Top Banner
Extensible Access Control Framework for Cloud Applications KTH-SEECS Applied Information Security Lab SEECS NUST Implementation Perspective
28

Extensible Access Control Framework for Cloud Applications KTH-SEECS Applied Information Security Lab SEECS NUST Implementation Perspective.

Jan 05, 2016

Download

Documents

Hollie Sullivan
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Extensible Access Control Framework for Cloud Applications KTH-SEECS Applied Information Security Lab SEECS NUST Implementation Perspective.

Extensible Access Control Framework for Cloud Applications

KTH-SEECS

Applied Information Security Lab SEECS NUST

Implementation Perspective

Page 2: Extensible Access Control Framework for Cloud Applications KTH-SEECS Applied Information Security Lab SEECS NUST Implementation Perspective.

Agenda• Motivation • Background

– XACML– Access control models

• Our Contribution– Research Perspective– Implementation Perspective

• Work in Progress– Implementation Demo

• Q & A Session

Page 3: Extensible Access Control Framework for Cloud Applications KTH-SEECS Applied Information Security Lab SEECS NUST Implementation Perspective.

Motivation

SECaaS

Email Security aaS

Access control aaS

Cloud Service Consumers

Identity aaS

Network Security aaS

Encryption aaS Data protection aaS

Page 4: Extensible Access Control Framework for Cloud Applications KTH-SEECS Applied Information Security Lab SEECS NUST Implementation Perspective.

Extensible Access Control Framework for Cloud Applications

Framework: Essential

supporting structure of a

systemAccess Control:

Restrict the illegal access

from resources under

consideration

Extensible: Ability to extend

the system through addition

of new functionality

Page 5: Extensible Access Control Framework for Cloud Applications KTH-SEECS Applied Information Security Lab SEECS NUST Implementation Perspective.

What we are providing ??

Access

Control

Framework

Extensible

Page 6: Extensible Access Control Framework for Cloud Applications KTH-SEECS Applied Information Security Lab SEECS NUST Implementation Perspective.

Access Control Models

Page 7: Extensible Access Control Framework for Cloud Applications KTH-SEECS Applied Information Security Lab SEECS NUST Implementation Perspective.

Holistic solution for deployment of these models??

Any Standard set for

implementation ??

Page 8: Extensible Access Control Framework for Cloud Applications KTH-SEECS Applied Information Security Lab SEECS NUST Implementation Perspective.

What we need ??

Page 9: Extensible Access Control Framework for Cloud Applications KTH-SEECS Applied Information Security Lab SEECS NUST Implementation Perspective.
Page 10: Extensible Access Control Framework for Cloud Applications KTH-SEECS Applied Information Security Lab SEECS NUST Implementation Perspective.

XACML

XACML stands for eXtensible Access Control Markup

Language

Standard which is ratified by standards organization

Page 11: Extensible Access Control Framework for Cloud Applications KTH-SEECS Applied Information Security Lab SEECS NUST Implementation Perspective.

Existing Solutions

Enhancements in XACML 3.0

ABAC Implementation (Proprietary)

Picket-Link XACML Implementation(Open-source)

XACML PEP in JAVA

XACML Implementation (Open-source)

Extensible Access Control Framework for

Cloud Applications

Our Solution

Page 12: Extensible Access Control Framework for Cloud Applications KTH-SEECS Applied Information Security Lab SEECS NUST Implementation Perspective.

Why we need 3 ACMs ??

Identities Roles Resources

Page 13: Extensible Access Control Framework for Cloud Applications KTH-SEECS Applied Information Security Lab SEECS NUST Implementation Perspective.

RBAC Issues

Challenges appears when extended across the domain

Doesn’t consider environment attributes

Not well suited for a highly distributed

environment

Adding, deleting the duties of a role involved updating too many policy stores.

Page 14: Extensible Access Control Framework for Cloud Applications KTH-SEECS Applied Information Security Lab SEECS NUST Implementation Perspective.

Attribute based Access Control (ABAC)

ProfessorSoftware Teaches (CSP 401)Office (238)Head (SEC lab)

Page 15: Extensible Access Control Framework for Cloud Applications KTH-SEECS Applied Information Security Lab SEECS NUST Implementation Perspective.

Fine Grained Access Control (FGAC)

Page 16: Extensible Access Control Framework for Cloud Applications KTH-SEECS Applied Information Security Lab SEECS NUST Implementation Perspective.

Usage based Access Control (UCON)

PreUsage Decisions

PostUsage Decisions

On-Going Usage Decisions

Page 17: Extensible Access Control Framework for Cloud Applications KTH-SEECS Applied Information Security Lab SEECS NUST Implementation Perspective.
Page 18: Extensible Access Control Framework for Cloud Applications KTH-SEECS Applied Information Security Lab SEECS NUST Implementation Perspective.

Research Contribution

Page 19: Extensible Access Control Framework for Cloud Applications KTH-SEECS Applied Information Security Lab SEECS NUST Implementation Perspective.

XACML Profile

• The standard set of OASIS eXtensible Access Control Markup Language (XACML) specifications for implementation of an [xyz] access control is known as the XACML profile for xyz access control.

Page 20: Extensible Access Control Framework for Cloud Applications KTH-SEECS Applied Information Security Lab SEECS NUST Implementation Perspective.

Development Perspective

Page 21: Extensible Access Control Framework for Cloud Applications KTH-SEECS Applied Information Security Lab SEECS NUST Implementation Perspective.

Architecture & Workflow

PDPaaS

Policy Repository

PEPaaS

Resources

3rd Party Resources

Application User

1. Authentication 2a. Access Application

Resource

2b. Redirect to PEPaaS

3. Forward XACML Request

6. Return XACML Request to PEPaaS

5.Evaluate

4a. Find Policy4b. Applicable Policy

6. Access Granted

Register User

Exchange Meta-data

Resources

System Administrator

b) After authenticationredirect browser to PAPaaS

a) Authenticate Admin

Attribute Repository

PAPaaS

c) Store d) Retrieve

Policy Repository

e) Store XACML

Policies

Page 22: Extensible Access Control Framework for Cloud Applications KTH-SEECS Applied Information Security Lab SEECS NUST Implementation Perspective.

System Administrator

Register User

Exchange Meta-data

b) After authen

Redirect browser to PAPaaSa)Authenticate Admin

PDPaaS

Policy Repository

PEPaaS

Resources

3rd Party Resources

Application User

1. Authentication

2a. Access Application Resource

2b. Redirect to PEPaaS

3. Forward XACML Request

6. Return XACML Request to

5.

Evaluate

4a. Find Policy4b. Applicable Policy

Attribute Repository

PAPaaS

c) Store d) Retrieve

6. Access Granted

Workflow

Page 23: Extensible Access Control Framework for Cloud Applications KTH-SEECS Applied Information Security Lab SEECS NUST Implementation Perspective.

PAP Components1. Subject2. Resource3. Action4. Environment

1. XACML Policy Generation2. XACML PolicySet Generation

1. Condition2. Target3. Rule4. Obligation5. Policy6. Policy Set

Page 24: Extensible Access Control Framework for Cloud Applications KTH-SEECS Applied Information Security Lab SEECS NUST Implementation Perspective.

Technologies

Page 25: Extensible Access Control Framework for Cloud Applications KTH-SEECS Applied Information Security Lab SEECS NUST Implementation Perspective.

MVC based Architecture

Page 26: Extensible Access Control Framework for Cloud Applications KTH-SEECS Applied Information Security Lab SEECS NUST Implementation Perspective.

Implementation Demo

Page 27: Extensible Access Control Framework for Cloud Applications KTH-SEECS Applied Information Security Lab SEECS NUST Implementation Perspective.

Conclusion

• Deliverables for this Quarter– Version 1.0* will be uploaded on sourcefourge.net.– Report 3: “Unit Testing of ABAC model”.– Initialization of Cloud Instances in AIS lab.

Page 28: Extensible Access Control Framework for Cloud Applications KTH-SEECS Applied Information Security Lab SEECS NUST Implementation Perspective.

Q & A