版權(quán)說明:本文檔由用戶提供并上傳,收益歸屬內(nèi)容提供方,若內(nèi)容存在侵權(quán),請進(jìn)行舉報(bào)或認(rèn)領(lǐng)
文檔簡介
1、a framework for role-based access control in group communica in this paper we analyze the requirements access control mechanisms must fulfill in the context of group communication and define a framework for supporting fine-grained access control in client-server group communication systems. our fram
2、ework combines ro aframeworkforrole-basedaccesscontrolingroup communicationsystems cristinanita-rotaruandninghuilidepartmentofcomputersciences purdueuniversitywestlafayette,in47907 abstract inthispaperweanalyzetherequirementsaccesscontrolmechanismsmustful llinthecontextofgroupcommunicationandde neaf
3、rameworkforsupporting ne-grainedaccesscontrolinclient-servergroupcom-municationsystems.ourframeworkcombinesrole-basedaccesscontrolmechanismswithenvironmentpa-rameters(time,ipaddress,etc.)toprovidesupportforawiderangeofapplicationswithverydi erentre-quirements.whiletheaccesscontrolpolicyisde nedbythe
4、application,itse cientenforcementisprovidedbythegroupcommunicationsystem. 1introduction manycollaborativeapplicationssuchasphoneandvideoconferencing,white-boards,distance-learningapplications,games,sharedinstrumentcontrol,aswellascommand-and-controlsystems,haveincommontheneedforacommunicationinfrast
5、ructurethatpro-videse cientmessagedisseminationtomultiplepar-ties(oftenorganizedingroupsbasedonacommonin-terest),e cientsynchronizationmechanismsthatal-lowforcoordinationandlast,butnotleast,securityservices.groupcommunicationsystems(gcs)pro-videsuchservices.examplesofgroupcommunica-tionsystemsinclud
6、e:isis9,horus21,transis4,totem6,rmp28,rampart20,securering13,ensemble24andspread8,3. animportantaspectforsecurecollaborativegroupsisde ningandenforcingasecuritypolicy.asetofdef-initionsandrequirementsofsecuritypoliciesingroupsispresentedin12.theminimalsetofsecurityser-vicesthatshouldbeprovidedbyanys
7、ecuregcsandshouldbespeci edinagrouppolicyinclude:clientau-thentication,accesscontrol,groupkeymanagement,dataintegrityandcon dentiality. whileconsiderableresearchhasbeenconductedto designscalableandfault-tolerantgroupkeymanage-mentprotocols29,23,5,andtoprovidedatacon -dentialityandintegrity17,2,25,7f
8、orgroups,lessworkfocusedontheaccesscontrolservices.whengcsareusedasacommonplatformbyseveralap-plicationswithdi erentsecurityrequirements,thereisanobviousneedtocontrolwhocanjoinagroup,whocansend/receivemessages,etc.majorchallengeswhenprovidingaccesscontrolservicestogcsarerec-onciling exibilitywithsca
9、lability,ande cientlyen-forcingaccesscontrolinthecontextofdynamicanddistributedgroupswhilesupportingprocessfailuresandnetworkpartitions. mostexistingworkinprovidingaccesscontrolforgroupsemploystraditionalaccesscontrolschemessuchasaccesscontrollists(acls).suchschemesmakeauthorizationdecisionsbasedont
10、heidentityoftherequester.however,indecentralizedormulti-centricenvironments,theresourceownerandtherequesterareoftenunknowntooneanother,makingaccesscon-trolbasedonidentityine ectiveorveryexpensivetomaintain. weadoptanapproachinwhichtheoperationsaclientisallowedtoperformdependsontheroletheclientisplay
11、inginthegroup,andauthenticatedat-tributesoftheclientareusedtodeterminewhichrolestheclientcanplayinagroup.wefocusonagcsus-ingaclient-serverarchitecturewherethedistributedprotocolsarerunbetweenasetofserversprovidingservicestonumerousclients.morespeci cally,ourcontributionsare: weinvestigatetherequirem
12、entsforaccesscontrolmechanismsingcsandshowwhyidentity-basedschemesdonotprovideenough exibilitytosup-portalargeclassofcollaborativeapplications. wedesigna ne-grainedaccesscontrolframeworkforgcs,basedonideasinrole-basedaccesscontrol26,10andrt15,arole-basedtrust-managementlanguage.ourframeworkallowsan
13、in this paper we analyze the requirements access control mechanisms must fulfill in the context of group communication and define a framework for supporting fine-grained access control in client-server group communication systems. our framework combines ro applicationtode neitsspeci cpolicieswhileth
14、eenforcementisperformedinane cientmannerbythegcs.thisisachievedbyde ningasetofbasicgroupoperationsandrolesthatcanbecon-trolledandenforcedbythegcs.anyapplicationspeci cpolicycanbedecomposedintotheseba-sicoperationsandapplicationspeci crolescanbemappedtosystemroles. weanalyzewhataretheimplicationsofpr
15、ocess(serversandclients)failuresandnetworkconnec-tivitychangesonthelifecycleofagrouppol-icyingeneral,andofanaccesscontrolpolicyinparticular,andsuggesthowtheseissuescanbeaddressed.roadmapwediscussthefailureandtrustmodelsweuseinsection2.insection3wepresentindetailsthecomponentsforagrouppolicy,whileins
16、ection4wediscussthee ectsofprocessfailuresandnetworkpartitionsonthelifecycleofthepolicy.weoverviewrelatedworkinsection5.finally,wesummarizeourworkandsuggestfutureworkdirectionsinsection6. 2trustandfailuremodels inthissection,wediscussthetrustandfailuremod-elsweareusinginthispaper. 2.1trustmodel incl
17、ient-servergcs,atrustmodelhastode nethetrustrelationshipswithineachlayer(trustrelationshipbetweenclientsandtrustrelationshipbetweenservers)aswellasbetweenlayers(i.e.doclientstrustserversornot).giventhisenvironment,severaltrustmodelsarepossible,rangingfromamodelwherenoentitytrustsanyotherentityforany
18、operation,bothwithinalayerandbetweenlayers,toanoptimisticmodelwhereserversandclientstrusteachothercompletely.inthispaper,weadoptthefollowingtrustmodel: serverstrusteachother:inorderforthesystemtobebootstrappedcorrectly,alistoflegitimateserversshouldbeprovidedtoallservers,intheformofanacl.settingupth
19、islistisasystemadministratorstaskandnotanapplicationtask.weassumethatthereisawaytoauthenticateaserverwhenitcomesupandverifywhetheritisontheauthorizedcon gurationlist.onceauthenti-catedandauthorizedallserverstrusteachother.wenotethatingeneralthenumberofserversissmallandthatthewaythesesystemsareusedis
20、 rstde neaserverscon gurationthatprovidesbestperformanceforaspeci cnetworkenviron-mentandapplicationdeployment.therefore,inthiscase,anaclisanacceptablesolution. clientstrustserverstoenforcetheaccesscontrolpolicy.thisassumptionisacceptablebecause,intheclient-servergcsarchitecture,clientsal-readytrust
21、theserverstomaintaingroupmem-bershipandtotransport,orderanddelivergroupmessages,soitseemsnaturaltotrustthemalsoforenforcingtheaccesscontrolpolicy.further-more,thiswillallowforamoree cientenforce-mentsinceinnumerouscasesthedecisioncanbemadebyeachserverlocally,diminishingthecom-municationoverhead. cli
22、entsarenottrusted(eitherbytheotherclientsorbyservers).therefore,compromisingoneclientdoesnotcompromisethesecurityofthewholesystem. 2.2failuremodel ourmodelconsidersadistributedsystemthatiscomposedofagroupofserversexecutingonseveralcomputersandcoordinatingtheiractionsbyexchang-ingmessages.themessagee
23、xchangeisconductedviaasynchronousmulticastandunicast.messagescanbelostorcorrupted.weassumethatmessagecorrup-tionismaskedbyalowerlayer.aclientobtainsthegroupcommunicationservicesbyconnectingtooneoftheservers.aclientcanconnectlocallyorremotely.bothclientsandserversmayfail.whenaserverfails,alltheclient
24、sthatareconnectedtothatserverwillstopreceivinggroupcommunicationservices;theyarenotredirectedtootherservers. duetonetworkevents(e.g.,congestionoroutrightfailures)thenetworkcanbesplitintodisconnectedsubnetworkfragments.atthegroupcommunicationlayer,thisisreferredtoasapartition.anetworkpar-titionsplits
25、theserversandcanpotentiallysplitsev-eralclientgroupsindi erentcomponents.whilepro-cesses(serversorclients)areinseparatedisconnectedcomponentstheycannotexchangemessages.whenanetworkpartitionisrepaired,thedisconnectedcompo-nentsmergeintoalargerconnectedcomponent,thisisreferredatthegroupcommunicationla
26、yerasamerge.firstserversaremerged,whichinturncantriggerseveralclientgroupstobemerged. byzantine(arbitrary)processfailuresarenotcon-sideredinthiswork. in this paper we analyze the requirements access control mechanisms must fulfill in the context of group communication and define a framework for supp
27、orting fine-grained access control in client-server group communication systems. our framework combines ro 3 apolicymodelforaccesscontrolingroupcommunicationsystems inthissection,westudytherequirementsforspec-ifyingaccesscontrolpoliciesingcsandproposeapolicymodelfordoingso.ourgoalistodesignapol-icym
28、odelthatis exibleenoughsuchthatitsupportsadiversi edsetofapplicationpolicies,inaddition,thepolicymodelcanbee cientlyimplementedbythegcs.thebasicapproachweuseisasfollows.foranygroupthereisasetofbasicoperationsthatcanbeper-formedbyprincipals(entities)basedontheirrole,inagivencontext.themappingbetweeng
29、roupoperationsandroles,inagivencontext,de nestheaccesscon-trolpolicyforthatgroup.thisway,insteadofhavingeveryindividualapplicationtoimplementandenforceitsownaccesscontrolmechanisms,wehaveapplica-tionsde ningspeci cpoliciesthataretranslatedtothesetofbasicoperationsthatthegcsisawareofandcanenforceacce
30、sscontrolon. therestofthissectionisorganizedasfollows.webeginbydescribinganexamplescenarioanddis-cussingthevariouspossibleaccesscontrolpoliciesinsection3.1.insection3.2,wedescribethegroupop-erationsthataresubjectedtoaccesscontrol.wean-alyzetheuseofrolesingrouppoliciesinsection3.3.wepresentthepolicym
31、odelinsection3.4.insec-tion3.5wedescribehowapolicyspeci edinthemodelisenforced.wediscussthechallengesinmaintainingthepolicy,whiledealingwithdynamicmembership,failuresandnetworkpartitionsinsection4. 3.1anexamplescenario consideravirtual-classroomapplicationimple-mentedusingagcs.multiplecoursesexistin
32、theapplication.eachcoursehasmultiplesessions,eachofwhichisrepresentedbyavirtualclassroom,im-plementedasagroup.foreachcourse,therearein-structors(somecoursesmayhavemorethanonein-structors),tas,andstudents.aclassroomshouldbecreatedonlybyanauthorizeduser;thusapolicycon-trollingthecreationofgroupsmustex
33、istbeforethecreationofagroup.wecallsuchapolicy,atemplatepolicy.eachcoursehasatemplatepolicy.sincetem-platepoliciesexistoutsidethecontextofanygroupandcanbeviewedasresourcesnotspeci ctogcs,standardaccesscontroltechniquesareusedtocontrolthecreationandmodi cationoftemplatepolicies.inthesimplestcase,only
34、thegcsadministratorisal-lowedtocreateormodifytemplatepolicies. atemplatepolicydetermines,amongotherthings,whocancreateagroupbasedonthepolicy.onepos- siblegroupcreationruleisthatonlytheinstructorsofacourseareallowedtocreateaclassroomforthecourse.analternativeruleisthatatamayalsocreateaclassroom.onema
35、yalsoallowthecourseinstructortodelegatetoanotheruser,e.g.,aguestlecturer,theauthoritytocreateaclassroom. aftertheclassroom/groupiscreated,agrouppolicyneedstobecreated.agrouppolicycanbecreatedbycopyingthetemplatepolicy.thisgrouppolicymaythenbetailoredtosuittheneedofthecurrentclass-roomsession.onlyaut
36、horizedusersshouldbeallowedtochangethegrouppolicy. varioususersmayjointheclassroomindi erentroles,e.g.,instructor,ta,student.onlyauthorizedusersshouldbeallowedtojointheseroles.forjoiningasastudent,di erentrulesaredesirablefordi erentcases.examplesincludes:onlystudentswhoareen-rolledintheclassmayjoin
37、,theinstructororthetascanadmitadditionalstudentsinspecialcases,oronlystudentswhoareconnectingfromcertainipaddressesmayjoin(e.g.,whentakinganexam). severalkindsofcommunicationmaybegoingonsimultaneouslyintheclassroom,andtheyshouldbesubjectedtodi erentaccesscontrolrules.forexam-ple,communicationcanbepu
38、blic:lecturesdeliveredbytheinstructor,publicquestionsaskedbyastudentandtheanswerstothosequestionsbytheinstructororanothermemberoftheclassroom.someclassroomsmayallowanystudenttofreelyaskquestions,muni-cationcanalsobeprivate,forexamplestudentsmaybeallowedtoaskquestionsprivatelytothetas,orsubmittheiran
39、swerstoaquizgiveninclass.thein-structormaybealsoallowedtoejectastudentfromtheclassroom. wenotethatmostoftheaboveservicesarepro-videdbyagcs,withoutanyaccesscontrolenforce-ment.forexample,thespread8groupcommuni-cationsystemallowsformulticast(public)anduni-cast(private)communicationwithinagroup,italsoa
40、llowsforanymembertobebothasenderandare-ceiverandcandistinguishbetweendi erenttypeofmessages,whileprovidingdi erentreliabilityandor-deringcommunicationservices.inaddition,con den-tialityandintegrityofthedataisprovided. 3.2operationsingroups fromtheabovescenariodescription,wecanextractthesensitiveoper
41、ationsthatneedaccesscontrol.thefollowingoperationsarenotperformedwithinthecon-textofagroup,theyprecedethegroupcreationand in this paper we analyze the requirements access control mechanisms must fulfill in the context of group communication and define a framework for supporting fine-grained access c
42、ontrol in client-server group communication systems. our framework combines ro arenotsubjectedtoagrouppolicyoratemplatepol-icy:1)createagrouptemplatepolicyand2)modifyagrouptemplatepolicy. acomprehensivelistofbasicoperationthatapplytoagroupandaretheobjectofaccesscontrolispre-sentedbelow:1.createagrou
43、p. 2.modifyagrouppolicy.3.joinagroup. 4.sendamessageofagiventype.5.receiveamessageofagiventype.6.ejectauserfromagroup.7. destroyagroup. theabovelistdoesnotincludetheoperationofleavingagroupbecausethisisanoperationthatcannotbecontrolled.itisimpossibletopreventaclientfromleavingagroup1. weallowseparat
44、econtrolforjoiningagroup,send-ingamessage,andreceivingamessagetoprovidesupportforawiderangeofapplications.forsomeapplicationsseveralgroupmembersmaybeallowedtosend,butnottoreceivemessages.anexampleofsuchanapplicationisainformationreportingmilitaryapplicationwhereclientsusewirelesscommunication;itisde
45、sirabletolimittheinformationclientsreceiveandstoretominimizethedamagecausedincaseofcompromise.forotherapplications,somegroupmem-bersmaybeallowedtoreceivebutnottosendmes-sages.forexample,inaconferencewithalargenum-berofparticipantsonlyrepresentativesmayanswerquestions,whiletherestoftheparticipantsare
46、justlistening. 3.3rolesingroups oneapproachtospecifyandenforceaccesscontrolistouseaccesscontrollists(acls).underthisap-proach,agrouphasanacl,whichincludesasetofusersandtheoperationstheyareallowedtocarryout.suchanapproachisappropriatewhenthenumberofprincipalsandoperationsissmallandstatic.ingen-eral,a
47、clshavethefollowingdisadvantages.first,aclscangetverylarge.forexample,ifeveryregis-teredstudentinauniversityisallowedtojoinaclass-room,thentheaclwouldbesimplytoolong.sec-ond,theacloftenduplicatesinformationmaintainedinotherplacesanditsuseinadynamicdistributedsystemwillrequiremaintainingitsconsistenc
48、yacross 1any clientcane ectivelyleaveagroupbyclosingthecon-nectionwiththeserver. severalsiteswhichcanbeverydi cultandpronetointroduceinconsistencyinthesystem. fromthescenariodescribedinsection3.1,itisclearthatthesetofoperationsauserisallowedtocarryoutdependsupontherolethattheuserisplay-inginagroup.f
49、orexample,althoughausermaybetheinstructorofacourse,inaguestlecturesessionshemaybeplayingataorastudentrole. wedistinguishbetweentwokindsofroles:systemrolesandapplicationroles.systemrolesareprede- nedbythegcs;theyexistineverygroupandhaveprede nedmeaningsintermsofoperationstheyareallowedtocarryout.thef
50、ollowingaresystemrolesourframeworksupports: (group)creator:thisrolehasatmostonemem-ber,identifyingtheuserthatistheoriginalcre-atorofthegroup,i.e.,the rstmemberofthegroup.becauseoffailures,agroupscreatorrolemaybeempty. (group)controller:thisrolehasexactlyonemem-ber,whohasfullcontroloveragroup,includi
51、ngchangingthepolicyforthegroupanddestroy-ingagroup.whenausercreatesagroup,itisautomaticallymadethecreatorandthecon-trollerofthegroup.wedi erentiatethegroupcreatorfromthegroupcontrollerforseveralrea-sons.first,thecreatorofagroupmaywanttotransferthecontrollerresponsibilitiestoanothermemberofthegroup;f
52、orexample,atamaycre-ateaclassroombeforetheinstructorcomesandthen,aftertheinstructorjoins,transfertheroletotheinstructor.second,evenwhenthegroupcreatoristheoriginalcontroller,itmaycrashorleavethegroup,inwhichcaseanothermemberneedstoassumethegroupcontrollerrole. (group)member:anyuserwhojoinsagroupisau
53、tomaticallyamemberofthisrole.eachsystemrolecomeswithasetofallowedoper-ationsandhasasetofoperationsthatcanbemore negrainedde ned.forexample,foraclientwiththerolegroupmemberrestrictionsonsendandreceivecanbede nedbasedonthemessagetype. eachgroupmayalsohaveasetofapplication-speci croles,forexample,inthe
54、virtualclassroomsce-nario,thefollowingapplicationrolesmaybeneeded:instructor,ta,student,auditor. onceauserjoinsagroup,theusermayalsoperformthefollowingoperationsrelatedtoroles:1.assumearole.2.droparole. in this paper we analyze the requirements access control mechanisms must fulfill in the context o
55、f group communication and define a framework for supporting fine-grained access control in client-server group communication systems. our framework combines ro 3.appointanotherusertoarole.4.removeanotheruserfromarole. weallowaclienttodroparoleatitswill;however,theotherthreeoperationsaresubjectedtoac
56、cesscon-trol. theaccesscontrolpolicyofthegroupde nestheoperationseachroleisallowedtocarryout.inotherwords,agroupaccesscontrolpolicymapseachroletoasetofoperations.atanytime,auserinagroupplaysasetofroles.whenauserisabouttoperformanaction,therolesthattheuserisplayingareusedtodeterminewhethertheactionsh
57、ouldbeauthorizedornot.therolesandpermissionsthattheapplicationde nesaremappedtosystemrolesandoperationsagcsisawareofandcanenforce. 3.4 amodelforaccesscontrolpoliciesingcs clientsmustbeauthenticatedbeforeanaccesscon-trolpolicyisenforced.severalauthenticationmech-anismsarecommonlyused.agcsmayprovideau
58、sername/passwordbasedauthenticationmechanismormayuseanexternalauthenticationsystemsuchaskerberos14,18.theclientmayconnectwiththeserverthroughtls/ssl1withclientauthenti-cation,inwhichcasetheclientspublickeyandx.50922distinguishednameareavailable.anothersolu-tionishavingtheclienttousecerti catesthatdocu-mentattributesoftheclients,e.g.,certi catesintrustmanagementsystemssuchasrt. thesetofoperationsaclientisallowedtocarryoutmaydependonmorethanjusttherolesoftheclient;environmentalfactorsmayalsohaveane ect.forexample,astudentmaybeallowedtoattendalectureifhe/sheisregisteredf
溫馨提示
- 1. 本站所有資源如無特殊說明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請下載最新的WinRAR軟件解壓。
- 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請聯(lián)系上傳者。文件的所有權(quán)益歸上傳用戶所有。
- 3. 本站RAR壓縮包中若帶圖紙,網(wǎng)頁內(nèi)容里面會有圖紙預(yù)覽,若沒有圖紙預(yù)覽就沒有圖紙。
- 4. 未經(jīng)權(quán)益所有人同意不得將文件中的內(nèi)容挪作商業(yè)或盈利用途。
- 5. 人人文庫網(wǎng)僅提供信息存儲空間,僅對用戶上傳內(nèi)容的表現(xiàn)方式做保護(hù)處理,對用戶上傳分享的文檔內(nèi)容本身不做任何修改或編輯,并不能對任何下載內(nèi)容負(fù)責(zé)。
- 6. 下載文件中如有侵權(quán)或不適當(dāng)內(nèi)容,請與我們聯(lián)系,我們立即糾正。
- 7. 本站不保證下載資源的準(zhǔn)確性、安全性和完整性, 同時(shí)也不承擔(dān)用戶因使用這些下載資源對自己和他人造成任何形式的傷害或損失。
最新文檔
- 高一化學(xué)本章測評:專題有機(jī)化合物的獲得與應(yīng)用
- 2024.0927推文-Elisa文獻(xiàn)解讀
- 餐飲場所使用瓶裝液化氣燃?xì)獾陌踩珯z查事項(xiàng)
- 2024高中地理第五章交通運(yùn)輸布局及其影響第二節(jié)交通運(yùn)輸方式和布局變化的影響課時(shí)演練含解析新人教版必修2
- 2024高中生物專題3胚胎工程3胚胎工程的應(yīng)用及前景達(dá)標(biāo)訓(xùn)練含解析新人教版選修3
- 2024高中語文第三單元因聲求氣吟詠詩韻閣夜訓(xùn)練含解析新人教版選修中國古代詩歌散文欣賞
- 2024高考地理一輪復(fù)習(xí)第十章區(qū)域可持續(xù)發(fā)展第32講濕地資源的開發(fā)與保護(hù)-以洞庭湖區(qū)為例教案湘教版
- 護(hù)士長2023年工作總結(jié)和2024年工作計(jì)劃課件
- 應(yīng)急保障措施
- 四年級語文上冊第七單元第22課為中華之崛起而讀書習(xí)題課件2新人教版
- GB/T 3478.1-1995圓柱直齒漸開線花鍵模數(shù)基本齒廓公差
- GB/T 20174-2006石油天然氣工業(yè)鉆井和采油設(shè)備鉆通設(shè)備
- GB 6000-1999主要造林樹種苗木質(zhì)量分級
- 2023年彌渡縣廣播電視臺(融媒體中心)招聘筆試題庫及答案解析
- GB 18613-2020電動機(jī)能效限定值及能效等級
- 體能訓(xùn)練講解健身課件
- 農(nóng)業(yè)昆蟲學(xué)實(shí)驗(yàn)5蔬菜害蟲課件
- 地震工程學(xué)-反應(yīng)譜和地震時(shí)程波的相互轉(zhuǎn)化matlab編程
- 大學(xué)研究生赴境內(nèi)外高校學(xué)習(xí)課程學(xué)分認(rèn)定管理辦法
- 非標(biāo)設(shè)計(jì)最強(qiáng)自動計(jì)算-壓入力計(jì)算
- 建筑工程施工現(xiàn)場視頻監(jiān)控布置實(shí)施方案
評論
0/150
提交評論