATION AND COMPARISON By: Rushabh Dharwadkar Roll no: TE COMP.
18.1 Silberschatz, Galvin and Gagne ©2003 Operating System Concepts with Java Chapter 18: Protection Goals of Protection Domain of Protection Access Matrix.
Chapter 17: System Protection Silberschatz, Galvin and Gagne ©2005 Operating System Concepts Chapter 17: Protection Goals of Protection Principles.
Saurav Karmakar. Chapter 14: Protection  Goals of Protection  Principles of Protection  Domain of Protection  Access Matrix  Implementation of Access.
PROTECTION.
Operating Systems Protection Alok Kumar Jagadev.
Chapter 14: Protection Modified by Dr. Neerja Mhaskar for CS 3SH3.
Chapter 14: System Protection
Operating System Concepts
IMPLEMENTATION OF ACCESS MATRIX
Chapter 14: Protection.
Chapter 14: Protection Source & Copyright: Operating System Concepts, Silberschatz, Galvin and Gagne.
Chapter 14: Protection.
Chapter 14: Protection.
Chapter 14: Protection.
CE Operating Systems Lecture 21
Chapter 14: Protection.
Chapter 14: Protection.
Chapter 14: Protection.
Chapter 14: Protection.
Chapter 14: Protection.
Chapter 14: Protection.
Chapter 14: Protection.
Operating System Concepts
ACCESS MATRIX Wayne De Souza
Chapter 14: Protection.
Chapter 14: Protection.
Chapter 14: Protection.
Chapter 14: Protection.
Chapter 14: Protection.
Operating System Concepts
Chapter 14: Protection.
Presentation transcript:

Chapter 14 Protection Bernard Chen Spring 2007

14.1 Goal of Protection Protection was originally conceived as an adjunct to multiprogramming operation systems, so that untrustworthy users might safely share a common logical files or memory Modern protection concepts have evolved to increase the reliability of any complex system that makes use of shared resources Protection (Ch.14) deals with internal problem Security (Ch. 15) Deals with external problem

14.2 Principle of Protection A key, time-tested guiding principle for protection is the principle of least privilege. It dictates that programs, users, and even systems be given just enough privileges to perform their tasks Computer implemented in a computing facility under the principle of least privilege can be limited to running specific service, accessing specific remote hosts via specific service during some specific time

14.3 Domain of Protection Domain Structure: Access-right = where rights-set is a subset of all valid operations that can be performed on the object. Domain = set of access-rights

Domain

Each user may be a domain: Domain switching occurs when the user is changed Each process may be a domain: Domain switching occurs when the process sends a message to another process and then waits for a response

14.4 Access Matrix View protection as a matrix (access matrix) Rows represent domains Columns represent objects Access(i, j) is the set of operations that a process executing in Domain i can invoke on Object j

Access Matrix

The users normally decide the contents of the access matrix entries. When a user creates a new object Oj, the column Oj is added to the access matrix When we switch a process from one domain to another, we are executing an operation (switch) on a domain Processes should be able to switch from one domain to another Domain switching from domain Di to Dj is allowed if and only if the access right switch access(i,j)

Access Matrix

Access Table Allowing controlled change in the contents of the access-matrix entries requires three additional operations: Copy, Owner, and Control

Access Table: Copy right The ability to copy an access right from one domain of the access matrix to another is denoted by an * The copy right allows the copying of the access right only within the column for which right is defined

Access Table: Copy right

Three types of copy: 1. Copy 2. Transfer: a right is copied from access(i,j) to access(k,j); it is then removed from access(i,j) 3. Limited copy: only copy the right not the *

Access Table: Owner right We need some mechanism to allow addition of new rights and removal of some rights If access(i,j) includes the owner right then a process executing in domain Di can add and remove any right in any entry in column j

Access Table: Owner right

Access Table: Control right The copy and owner rights allow a process to change the entries in a column, a mechanism is also needed to change the entries in a row The control right is applicable only to domain objects If access(i,j) includes the control right, then a process executing in domain Di can “remove” any access right from row j

Access Table: Control right

Implementation of Access table Global Table Access lists for objects Capability list for domains Lock-Key Mechanism

Global Table Easiest Using Disadvantages: 1. The table is usually too big to fit in memory 2. Virtual memory required 3. No advantage of special groups

Access lists for objects The resulting list for each object consists of ordered pairs

Capability list for domains We can access each row with its domain A capability list for a domain is a list of objects together with operations allowed on those object An object is often represented by its physical name or address, called capability

Lock-Key Mechanism Each object has a list of unique bit patterns, called locks Similarly, each domain has a list of unique bit patterns, called keys A process executing in a domain can access an object only if that domain has a key that matches one of the locks of the object