FRAC: Implementing Role-Based Access Control for Network File Systems Aniruddha Bohra, Stephen Smaldone, and Liviu Iftode Department of Computer Science.

Slides:



Advertisements
Similar presentations
Working Set-Based Access Control for Network File Systems Stephen Smaldone, Vinod Ganapathy, and Liviu Iftode DiscoLab - Department of Computer Science.
Advertisements

Role Based Access control By Ganesh Godavari. Outline of the talk Motivation Terms and Definitions Current Access Control Mechanism Role Based Access.
Establishing an OU Hierarchy for Managing and Securing Clients Base design on business and IT needs Split hierarchy Separate user and computer OUs Simplifies.
Cobalt: Separating content distribution from authorization in distributed file systems Kaushik Veeraraghavan Andrew Myrick Jason Flinn University of Michigan.
File Server Organization and Best Practices IT Partners June, 02, 2010.
Access Control Chapter 3 Part 3 Pages 209 to 227.
New Challenges for Access Control April 27, Improving Usability and Expressiveness with Dynamic Policies and Obligations Dennis Kafura Markus Lorch.
Security Leadership Essentials – Defense-in-Depth – © 2006 SANS Role-Based Access Control (RBAC) Approach for Defense-in-Depth Peter Leight and Richard.
Role Based Access Control Venkata Marella. Access Control System Access control is the ability to permit or deny the use of a particular resource by a.
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 5 Database Application Security Models.
1 Secure Information Sharing Manager (SIS-M) Thesis 2007 Stephen D. Wise
FileWall : Implementing File Access Policies Using Dynamic Access Context Stephen Smaldone, Aniruddha Bohra, and Liviu Iftode DiscoLab Department of Computer.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 1: Introduction to Windows Server 2003.
Implementing Network File System Policies with FileWall Stephen Smaldone, Aniruddha Bohra, and Liviu Iftode Department.
1 CSE 380 Computer Operating Systems Instructor: Insup Lee and Dianna Xu University of Pennsylvania Fall 2003 Lecture Note: Protection Mechanisms.
APPLAUS: A Privacy-Preserving Location Proof Updating System for Location-based Services Zhichao Zhu and Guohong Cao Department of Computer Science and.
Implementing ISA Server Caching. Caching Overview ISA Server supports caching as a way to improve the speed of retrieving information from the Internet.
Zap Steven Osman Dinesh Subhraveti Gong Su Jason Nieh A System for Migrating Computing Environments.
Lesson 4: Configuring File and Share Access
Chapter 5 Database Application Security Models
Hussain Ali Department of Computer Engineering KFUPM, Dhahran, Saudi Arabia Microsoft Networking.
Role Based Access control By Ganesh Godavari. Outline of the talk Motivation Terms and Definitions Current Access Control Mechanism Role Based Access.
Distributed Computer Security 8.2 Discretionary Access Control Models - Sai Phalgun Tatavarthy.
Lecture slides prepared for “Computer Security: Principles and Practice”, 2/e, by William Stallings and Lawrie Brown, Chapter 4 “Overview”.
Authentication and authorization Access control consists of two steps, authentication and authorization. Subject Do operation Reference monitor Object.
ADVANCED LINUX SECURITY. Abstract : Using mandatory access control greatly increases the security of an operating system. SELinux, which is an implementation.
MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration Chapter 7 Configuring File Services in Windows Server 2008.
Understanding Active Directory
Presented By: Matthew Garrison. Basics of Role Based Access Control  Roles are determined based on job functions within a given organization  Users.
Li Xiong CS573 Data Privacy and Security Access Control.
Introduction to Active Directory Services Completely integrated with Microsoft Windows 2000 Server Integrates the Internet concept of namespace with the.
1 © Talend 2014 XACML Authorization Training Slides 2014 Jan Bernhardt Zsolt Beothy-Elo
Hands-On Microsoft Windows Server 2008 Chapter 1 Introduction to Windows Server 2008.
Hands-On Microsoft Windows Server 2008 Chapter 5 Configuring, Managing, and Troubleshooting Resource Access.
Report : Zhen Ming Wu 2008 IEEE 9th Grid Computing Conference.
A PERMIS-based Authorization Solution between Portlets and Back-end Web Services Hao Yin 1, Sofia Brenes-Barahona 2, Donald F. McMullen * 2, Marlon Pierce.
Hands-On Microsoft Windows Server 2008 Chapter 1 Introduction to Windows Server 2008.
DATA DYNAMICS AND PUBLIC VERIFIABILITY CHECKING WITHOUT THIRD PARTY AUDITOR GUIDED BY PROJECT MEMBERS: Ms. V.JAYANTHI M.E Assistant Professor V.KARTHIKEYAN.
Objectives Configure routing in Windows Server 2008 Configure Routing and Remote Access Services in Windows Server 2008 Network Address Translation 1.
Module 1: Exploring Replication. Overview Understanding SQL Server Replication Setting Up Replication Understanding Agents in Replication Securing Replication.
1 Chapter Overview Performing Configuration Tasks Setting Up Additional Features Performing Maintenance Tasks.
NIST Standard for Role- Based Access Control Present by Wenyi Ni.
Li Xiong CS573 Data Privacy and Security Access Control.
Windows Role-Based Access Control Longhorn Update
A Pattern Language for Firewalls Eduardo B. Fernandez, Maria M. Petrie, Naeem Seliya, Nelly Delessy, and Angela Herzberg.
Advanced CAMP: BoF Summaries. 2 Role-based Access Control (RBAC)
A Standards-Based Approach for Supporting Dynamic Access Policies for a Federated Digital Library K. Bhoopalam, K. Maly, F. McCown, R. Mukkamala, M. Zubair.
© ITT Educational Services, Inc. All rights reserved. IS3230 Access Security Unit 6 Implementing Infrastructure Controls.
ROLE BASED ACCESS CONTROL 1 Group 4 : Lê Qu ố c Thanh Tr ầ n Vi ệ t Tu ấ n Anh.
Full-Text Support in a Database Semantic File System Kristen LeFevre & Kevin Roundy Computer Sciences 736.
Linux Operations and Administration
Computer Security: Principles and Practice
Configuring, Managing and Maintaining Windows Server® 2008 Servers Course 6419A.
Distributed File Systems Questions answered in this lecture: Why are distributed file systems useful? What is difficult about distributed file systems?
LINUX Presented By Parvathy Subramanian. April 23, 2008LINUX, By Parvathy Subramanian2 Agenda ► Introduction ► Standard design for security systems ►
Security-Enhanced Linux Stephanie Stelling Center for Information Security Department of Computer Science University of Tulsa, Tulsa, OK
Active Directory Domain Services (AD DS). Identity and Access (IDA) – An IDA infrastructure should: Store information about users, groups, computers and.
Microsoft Exchange Server 2013 Security Mick Tomlinson– Technical Instructor New Horizons.
 Project Team: Suzana Vaserman David Fleish Moran Zafir Tzvika Stein  Academic adviser: Dr. Mayer Goldberg  Technical adviser: Mr. Guy Wiener.
Presented By: Smriti Bhatt
Institute for Cyber Security
Securing the Network Perimeter with ISA 2004
Chapter 27: System Security
BACHELOR’S THESIS DEFENSE
BACHELOR’S THESIS DEFENSE
BACHELOR’S THESIS DEFENSE
IP Control Gateway (IPCG)
Designing IIS Security (IIS – Internet Information Service)
Preventing Privilege Escalation
NIST Standard for Role-Based Access Control
Presentation transcript:

FRAC: Implementing Role-Based Access Control for Network File Systems Aniruddha Bohra, Stephen Smaldone, and Liviu Iftode Department of Computer Science Rutgers University

2 ProgrammersMotivation User A Time > 5 PM Time < 5 PM User A Developer User A Programme r Shell scripts cron jobs Manual Developers User A User B User C User A User D File F : { Developers, !Programmers } File F : { User B, User C }

3 Role-Based Access Control (RBAC) Roles UsersPerms Users 1 User A READWRITEDELETE ALLOWUsers 1Users 2Devs LOGProgs ALARMThreat READWRITEDELETE ALLOW LOG ALARM Role Hierarchy Users 2 Devs Users 1 Progs

4 Benefits of RBAC Policy Specification –Administrators define system-wide access control policies –Users may query and update portions of the access control system state –Simplified sharing and protection Role Management –Role Hierarchy: Inheritance –Static Separation of Duties (SSD) Session Management –Dynamic User to Role Mapping –Dynamic Separation of Duties (DSD) Centralized Access Control Policy Enforcement –Enforcement of Principle of Least Privilege (POLP) –Verifiability of policy enforcement: auditing

5 RBAC for Network File Systems? FS ClientFile Server FS Protocol Modifications Interface changes Application changes … FS ClientFile Server External Authority User AC Policy Changes require user agent Access Control Decisions AC Policy Changes

6 FRAC: Network File System RBAC in a Middlebox FS ClientFile Server Middlebox Access Control Decisions Virtual Control Namespace (VCN) Maintained at FRAC and Accessed by Client Query State of AC System = FS READ Update Permissions and AC Policies = FS WRITE VCN Standard FS Protocol FRAC AC Policy Changes

7Outline Introduction Design and Implementation –Background –Permission Evaluation in FRAC –Enforcing Principle of Least Privilege –Virtual Control Namespace (VCN) Evaluation Related Work Conclusions

8 Design Requirements Middlebox to Enforce RBAC Policies –Interpose and transform messages –Understand file system semantics –Store policies and maintain state –Evaluate and enforce file system access control policies Virtual Control Namespace –Enable users to query and owners to update the access control policy –Virtualize file system objects –Handle file system operations for virtual objects

9 Background: FileWall FileWall: A Firewall for Network File System, S. Smaldone, A. Bohra, and L. Iftode. To appear in the Proceedings of the 3rd IEEE International Symposium on Dependable, Autonomic and Secure Computing (DASC'07) Scheduler Forwarder Access Context FileWall Policy Request Handler File Server … FS Client

10 Permission Evaluation in FRAC Forwarder Access Context FRAC FS Client File Server AC Matrix DENY Time Time > 5 PM ? ALLOW Scheduler

11 Enforcing Principle of Least Privilege Access Context SessionID{Active Roles} (U0, G0)Progs VFHFHAC Matrix V0F0(READ, Users1) FS Request File Handle = V0 UserID = U0 GroupID = G0 Op = READ Role Hierarchy Users 2 Devs Users 1 Progs Users 1

12 Virtual Control Namespace (VCN) Root VCN Session Shadow Mirrored FS Namespace FILE METADATA AC MATRIX Shadow File Contents Active Roles User -> Role Mappings Session Control Interface

13 VCN Challenges Creation of virtual objects –Must create file identifiers for virtual objects –Must avoid file identifier collisions between virtual and real objects –Provide virtual identifiers for all objects and store mappings Introduce virtual objects in existing namespace –Create virtual namespace under root of real namespace –Must modify namespace operations (e.g., READDIR, LOOKUP, etc.) to “splice” in virtual namespace Handle file system operations to virtual objects –Need to distinguish accesses to virtual objects from those for real objects –Demultiplex based on virtual identifier to real identifier mappings

14 VCN Handler VCN in FRAC Forwarder Access Context FRAC FS Client File Server home VCNbob VFH -> FH Map To Server To Client home bob Scheduler

15 Prototype Implementation Network middlebox –FRAC implemented as a FileWall policy module –Implements RBAC for NFSv3 protocol –Direct access limited only to administrators Access Context –Berkeley DB: An open source database Policy specification –Static configuration using XACML –Updates supported through VCN for users

16Outline Introduction Design and Implementation Evaluation Related Work Conclusions

17Evaluation Roles –Arranged as linear chain: highest to lowest privilege level –Session starts with a role at head of chain (worst case) Setup –Systems: Dell Poweredge 2600 SMP systems, 2.4 GHz Xeon II CPU, 2 GB RAM, running Linux 2.6 –Microbenchmark: User-level RPC client –Application Benchmark: OpenSSH compilation

18 Results - Microbenchmark Worst case overhead is low!

19 Results - OpenSSH Compilation Most expensive data phases have small (<10% & < 15%) overheads!

20 Related Work RBAC Model –RBAC Standards [Ferraiolo’01, ANSI/INCITS’04] RBAC for Network File Systems –Protocol Modifications [Gustaffson’97] –Agent-Based Systems [He’05] Virtual and Programmable Namespaces –Plan 9 [Pike’93] –Semantic File Systems [Sheldon’91]

21 Conclusions and Future Work FRAC: RBAC for network file systems using a middlebox (FileWall) –Requires no client or server modifications –Virtual Control Namespace eliminates use of specialized agents –Low overheads: < 15% overhead for up to 50 roles Future Work: –Language for Specification and Verification of policies –Continuous Monitoring of network file system accesses

Thank You! Questions?