Systems and Internet Infrastructure Security (SIIS) LaboratoryPage Systems and Internet Infrastructure Security Network and Security Research Center Department of Computer Science and Engineering Pennsylvania State University, University Park PA 1 Location Based Access Control Progress Report Joshua Schiffman
Systems and Internet Infrastructure Security (SIIS) LaboratoryPage 2 Motivation Typical file access control ‣ Roles, usernames, types Authentication of a user does not necessarily mean they should have access to data ‣ Location is important ‣ Difficult to prove ‣ Even harder to manage
Systems and Internet Infrastructure Security (SIIS) LaboratoryPage 3 Experiment Goals Utilize locating technology to provide a location guarantee ‣ Part of current research Provide a policy that gives hierarchical location- based roles Create a proof of concept implementation that is intuitive and minimally intrusive
Systems and Internet Infrastructure Security (SIIS) LaboratoryPage 4 Design Goals Access to files should be entirely mediated by the access control daemon ‣ Encryption to prevent offline attack [eCryptfs] ‣ Authenticated access to the system [Pam-mount] ‣ Locality locking / unlocking is automatic [Location LSM]
Systems and Internet Infrastructure Security (SIIS) LaboratoryPage 5 Policy Goals The policy should be intuitive and flexible ‣ Hierarchical structure ‣ Logical representation
Systems and Internet Infrastructure Security (SIIS) LaboratoryPage 6 Methodology
Systems and Internet Infrastructure Security (SIIS) LaboratoryPage 7 Evaluation To test the system, I will ‣ Implement the LSM ‣ Show performance metrics Timing to access files ‣ Analyze the trust model