8.2 D ISCRETIONARY A CCESS C ONTROL M ODELS Shuman Guo CSc8320.

Slides:



Advertisements
Similar presentations
Operating System Security
Advertisements

Chapter 23 Database Security and Authorization Copyright © 2004 Pearson Education, Inc.
Issues Relevant To Distributed Security xuhong Zhang.
Vinay Kumar Madhadi 10/28/2009 CSC Outline  Part 1 : Mandatory Flow Control Models? MAC vs. DAC Information Flow Control  Part 2 : Different Models-Lattice.
CMSC 414 Computer (and Network) Security Lecture 13 Jonathan Katz.
Lakshmi Narayana Gupta Kollepara 10/26/2009 CSC-8320.
8.2 Discretionary Access Control Models Weiling Li.
CMSC 414 Computer and Network Security Lecture 13 Jonathan Katz.
Access Control Patterns Fatemeh Imani Mehr Amirkabir university of technology, Department of Computer Engineering & Information Technology.
Database Management System
Fundamentals of Computer Security Geetika Sharma Fall 2008.
—On War, Carl Von Clausewitz
Chapter 11 Firewalls.
Bilkent University Department of Computer Engineering
19: Protection1 PROTECTION Protection is the mechanism for controlling access to computer resources. Security concerns the physical integrity of the system.
Silberschatz, Galvin and Gagne ©2009 Operating System Concepts – 8 th Edition, Chapter 14: Protection.
CS-550 (M.Soneru): Protection and Security - 1 [SaS] 1 Protection and Security.
CMSC 414 Computer and Network Security Lecture 10 Jonathan Katz.
CMSC 414 Computer and Network Security Lecture 11 Jonathan Katz.
Mandatory Flow Control Bismita Srichandan. Outline Mandatory Flow Control Models Information Flow Control Lattice Model Multilevel Models –The Bell-LaPadula.
Distributed Computer Security 8.2 Discretionary Access Control Models - Liang Zhao.
Lecture 7 Access Control
Distributed Computer Security 8.2 Discretionary Access Control Models - Sai Phalgun Tatavarthy.
Lecture slides prepared for “Computer Security: Principles and Practice”, 2/e, by William Stallings and Lawrie Brown, Chapter 4 “Overview”.
CMSC 414 Computer and Network Security Lecture 19 Jonathan Katz.
Summary For Chapter 8 Student: Zhibo Wang Professor: Yanqing Zhang.
Complex Security Policies Dave Andersen Advanced Operating Systems Georgia State University.
CS-550 (M.Soneru): Protection and Security - 2 [SaS] 1 Protection and Security - 2.
Dr. Kalpakis CMSC 621, Advanced Operating Systems. Security & Protection.
Operating Systems Protection & Security.
MANDATORY FLOW CONTROL Xiao Chen Fall2009 CSc 8320.
CH14 – Protection / Security. Basics Potential Violations – Unauthorized release, modification, DoS External vs Internal Security Policy vs Mechanism.
1 A pattern language for security models Eduardo B. Fernandez and Rouyi Pan Presented by Liping Cai 03/15/2006.
Controlling Files Richard Newman based on Smith “Elementary Information Security”
Distributed computer security 8.2 Discretionary Access Control Models -Ranjitha Shivarudraiah.
Issues Relevant To Distributed Security CSC 8320 Nidhi Gahlot.
CSCE 201 Introduction to Information Security Fall 2010 Access Control.
Chapter 5 Network Security
D ISCRETIONARY A CCESS C ONTROLS Truong Quynh Chi Faculty of Computer Science & Engineering HCMC University of Technology
G53SEC 1 Access Control principals, objects and their operations.
Information Security - City College1 Access Control in Collaborative Systems Authors: Emis Simo David Naco.
Access Control. What is Access Control? The ability to allow only authorized users, programs or processes system or resource access The ability to disallow.
CE Operating Systems Lecture 21 Operating Systems Protection with examples from Linux & Windows.
Prepared By Prepared By : VINAY ALEXANDER ( विनय अलेक्सजेंड़र ) PGT(CS),KV JHAGRAKHAND.
14.1/21 Part 5: protection and security Protection mechanisms control access to a system by limiting the types of file access permitted to users. In addition,
12/4/20151 Computer Security Security models – an overview.
Chapter 11 Database Security: An Introduction Copyright © 2004 Pearson Education, Inc.
COEN 350: Network Security Authorization. Fundamental Mechanisms: Access Matrix Subjects Objects (Subjects can be objects, too.) Access Rights Example:
Chapter 14: Protection Silberschatz, Galvin and Gagne ©2005 Operating System Concepts – 7 th Edition, Apr 11, 2005 Chapter 14: Protection Goals.
Discretionary Access Control Models Adith Srinivasan.
Privilege Management Chapter 22.
Computer Security: Principles and Practice
CSC 8320 Advanced Operating System Discretionary Access Control Models Presenter: Ke Gao Instructor: Professor Zhang.
Protection & Security Greg Bilodeau CS 5204 October 13, 2009.
Chapter 8: Principles of Security Models, Design, and Capabilities
Database Security. Introduction to Database Security Issues (1) Threats to databases Loss of integrity Loss of availability Loss of confidentiality To.
Access Controls Mandatory Access Control by Sean Dalton December 5 th 2008.
PREPARED BY: MS. ANGELA R.ICO & MS. AILEEN E. QUITNO (MSE-COE) COURSE TITLE: OPERATING SYSTEM PROF. GISELA MAY A. ALBANO PREPARED BY: MS. ANGELA R.ICO.
Access Control Model SAM-5.
Access Control CSE 465 – Information Assurance Fall 2017 Adam Doupé
Operating Systems Protection Alok Kumar Jagadev.
Chapter 14: System Protection
Computer Data Security & Privacy
Chapter 14: Protection.
CE Operating Systems Lecture 21
OS Access Control Mauricio Sifontes.
Chapter 14: Protection.
Access Control.
CS703 - Advanced Operating Systems
Access Control What’s New?
Presentation transcript:

8.2 D ISCRETIONARY A CCESS C ONTROL M ODELS Shuman Guo CSc8320

O UTLINE Discretionary Access Control Model Access Control Matrix (ACM) Distributed Compartments Implementations of ACM Comparison of ACL & CL References

D ISCRETIONARY A CCESS C ONTROL Discretionary security models provide access control on an individual basis. Access control is based on User’s identity and Access control rules Most common administration: owner based Users can protect what they own Owner may grant access to others Owner may define the type of access given to others Source: Randy, 97

A CCESS C ONTROL MATRIX Access Control Matrix model is perhaps the most fundamental and widely used discretionary access control model for enforcing simple security policies. Resource and process protection can use separate access control matrices. Source: Randy, 97

A CCESS C ONTROL M ATRIX Source: Randy, 97

A CCESS C ONTROL M ATRIX Reducing the Size of Access Control Matrix Subject rows in the ACM that have identical entries i.e subjects that have similar access rights on common objects, could be merged into groups. If a user belongs to more than one group, its access rights is the union of all access rights of all the groups it belongs to. Similarly Object columns with same entries could be merged into ‘categories’ Source: Randy, 97

D ISTRIBUTED C OMPARTMENT A distributed application with collaborating processes may consists of subject users and object resources crossing the physical boundaries of physical resources. Here, a logical ACM called a ‘distributed compartment’ that regulates access among the collaborating users would serve a better purpose. These handles are application oriented and they provide a protective wall around an application and are authenticated by the application Source: Randy, 97

A D ISTRIBUTED C OMPARTMENT M ODEL Local Subjects & Objects Local Subjects & Objects Collaborating Subjects & Objects across nodes boundaries with application oriented ACM Distributed Compartment Compartment Access using Distributed Handles Source: Randy, 97

D ISTRIBUTED C OMPARTMENT The distributed compartment model has a number of advantages The grouping of subjects and objects is logical and application specific. The accesses are more transparent since they do not depend on the operating systems and administrative units. Since the application manages the distributed handles, it allows different security policies to be implemented Source: Randy, 97

I MPLEMENTATIONS OF ACM For efficiency and organizational purposes, access control matrices need to be partitioned The Linked list structure that contains all entries in a column for a particular object is called a Access control List (ACL) for the object. An ACL specifies the permissible rights that various subjects have on the object Likewise all entries in a row for a subject is called a Capability List (CL) for the subject. A CL specifies privileges to various objects held by a subject Source: Randy, 97

C OMPARISON OF ACL & CL Comparison in terms of management functions Authentication Reviewing of Access Rights Propagation of Access Rights Revocation of Access Rights Conversion between ACL and CL Source: Randy, 97

AUTHENTICATION ACL Authenticates subjects, which is performed by the system While in CL, authentication is performed on capabilities of objects, by the object server. Objects have knowledge of the capabilities,but do not know the users or processors. This is one of the reasons why many Distributed implementations favor the CL approach Source: Randy, 97

Review Of Access Rights To know which subjects are authorized to use a certain objects. Easier to review ACL, because ACL contains exactly this information. For storage efficiency subject grouping, wildcards,prohibitive rights could also be used. It is difficult to review for a CL unless some type of activity log is kept for all subjects that are given the capability Source: Randy, 97

P ROPAGATION O F A CCESS R IGHTS Access rights must be replicatable to facilitate sharing. Propagation is Duplication of some or all the privileges from one subject to the others. Propagation is not transfer of rights, it is only duplication. In ACL, propagation of rights is explicitly initiated by a request to the object server, which modifies or adds an entry to its ACL. Source: Randy, 97

PROPAGATION OF ACCESS RIGHTS… Propagation of rights must adhere to the principle of least principles. i.e. Only the minimum privileges required to perform the tasks are given when propagating the rights In CL, theoretically it is propagate rights between subjects without intervention of object server. This could result in an uncontrollable system and hence is avoided. Source: Randy, 97

R EVOCATION O F A CCESS R IGHTS Revocation is trivial in ACL because it is easy to delete subject entries from the ACL. It is difficult for CL’s to revoke access selectively. Source: Randy, 97

C ONVERSION B ETWEEN ACL & CL Interactions among processes involving different Access control models would require gateways for conversions. Conversion to ACL is straightforward. Consider example of processes in a CL requiring to access remote objects in ACL Gateway Authenticates the process identifier. It Then verifies the operation in the capability list. The request is then converted to ACL and is presented to the remote host Source: Randy, 97

C ONVERSION B ETWEEN ACL & CL Converting a ACL request to CL is slightly more complex Requires a database with resource capabilities for the interacting processes Gateway validates the ACL request obtains the resource capability from the database server Capability is then presented to capability based object server. A system utilizing both ACL and CL suffers the drawback of both approaches Furthermore the conversions causes additional security hazards Source: Randy, 97

R ELATED RESEARCH Information Flow Control in Object-Oriented Systems [2] [1997] In this paper, Samarati describes a high assurance discretionary access control model for object-oriented systems. The model not only ensures protection against Trojan horses leaking information, but provides the flexibility of discretionary access control at the same time.

CONT’D Access Control Model in Object-Oriented Systems [Izaki,2000] The authors discuss a discretionary access control model to realize secure object-oriented systems. An object is manipulated only through methods supported by the object. Classes and objects are hierarchically structured in generalization (is-a) and aggregation (part-of) relations. They discuss how to authorize and inherit access rights on classes and objects in the hierarchical structure.

CONT’D A layered design of discretionary access controls with decidable safety properties [Solworth,2004] Solworth present a general access control model which can be parameterized at the second layer to implement (express) any of the standard Discretionary Access Control (DAC) models. They show that the safety problem is decidable for any access control model implemented using our general access control model. Until now, all general access control models that were known to be sufficiently expressive to implement the full range of DAC models had an undecidable safety problem. Thus, given our model all of the standard DAC models (plus many others) can be implemented in a system in which their safety properties are decidable.

CONT’D Managing Information Flows on Discretionary Access Control Models [Lin,2006] In 1989, Brewer and Nash (BN) presented a fascinating idea, called Chinese wall security policy model, for commercial security. Their idea was based on the analysis of the notion, Conflict of Interest binary Relation (CIR). Unfortunately, their formalization did not fully catch the appropriate properties of CIR. In this paper, Lin present a theory based on granulation that has captured the essence of BN's intuitive idea. The results are more than the Chinese wall models: Malicious Trojan horses in certain DAC Model (discretionary access control) can be controlled or confined.

R EFERENCES [1]Randy Chow & Theodore Johnson, 1997,“ Distributed Operating Systems & Algorithms ”, (Addison-Wesley), p. 271 to 278 [2] Samarati, P.; Bertino, E.; Ciampichetti, A.; Jajodia, S.; “ Information flow control in object-oriented systems”. Knowledge and Data Engineering, IEEE Transactions on Volume 9, Issue 4, July-Aug Page(s): [3] Izaki, K.; Tanaka, K.; Takizawa, M.; “Access control model in object- oriented systems” Parallel and Distributed Systems: Workshops, Seventh International Conference on, July 2000 Page(s): Parallel and Distributed Systems: Workshops, Seventh International Conference on, 2000 [4] Lin, Tsau Young (T. Y.); “ Managing Information Flows on Discretionary Access Control Models” Systems, Man and Cybernetics, ICSMC '06. IEEE International Conference onVolume 6, 8-11 Oct Page(s): Systems, Man and Cybernetics, ICSMC '06. IEEE International Conference on [5] Solworth, J.A.; Sloan, R.H.; “A layered design of discretionary access controls with decidable safety properties” Security and Privacy, Proceedings IEEE Symposium on 9-12 May 2004 Page(s): Security and Privacy, Proceedings IEEE Symposium on

QUESTIONS ? Thank you!