Presentation is loading. Please wait.

Presentation is loading. Please wait.

Systems and Internet Infrastructure Security (SIIS) LaboratoryPage Systems and Internet Infrastructure Security Network and Security Research Center Department.

Similar presentations


Presentation on theme: "Systems and Internet Infrastructure Security (SIIS) LaboratoryPage Systems and Internet Infrastructure Security Network and Security Research Center Department."— Presentation transcript:

1 Systems and Internet Infrastructure Security (SIIS) LaboratoryPage Systems and Internet Infrastructure Security Network and Security Research Center Department of Computer Science and Engineering Pennsylvania State University, University Park PA 1 Location Based Access Control Progress Report Joshua Schiffman

2 Systems and Internet Infrastructure Security (SIIS) LaboratoryPage 2 Motivation Typical file access control ‣ Roles, usernames, types Authentication of a user does not necessarily mean they should have access to data ‣ Location is important ‣ Difficult to prove ‣ Even harder to manage

3 Systems and Internet Infrastructure Security (SIIS) LaboratoryPage 3 Experiment Goals Utilize locating technology to provide a location guarantee ‣ Part of current research Provide a policy that gives hierarchical location- based roles Create a proof of concept implementation that is intuitive and minimally intrusive

4 Systems and Internet Infrastructure Security (SIIS) LaboratoryPage 4 Design Goals Access to files should be entirely mediated by the access control daemon ‣ Encryption to prevent offline attack [eCryptfs] ‣ Authenticated access to the system [Pam-mount] ‣ Locality locking / unlocking is automatic [Location LSM]

5 Systems and Internet Infrastructure Security (SIIS) LaboratoryPage 5 Policy Goals The policy should be intuitive and flexible ‣ Hierarchical structure ‣ Logical representation

6 Systems and Internet Infrastructure Security (SIIS) LaboratoryPage 6 Methodology

7 Systems and Internet Infrastructure Security (SIIS) LaboratoryPage 7 Evaluation To test the system, I will ‣ Implement the LSM ‣ Show performance metrics Timing to access files ‣ Analyze the trust model


Download ppt "Systems and Internet Infrastructure Security (SIIS) LaboratoryPage Systems and Internet Infrastructure Security Network and Security Research Center Department."

Similar presentations


Ads by Google