Architectural Design for a Secure Linux Operating System

被引:0
|
作者
Narayanan, Hari [1 ]
Radhakrishnan, Vivek [1 ]
Shiju-Sathyadevan [1 ]
Poroor, Jayaraj [2 ]
机构
[1] Amrita Univ, Amrita Ctr Cybersecur Syst & Networks, Amrita Sch Engn, Amrita Vishwa Vidyapeetham, Amritapuri, India
[2] EnergiMate, Gandhinagar, Gujarat, India
关键词
Linux; authorization; principle of least privilege; security ticket; sandbox;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Operating system security is a hot research area for the past several decades. Various security mechanisms have been introduced till now to secure the operating system. In this paper we are focusing on securing Linux operating system. Even though Linux is open source and large numbers of people are involved in developing kernel patches for security holes, there are still many malwares to exploit the existing vulnerabilities. Using our architecture we are trying to minimize the damage done by the malwares if not blocking them altogether. Our architecture is designed to ensure the principle of least privilege. Principle of least privilege guarantees that a process will get the privileges just enough to perform its task. This ensures that even if the process is compromised it can do the least damage to the system as it is running in a sandbox. Major chunk of our system is running in the user level to make it portable across the distributions. Our system uses a specially structured security ticket to provide fine grained authorization to user processes which is not currently possible in the traditional linux architecture. The security ticket is designed in such a way that it can be inherited by a child process, can be shared and is unforgeable. The core module in the system is called Secd (Secure Daemon) which authorizes all the requests and also manages the security tickets.
引用
收藏
页码:949 / 953
页数:5
相关论文
共 50 条
  • [1] Secure hybrid operating system "Linux over Fenix"
    Zegzhda, DP
    Vovk, AM
    COMPUTER NETWORK SECURITY, PROCEEDINGS, 2005, 3685 : 272 - 285
  • [2] Design of secure operating system
    Mao, Weifeng
    Ping, Lingdi
    Jiang, Li
    Chen, Xiaoping
    Jisuanji Gongcheng/Computer Engineering, 2006, 32 (12): : 179 - 181
  • [3] Design and implementation of secure auditing system in Linux kernel
    Zhao, Kuo
    Li, Qiang
    Kang, Jian
    Jiang, Dapeng
    Hu, Liang
    2007 INTERNATIONAL WORKSHOP ON ANTI-COUNTERFEITING, SECURITY, AND IDENTIFICATION, 2007, : 232 - +
  • [4] Enhancing File Data Security in Linux Operating System by Integrating Secure File System
    Pal, Rajesh Kumar
    Sengupta, Indranil
    IEEE SYMPOSIUM ON COMPUTATIONAL INTELLIGENCE IN CYBER SECURITY, 2009, : 45 - +
  • [5] Enhancing File Data Security in Linux Operating System by Integrating Secure File System
    Pal, Rajesh Kumar
    Sengupta, Indranil
    JOURNAL OF INFORMATION ASSURANCE AND SECURITY, 2009, 4 (04): : 484 - 492
  • [6] An Architectural-Enhanced Secure Design in Embedded System
    Wang, Xiang
    Xu, Bin
    Wang, Weike
    Zhang, Zhun
    Zhang, Xiaobing
    Hao, Qiang
    Xia, Tongsheng
    PROCEEDINGS OF 2018 IEEE 9TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING AND SERVICE SCIENCE (ICSESS), 2018, : 100 - 103
  • [7] THE LINUX OPERATING SYSTEM
    BOKHARI, SH
    COMPUTER, 1995, 28 (08) : 74 - 79
  • [8] The Linux Operating System
    S. Balakrishnan
    Resonance, 1999, 4 (4) : 64 - 72
  • [9] Architecture Design of SDN Operating System Based on Linux Kernel
    Xiong, Hongzhou
    Xu, Fangqin
    2020 5TH INTERNATIONAL CONFERENCE ON MECHANICAL, CONTROL AND COMPUTER ENGINEERING (ICMCCE 2020), 2020, : 1024 - 1027
  • [10] Research and design of real-time Linux operating system
    Li, Fangmin
    Li, Renfa
    Ye, Chengqing
    Xiangtan Kuangye Xueyuan Xuebao/Journal of Xiangtan Mining Institute, 2000, 15 (03): : 71 - 75