development of an open network hierarchical identity-based access control system

16
By Jyh-haw yeh Department of Computer Science Boise State University

Upload: jonah-ashley

Post on 02-Jan-2016

26 views

Category:

Documents


2 download

DESCRIPTION

By Jyh-haw yeh Department of Computer Science Boise State University. Development of an open network Hierarchical Identity-Based Access Control System. Access Control. Controlling data accesses within a networked enterprise, based on security needs. Define access control policy - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: Development of an open network Hierarchical Identity-Based Access Control System

By Jyh-haw yehDepartment of Computer ScienceBoise State University

Page 2: Development of an open network Hierarchical Identity-Based Access Control System

Access Control

Controlling data accesses within a networked enterprise, based on security needs.

Define access control policy

User authentication

Policy enforcement mechanisms

Data transmission through networks

Page 3: Development of an open network Hierarchical Identity-Based Access Control System

Identity-Based Access Control (IBAC) Authentication is based on user’s

identity, rather than network connection port.

User identity/job duty, time and location of connection – define a set of security groups

Different groups have different access privileges on objects.

Each object has an access control list (ACL) as an enforcing mechanism.

Page 4: Development of an open network Hierarchical Identity-Based Access Control System

Deficiency Observation of IBAC Security groups have no relationship

among them – require duplicate administrative work (See Figure 1)

Use different keys for authentication (master key) and authorization (session key).

Require a new session key for each access session.

Session key generation and distribution may slow down performance.

Page 5: Development of an open network Hierarchical Identity-Based Access Control System

Administrative WorkFigure 1: HIBAC versus IBAC (a) Privilege assignment (b) User assignment

(c) ACL for an Object

IBAC

HIBAC

G1

G2

G3

G1

G2

G3

G1

G2

G3

G3

G1

G2

G1: P

G2: P

G3: P

G3: P

Page 6: Development of an open network Hierarchical Identity-Based Access Control System

Hierarchical Identity-Based Access Control (HIBAC) Define Security groups to have a

hierarchical privilege-inheritance relationship.

A group A inherits privileges from a group B if A is located higher than B in the hierarchy.

A single mechanism, hierarchical key assignment, for authentication and authorization.

Page 7: Development of an open network Hierarchical Identity-Based Access Control System

HIBAC, continue…

Why hierarchical? Reduce administrative work.

Simplify authentication and authorization logics – single hierarchical key V.S. master & session keys

The hierarchical key can also be used for data encryption during transmission.

Page 8: Development of an open network Hierarchical Identity-Based Access Control System

A Walk through Example

A xyz company defines 6 security groups, based on job duty, time and location of network connection.

CEO, Finance (FIN), Human Resource (HR), Employee (E), Employee Restricted (ER) and Guest (G).

Table 1 specifies the access right assignment.

Form a hierarchical policy (See Figure 2).

Page 9: Development of an open network Hierarchical Identity-Based Access Control System

A Walk through ExampleTable 1: Access right assignment in a xyz

companyIdentity/duty Location Time Security Group

Guest Public Working hrs G

Guest Public Non-working hrs No access

Guest Office All No access

Employee Public All ER

Employee Office All E

Finance Public All ER

Finance Office All FIN

Human resource

Public All ER

Human resource

Office All HR

CEO Public All ER

CEO Office All CEO

Page 10: Development of an open network Hierarchical Identity-Based Access Control System

A Walk through Example

Figure 2: Hierarchical policy and it’s hierarchical key assignment

CEO: K1 / \ FIN: K2 HR: K3 \ / E: K4 | ER: K5 | G: K6

Page 11: Development of an open network Hierarchical Identity-Based Access Control System

A Walk through ExampleAuthentication: Alice has it’s own hierarchical key, say

K2.

Alice login networks through an authentication (AE) server. Challenge-and-response between Alice’s machine and AE server.

Alice uses K2 (or K5, if public location) to encrypt response to server – prove the security group FIN (or ER) she belongs to.

Page 12: Development of an open network Hierarchical Identity-Based Access Control System

A Walk through Example

Authentication: After authentication, AE server

create a signed proof P to Alice and authorization (AO) server.

The proof P may contain

AE signature

Security group

Freshness data

Optional data: identity, location and time

Page 13: Development of an open network Hierarchical Identity-Based Access Control System

A Walk through ExampleAuthorization: Alice makes an access request to AO

server, with P attached.

AO server verifies P and thus authenticate Alice.

Based on P, AO server either grants or denies the access.

Page 14: Development of an open network Hierarchical Identity-Based Access Control System

A Walk through Example

Data transmission: If AO server grants access to Alice,

AO server can use either K2 or K5 to encrypt data and transmits it to Alice.

Upon receiving data, Alice uses either K2 or K5 to decrypt data.

Page 15: Development of an open network Hierarchical Identity-Based Access Control System

Research Challenges

Design issues: Guidelines for defining a hierarchical policy

session key vs. hierarchical key

Minimum contents of P

Prevent the re-use of P – freshness data, revocation of P

Figure 1 shows the advantage of reducing administrative work in HIBAC – need quantitative measurement.

Page 16: Development of an open network Hierarchical Identity-Based Access Control System

Research Challenges

The walk through example show the simple logic for authentication and authorization processes in HIBAC – need an event-driven simulation to measure the system performance, in terms of increased control messages and storage.

Investigate any unnoticed security vulnerability of the new system.