HIBAC - Computer Science

advertisement
By Jyh-haw yeh
Department of Computer Science
Boise State University
DEVELOPMENT OF AN OPEN NETWORK
HIERARCHICAL IDENTITY-BASED
ACCESS CONTROL SYSTEM
Access Control
Controlling data accesses within a networked
enterprise, based on security needs.
 Define access control policy
 User authentication
 Policy enforcement mechanisms
 Data transmission through networks
Identity-Based Access Control
(IBAC)
 Authentication is based on user’s identity,
rather than network connection port.
 User identity/job duty, time and location of
connection – define a set of security groups
 Different groups have different access
privileges on objects.
 Each object has an access control list (ACL) as
an enforcing mechanism.
Deficiency Observation of IBAC
 Security groups have no relationship among
them – require duplicate administrative work
(See Figure 1)
 Use different keys for authentication (master
key) and authorization (session key).
 Require a new session key for each access
session.
 Session key generation and distribution may
slow down performance.
Administrative Work
Figure 1: HIBAC versus IBAC
(a) Privilege assignment (b) User assignment (c) ACL for an Object
IBAC
G1
G1
G2
G2
G1: P
G2: P
G3: P
G3
G3
G1
G1
G2
G2
G3
G3
HIBAC
G3: P
Hierarchical Identity-Based
Access Control (HIBAC)
 Define Security groups to have a hierarchical
privilege-inheritance relationship.
 A group A inherits privileges from a group B if
A is located higher than B in the hierarchy.
 A single mechanism, hierarchical key
assignment, for authentication and
authorization.
HIBAC, continue…
Why hierarchical?
 Reduce administrative work.
 Simplify authentication and authorization
logics – single hierarchical key V.S. master &
session keys
 The hierarchical key can also be used for data
encryption during transmission.
A Walk through Example
 A xyz company defines 6 security groups,
based on job duty, time and location of
network connection.
 CEO, Finance (FIN), Human Resource (HR),
Employee (E), Employee Restricted (ER) and
Guest (G).
 Table 1 specifies the access right assignment.
 Form a hierarchical policy (See Figure 2).
A Walk through Example
Table 1: Access right assignment in a xyz company
Identity/duty
Location
Time
Security Group
Guest
Public
Working hrs
G
Guest
Public
Non-working hrs
No access
Guest
Office
All
No access
Employee
Public
All
ER
Employee
Office
All
E
Finance
Public
All
ER
Finance
Office
All
FIN
Human resource
Public
All
ER
Human resource
Office
All
HR
CEO
Public
All
ER
CEO
Office
All
CEO
A Walk through Example
Figure 2: Hierarchical policy and it’s hierarchical key
assignment
CEO: K1
/ \
FIN: K2 HR: K3
\
/
E: K4
|
ER: K5
|
G: K6
A Walk through Example
Authentication:
 Alice has it’s own hierarchical key, say K2.
 Alice login networks through an authentication
(AE) server. Challenge-and-response between
Alice’s machine and AE server.
 Alice uses K2 (or K5, if public location) to encrypt
response to server – prove the security group FIN (or
ER) she belongs to.
A Walk through Example
Authentication:
 After authentication, AE server create a
signed proof P to Alice and authorization
(AO) server.
 The proof P may contain
AE
signature
Security
group
Freshness
data
Optional data: identity,
location and time
A Walk through Example
Authorization:
 Alice makes an access request to AO server, with
P attached.
 AO server verifies P and thus authenticate Alice.
 Based on P, AO server either grants or denies the
access.
A Walk through Example
Data transmission:
 If AO server grants access to Alice, AO server
can use either K2 or K5 to encrypt data and
transmits it to Alice.
 Upon receiving data, Alice uses either K2 or
K5 to decrypt data.
Research Challenges
 Design issues:
 Guidelines for defining a hierarchical policy
 session key vs. hierarchical key
 Minimum contents of P
 Prevent the re-use of P – freshness data, revocation
of P
 Figure 1 shows the advantage of reducing
administrative work in HIBAC – need
quantitative measurement.
Research Challenges
 The walk through example show the simple
logic for authentication and authorization
processes in HIBAC – need an event-driven
simulation to measure the system
performance, in terms of increased control
messages and storage.
 Investigate any unnoticed security
vulnerability of the new system.
Download