Download presentation
Presentation is loading. Please wait.
Published byElinor Craig Modified over 8 years ago
1
Systems and Internet Infrastructure Security (SIIS) LaboratoryPage Systems and Internet Infrastructure Security Network and Security Research Center Department of Computer Science and Engineering Pennsylvania State University, University Park PA 1 Location Based Access Control Progress Report Joshua Schiffman
2
Systems and Internet Infrastructure Security (SIIS) LaboratoryPage 2 Motivation Typical file access control ‣ Roles, usernames, types Authentication of a user does not necessarily mean they should have access to data ‣ Location is important ‣ Difficult to prove ‣ Even harder to manage
3
Systems and Internet Infrastructure Security (SIIS) LaboratoryPage 3 Experiment Goals Utilize locating technology to provide a location guarantee ‣ Part of current research Provide a policy that gives hierarchical location- based roles Create a proof of concept implementation that is intuitive and minimally intrusive
4
Systems and Internet Infrastructure Security (SIIS) LaboratoryPage 4 Design Goals Access to files should be entirely mediated by the access control daemon ‣ Encryption to prevent offline attack [eCryptfs] ‣ Authenticated access to the system [Pam-mount] ‣ Locality locking / unlocking is automatic [Location LSM]
5
Systems and Internet Infrastructure Security (SIIS) LaboratoryPage 5 Policy Goals The policy should be intuitive and flexible ‣ Hierarchical structure ‣ Logical representation
6
Systems and Internet Infrastructure Security (SIIS) LaboratoryPage 6 Methodology
7
Systems and Internet Infrastructure Security (SIIS) LaboratoryPage 7 Evaluation To test the system, I will ‣ Implement the LSM ‣ Show performance metrics Timing to access files ‣ Analyze the trust model
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.