版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领
文档简介
1、a framework for role-based access control in group communica in this paper we analyze the requirements access control mechanisms must fulfill in the context of group communication and define a framework for supporting fine-grained access control in client-server group communication systems. our fram
2、ework combines ro aframeworkforrole-basedaccesscontrolingroup communicationsystems cristinanita-rotaruandninghuilidepartmentofcomputersciences purdueuniversitywestlafayette,in47907 abstract inthispaperweanalyzetherequirementsaccesscontrolmechanismsmustful llinthecontextofgroupcommunicationandde neaf
3、rameworkforsupporting ne-grainedaccesscontrolinclient-servergroupcom-municationsystems.ourframeworkcombinesrole-basedaccesscontrolmechanismswithenvironmentpa-rameters(time,ipaddress,etc.)toprovidesupportforawiderangeofapplicationswithverydi erentre-quirements.whiletheaccesscontrolpolicyisde nedbythe
4、application,itse cientenforcementisprovidedbythegroupcommunicationsystem. 1introduction manycollaborativeapplicationssuchasphoneandvideoconferencing,white-boards,distance-learningapplications,games,sharedinstrumentcontrol,aswellascommand-and-controlsystems,haveincommontheneedforacommunicationinfrast
5、ructurethatpro-videse cientmessagedisseminationtomultiplepar-ties(oftenorganizedingroupsbasedonacommonin-terest),e cientsynchronizationmechanismsthatal-lowforcoordinationandlast,butnotleast,securityservices.groupcommunicationsystems(gcs)pro-videsuchservices.examplesofgroupcommunica-tionsystemsinclud
6、e:isis9,horus21,transis4,totem6,rmp28,rampart20,securering13,ensemble24andspread8,3. animportantaspectforsecurecollaborativegroupsisde ningandenforcingasecuritypolicy.asetofdef-initionsandrequirementsofsecuritypoliciesingroupsispresentedin12.theminimalsetofsecurityser-vicesthatshouldbeprovidedbyanys
7、ecuregcsandshouldbespeci edinagrouppolicyinclude:clientau-thentication,accesscontrol,groupkeymanagement,dataintegrityandcon dentiality. whileconsiderableresearchhasbeenconductedto designscalableandfault-tolerantgroupkeymanage-mentprotocols29,23,5,andtoprovidedatacon -dentialityandintegrity17,2,25,7f
8、orgroups,lessworkfocusedontheaccesscontrolservices.whengcsareusedasacommonplatformbyseveralap-plicationswithdi erentsecurityrequirements,thereisanobviousneedtocontrolwhocanjoinagroup,whocansend/receivemessages,etc.majorchallengeswhenprovidingaccesscontrolservicestogcsarerec-onciling exibilitywithsca
9、lability,ande cientlyen-forcingaccesscontrolinthecontextofdynamicanddistributedgroupswhilesupportingprocessfailuresandnetworkpartitions. mostexistingworkinprovidingaccesscontrolforgroupsemploystraditionalaccesscontrolschemessuchasaccesscontrollists(acls).suchschemesmakeauthorizationdecisionsbasedont
10、heidentityoftherequester.however,indecentralizedormulti-centricenvironments,theresourceownerandtherequesterareoftenunknowntooneanother,makingaccesscon-trolbasedonidentityine ectiveorveryexpensivetomaintain. weadoptanapproachinwhichtheoperationsaclientisallowedtoperformdependsontheroletheclientisplay
11、inginthegroup,andauthenticatedat-tributesoftheclientareusedtodeterminewhichrolestheclientcanplayinagroup.wefocusonagcsus-ingaclient-serverarchitecturewherethedistributedprotocolsarerunbetweenasetofserversprovidingservicestonumerousclients.morespeci cally,ourcontributionsare: weinvestigatetherequirem
12、entsforaccesscontrolmechanismsingcsandshowwhyidentity-basedschemesdonotprovideenough exibilitytosup-portalargeclassofcollaborativeapplications. wedesigna ne-grainedaccesscontrolframeworkforgcs,basedonideasinrole-basedaccesscontrol26,10andrt15,arole-basedtrust-managementlanguage.ourframeworkallowsan
13、in this paper we analyze the requirements access control mechanisms must fulfill in the context of group communication and define a framework for supporting fine-grained access control in client-server group communication systems. our framework combines ro applicationtode neitsspeci cpolicieswhileth
14、eenforcementisperformedinane cientmannerbythegcs.thisisachievedbyde ningasetofbasicgroupoperationsandrolesthatcanbecon-trolledandenforcedbythegcs.anyapplicationspeci cpolicycanbedecomposedintotheseba-sicoperationsandapplicationspeci crolescanbemappedtosystemroles. weanalyzewhataretheimplicationsofpr
15、ocess(serversandclients)failuresandnetworkconnec-tivitychangesonthelifecycleofagrouppol-icyingeneral,andofanaccesscontrolpolicyinparticular,andsuggesthowtheseissuescanbeaddressed.roadmapwediscussthefailureandtrustmodelsweuseinsection2.insection3wepresentindetailsthecomponentsforagrouppolicy,whileins
16、ection4wediscussthee ectsofprocessfailuresandnetworkpartitionsonthelifecycleofthepolicy.weoverviewrelatedworkinsection5.finally,wesummarizeourworkandsuggestfutureworkdirectionsinsection6. 2trustandfailuremodels inthissection,wediscussthetrustandfailuremod-elsweareusinginthispaper. 2.1trustmodel incl
17、ient-servergcs,atrustmodelhastode nethetrustrelationshipswithineachlayer(trustrelationshipbetweenclientsandtrustrelationshipbetweenservers)aswellasbetweenlayers(i.e.doclientstrustserversornot).giventhisenvironment,severaltrustmodelsarepossible,rangingfromamodelwherenoentitytrustsanyotherentityforany
18、operation,bothwithinalayerandbetweenlayers,toanoptimisticmodelwhereserversandclientstrusteachothercompletely.inthispaper,weadoptthefollowingtrustmodel: serverstrusteachother:inorderforthesystemtobebootstrappedcorrectly,alistoflegitimateserversshouldbeprovidedtoallservers,intheformofanacl.settingupth
19、islistisasystemadministratorstaskandnotanapplicationtask.weassumethatthereisawaytoauthenticateaserverwhenitcomesupandverifywhetheritisontheauthorizedcon gurationlist.onceauthenti-catedandauthorizedallserverstrusteachother.wenotethatingeneralthenumberofserversissmallandthatthewaythesesystemsareusedis
20、 rstde neaserverscon gurationthatprovidesbestperformanceforaspeci cnetworkenviron-mentandapplicationdeployment.therefore,inthiscase,anaclisanacceptablesolution. clientstrustserverstoenforcetheaccesscontrolpolicy.thisassumptionisacceptablebecause,intheclient-servergcsarchitecture,clientsal-readytrust
21、theserverstomaintaingroupmem-bershipandtotransport,orderanddelivergroupmessages,soitseemsnaturaltotrustthemalsoforenforcingtheaccesscontrolpolicy.further-more,thiswillallowforamoree cientenforce-mentsinceinnumerouscasesthedecisioncanbemadebyeachserverlocally,diminishingthecom-municationoverhead. cli
22、entsarenottrusted(eitherbytheotherclientsorbyservers).therefore,compromisingoneclientdoesnotcompromisethesecurityofthewholesystem. 2.2failuremodel ourmodelconsidersadistributedsystemthatiscomposedofagroupofserversexecutingonseveralcomputersandcoordinatingtheiractionsbyexchang-ingmessages.themessagee
23、xchangeisconductedviaasynchronousmulticastandunicast.messagescanbelostorcorrupted.weassumethatmessagecorrup-tionismaskedbyalowerlayer.aclientobtainsthegroupcommunicationservicesbyconnectingtooneoftheservers.aclientcanconnectlocallyorremotely.bothclientsandserversmayfail.whenaserverfails,alltheclient
24、sthatareconnectedtothatserverwillstopreceivinggroupcommunicationservices;theyarenotredirectedtootherservers. duetonetworkevents(e.g.,congestionoroutrightfailures)thenetworkcanbesplitintodisconnectedsubnetworkfragments.atthegroupcommunicationlayer,thisisreferredtoasapartition.anetworkpar-titionsplits
25、theserversandcanpotentiallysplitsev-eralclientgroupsindi erentcomponents.whilepro-cesses(serversorclients)areinseparatedisconnectedcomponentstheycannotexchangemessages.whenanetworkpartitionisrepaired,thedisconnectedcompo-nentsmergeintoalargerconnectedcomponent,thisisreferredatthegroupcommunicationla
26、yerasamerge.firstserversaremerged,whichinturncantriggerseveralclientgroupstobemerged. byzantine(arbitrary)processfailuresarenotcon-sideredinthiswork. in this paper we analyze the requirements access control mechanisms must fulfill in the context of group communication and define a framework for supp
27、orting fine-grained access control in client-server group communication systems. our framework combines ro 3 apolicymodelforaccesscontrolingroupcommunicationsystems inthissection,westudytherequirementsforspec-ifyingaccesscontrolpoliciesingcsandproposeapolicymodelfordoingso.ourgoalistodesignapol-icym
28、odelthatis exibleenoughsuchthatitsupportsadiversi edsetofapplicationpolicies,inaddition,thepolicymodelcanbee cientlyimplementedbythegcs.thebasicapproachweuseisasfollows.foranygroupthereisasetofbasicoperationsthatcanbeper-formedbyprincipals(entities)basedontheirrole,inagivencontext.themappingbetweeng
29、roupoperationsandroles,inagivencontext,de nestheaccesscon-trolpolicyforthatgroup.thisway,insteadofhavingeveryindividualapplicationtoimplementandenforceitsownaccesscontrolmechanisms,wehaveapplica-tionsde ningspeci cpoliciesthataretranslatedtothesetofbasicoperationsthatthegcsisawareofandcanenforceacce
30、sscontrolon. therestofthissectionisorganizedasfollows.webeginbydescribinganexamplescenarioanddis-cussingthevariouspossibleaccesscontrolpoliciesinsection3.1.insection3.2,wedescribethegroupop-erationsthataresubjectedtoaccesscontrol.wean-alyzetheuseofrolesingrouppoliciesinsection3.3.wepresentthepolicym
31、odelinsection3.4.insec-tion3.5wedescribehowapolicyspeci edinthemodelisenforced.wediscussthechallengesinmaintainingthepolicy,whiledealingwithdynamicmembership,failuresandnetworkpartitionsinsection4. 3.1anexamplescenario consideravirtual-classroomapplicationimple-mentedusingagcs.multiplecoursesexistin
32、theapplication.eachcoursehasmultiplesessions,eachofwhichisrepresentedbyavirtualclassroom,im-plementedasagroup.foreachcourse,therearein-structors(somecoursesmayhavemorethanonein-structors),tas,andstudents.aclassroomshouldbecreatedonlybyanauthorizeduser;thusapolicycon-trollingthecreationofgroupsmustex
33、istbeforethecreationofagroup.wecallsuchapolicy,atemplatepolicy.eachcoursehasatemplatepolicy.sincetem-platepoliciesexistoutsidethecontextofanygroupandcanbeviewedasresourcesnotspeci ctogcs,standardaccesscontroltechniquesareusedtocontrolthecreationandmodi cationoftemplatepolicies.inthesimplestcase,only
34、thegcsadministratorisal-lowedtocreateormodifytemplatepolicies. atemplatepolicydetermines,amongotherthings,whocancreateagroupbasedonthepolicy.onepos- siblegroupcreationruleisthatonlytheinstructorsofacourseareallowedtocreateaclassroomforthecourse.analternativeruleisthatatamayalsocreateaclassroom.onema
35、yalsoallowthecourseinstructortodelegatetoanotheruser,e.g.,aguestlecturer,theauthoritytocreateaclassroom. aftertheclassroom/groupiscreated,agrouppolicyneedstobecreated.agrouppolicycanbecreatedbycopyingthetemplatepolicy.thisgrouppolicymaythenbetailoredtosuittheneedofthecurrentclass-roomsession.onlyaut
36、horizedusersshouldbeallowedtochangethegrouppolicy. varioususersmayjointheclassroomindi erentroles,e.g.,instructor,ta,student.onlyauthorizedusersshouldbeallowedtojointheseroles.forjoiningasastudent,di erentrulesaredesirablefordi erentcases.examplesincludes:onlystudentswhoareen-rolledintheclassmayjoin
37、,theinstructororthetascanadmitadditionalstudentsinspecialcases,oronlystudentswhoareconnectingfromcertainipaddressesmayjoin(e.g.,whentakinganexam). severalkindsofcommunicationmaybegoingonsimultaneouslyintheclassroom,andtheyshouldbesubjectedtodi erentaccesscontrolrules.forexam-ple,communicationcanbepu
38、blic:lecturesdeliveredbytheinstructor,publicquestionsaskedbyastudentandtheanswerstothosequestionsbytheinstructororanothermemberoftheclassroom.someclassroomsmayallowanystudenttofreelyaskquestions,muni-cationcanalsobeprivate,forexamplestudentsmaybeallowedtoaskquestionsprivatelytothetas,orsubmittheiran
39、swerstoaquizgiveninclass.thein-structormaybealsoallowedtoejectastudentfromtheclassroom. wenotethatmostoftheaboveservicesarepro-videdbyagcs,withoutanyaccesscontrolenforce-ment.forexample,thespread8groupcommuni-cationsystemallowsformulticast(public)anduni-cast(private)communicationwithinagroup,italsoa
40、llowsforanymembertobebothasenderandare-ceiverandcandistinguishbetweendi erenttypeofmessages,whileprovidingdi erentreliabilityandor-deringcommunicationservices.inaddition,con den-tialityandintegrityofthedataisprovided. 3.2operationsingroups fromtheabovescenariodescription,wecanextractthesensitiveoper
41、ationsthatneedaccesscontrol.thefollowingoperationsarenotperformedwithinthecon-textofagroup,theyprecedethegroupcreationand in this paper we analyze the requirements access control mechanisms must fulfill in the context of group communication and define a framework for supporting fine-grained access c
42、ontrol in client-server group communication systems. our framework combines ro arenotsubjectedtoagrouppolicyoratemplatepol-icy:1)createagrouptemplatepolicyand2)modifyagrouptemplatepolicy. acomprehensivelistofbasicoperationthatapplytoagroupandaretheobjectofaccesscontrolispre-sentedbelow:1.createagrou
43、p. 2.modifyagrouppolicy.3.joinagroup. 4.sendamessageofagiventype.5.receiveamessageofagiventype.6.ejectauserfromagroup.7. destroyagroup. theabovelistdoesnotincludetheoperationofleavingagroupbecausethisisanoperationthatcannotbecontrolled.itisimpossibletopreventaclientfromleavingagroup1. weallowseparat
44、econtrolforjoiningagroup,send-ingamessage,andreceivingamessagetoprovidesupportforawiderangeofapplications.forsomeapplicationsseveralgroupmembersmaybeallowedtosend,butnottoreceivemessages.anexampleofsuchanapplicationisainformationreportingmilitaryapplicationwhereclientsusewirelesscommunication;itisde
45、sirabletolimittheinformationclientsreceiveandstoretominimizethedamagecausedincaseofcompromise.forotherapplications,somegroupmem-bersmaybeallowedtoreceivebutnottosendmes-sages.forexample,inaconferencewithalargenum-berofparticipantsonlyrepresentativesmayanswerquestions,whiletherestoftheparticipantsare
46、justlistening. 3.3rolesingroups oneapproachtospecifyandenforceaccesscontrolistouseaccesscontrollists(acls).underthisap-proach,agrouphasanacl,whichincludesasetofusersandtheoperationstheyareallowedtocarryout.suchanapproachisappropriatewhenthenumberofprincipalsandoperationsissmallandstatic.ingen-eral,a
47、clshavethefollowingdisadvantages.first,aclscangetverylarge.forexample,ifeveryregis-teredstudentinauniversityisallowedtojoinaclass-room,thentheaclwouldbesimplytoolong.sec-ond,theacloftenduplicatesinformationmaintainedinotherplacesanditsuseinadynamicdistributedsystemwillrequiremaintainingitsconsistenc
48、yacross 1any clientcane ectivelyleaveagroupbyclosingthecon-nectionwiththeserver. severalsiteswhichcanbeverydi cultandpronetointroduceinconsistencyinthesystem. fromthescenariodescribedinsection3.1,itisclearthatthesetofoperationsauserisallowedtocarryoutdependsupontherolethattheuserisplay-inginagroup.f
49、orexample,althoughausermaybetheinstructorofacourse,inaguestlecturesessionshemaybeplayingataorastudentrole. wedistinguishbetweentwokindsofroles:systemrolesandapplicationroles.systemrolesareprede- nedbythegcs;theyexistineverygroupandhaveprede nedmeaningsintermsofoperationstheyareallowedtocarryout.thef
50、ollowingaresystemrolesourframeworksupports: (group)creator:thisrolehasatmostonemem-ber,identifyingtheuserthatistheoriginalcre-atorofthegroup,i.e.,the rstmemberofthegroup.becauseoffailures,agroupscreatorrolemaybeempty. (group)controller:thisrolehasexactlyonemem-ber,whohasfullcontroloveragroup,includi
51、ngchangingthepolicyforthegroupanddestroy-ingagroup.whenausercreatesagroup,itisautomaticallymadethecreatorandthecon-trollerofthegroup.wedi erentiatethegroupcreatorfromthegroupcontrollerforseveralrea-sons.first,thecreatorofagroupmaywanttotransferthecontrollerresponsibilitiestoanothermemberofthegroup;f
52、orexample,atamaycre-ateaclassroombeforetheinstructorcomesandthen,aftertheinstructorjoins,transfertheroletotheinstructor.second,evenwhenthegroupcreatoristheoriginalcontroller,itmaycrashorleavethegroup,inwhichcaseanothermemberneedstoassumethegroupcontrollerrole. (group)member:anyuserwhojoinsagroupisau
53、tomaticallyamemberofthisrole.eachsystemrolecomeswithasetofallowedoper-ationsandhasasetofoperationsthatcanbemore negrainedde ned.forexample,foraclientwiththerolegroupmemberrestrictionsonsendandreceivecanbede nedbasedonthemessagetype. eachgroupmayalsohaveasetofapplication-speci croles,forexample,inthe
54、virtualclassroomsce-nario,thefollowingapplicationrolesmaybeneeded:instructor,ta,student,auditor. onceauserjoinsagroup,theusermayalsoperformthefollowingoperationsrelatedtoroles:1.assumearole.2.droparole. in this paper we analyze the requirements access control mechanisms must fulfill in the context o
55、f group communication and define a framework for supporting fine-grained access control in client-server group communication systems. our framework combines ro 3.appointanotherusertoarole.4.removeanotheruserfromarole. weallowaclienttodroparoleatitswill;however,theotherthreeoperationsaresubjectedtoac
56、cesscon-trol. theaccesscontrolpolicyofthegroupde nestheoperationseachroleisallowedtocarryout.inotherwords,agroupaccesscontrolpolicymapseachroletoasetofoperations.atanytime,auserinagroupplaysasetofroles.whenauserisabouttoperformanaction,therolesthattheuserisplayingareusedtodeterminewhethertheactionsh
57、ouldbeauthorizedornot.therolesandpermissionsthattheapplicationde nesaremappedtosystemrolesandoperationsagcsisawareofandcanenforce. 3.4 amodelforaccesscontrolpoliciesingcs clientsmustbeauthenticatedbeforeanaccesscon-trolpolicyisenforced.severalauthenticationmech-anismsarecommonlyused.agcsmayprovideau
58、sername/passwordbasedauthenticationmechanismormayuseanexternalauthenticationsystemsuchaskerberos14,18.theclientmayconnectwiththeserverthroughtls/ssl1withclientauthenti-cation,inwhichcasetheclientspublickeyandx.50922distinguishednameareavailable.anothersolu-tionishavingtheclienttousecerti catesthatdocu-mentattributesoftheclients,e.g.,certi catesintrustmanagementsystemssuchasrt. thesetofoperationsaclientisallowedtocarryoutmaydependonmorethanjusttherolesoftheclient;environmentalfactorsmayalsohaveane ect.forexample,astudentmaybeallowedtoattendalectureifhe/sheisregisteredf
温馨提示
- 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
- 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
- 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
- 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
- 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
- 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
- 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。
最新文档
- 高一化学本章测评:专题有机化合物的获得与应用
- 2024.0927推文-Elisa文献解读
- 餐饮场所使用瓶装液化气燃气的安全检查事项
- 2024高中地理第五章交通运输布局及其影响第二节交通运输方式和布局变化的影响课时演练含解析新人教版必修2
- 2024高中生物专题3胚胎工程3胚胎工程的应用及前景达标训练含解析新人教版选修3
- 2024高中语文第三单元因声求气吟咏诗韵阁夜训练含解析新人教版选修中国古代诗歌散文欣赏
- 2024高考地理一轮复习第十章区域可持续发展第32讲湿地资源的开发与保护-以洞庭湖区为例教案湘教版
- 护士长2023年工作总结和2024年工作计划课件
- 应急保障措施
- 四年级语文上册第七单元第22课为中华之崛起而读书习题课件2新人教版
- GB/T 3478.1-1995圆柱直齿渐开线花键模数基本齿廓公差
- GB/T 20174-2006石油天然气工业钻井和采油设备钻通设备
- GB 6000-1999主要造林树种苗木质量分级
- 2023年弥渡县广播电视台(融媒体中心)招聘笔试题库及答案解析
- GB 18613-2020电动机能效限定值及能效等级
- 体能训练讲解健身课件
- 农业昆虫学实验5蔬菜害虫课件
- 地震工程学-反应谱和地震时程波的相互转化matlab编程
- 大学研究生赴境内外高校学习课程学分认定管理办法
- 非标设计最强自动计算-压入力计算
- 建筑工程施工现场视频监控布置实施方案
评论
0/150
提交评论