A Role-Based Model of Linux Privilege Management and its Implementation

被引:0
|
作者
Li, Yanzhao [1 ]
Tu, Bibo [1 ]
Zhu, Min [1 ]
Meng, Dan [1 ]
机构
[1] Chinese Acad Sci, Inst Informat Engn, Beijing, Peoples R China
关键词
Capabilities; Linux; Access Control; Privilege Separation;
D O I
10.1109/CICN.2015.278
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
At present, With the wide application of Linux system, the security performance of Linux system is meeting more and more challenges. This paper analyzes the the security flaw of traditional Linux security mechanism in which the presence of superuser root violates the principle of least privilege in security system design, which brings various kinds of privilege elevation attacks. The current fine-grained solution Capabilities mechanism proposed by POSIX1e divides root superuser into privilege units, but it fails to remove root user from the Linux system. By analyzing the imperfection of current solutions, this paper proposes a novel role-based privilege management model. By distributing capabilities to roles and assigning roles to specific users, this model not only removes superuser root from the Linux system but also builds an privilege-separation system. With implementation in Linux system and experiments, this model proves to be fine-grained and privilege-seprated with no performance loss.
引用
收藏
页码:1442 / 1445
页数:4
相关论文
共 50 条
  • [1] Role-based privilege and trust management
    Shin, D
    Ahn, GJ
    COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 2005, 20 (06): : 401 - 410
  • [2] Role-based privilege management using attribute certificates and delegation
    Ahn, GJ
    Shin, D
    Zhang, LH
    TRUST AND PRIVACY IN DIGITAL BUSINESS, PROCEEDINGS, 2004, 3184 : 100 - 109
  • [3] A role-based hierarchical group collaborative awareness model and its implementation
    Zhu, Jun
    Tang, Yong
    PROCEEDINGS OF THE 2007 1ST INTERNATIONAL SYMPOSIUM ON INFORMATION TECHNOLOGIES AND APPLICATIONS IN EDUCATION (ISITAE 2007), 2007, : 12 - 16
  • [4] A role-based infrastructure management system: design and implementation
    Shin, D
    Ahn, GJ
    Cho, S
    Jin, S
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2004, 16 (11): : 1121 - 1141
  • [5] A Cache Considering Role-Based Access Control and Trust in Privilege Management Infrastructure
    ZHANG Shaomin~ 1
    2. School of Computer
    Wuhan University Journal of Natural Sciences, 2006, (06) : 1827 - 1830
  • [6] Research and implementation of role-based RBAC administration model
    Qiu, J
    Ma, CH
    Yin, JW
    Dong, JX
    Fifth International Conference on Computer and Information Technology - Proceedings, 2005, : 746 - 750
  • [7] A role-based coordination model and its realization
    Department of Computer Science, Illinois Institute of Technology, United States
    Inf, 2008, 3 (229-244):
  • [8] Role-based Privilege Isolation: A Novel Authorization Model for Android Smart Devices
    Das, Batsayan
    Maddali, Lakshmipadmaja
    Nallagonda, Harshita Vani
    2015 10TH INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS (ICITST), 2015, : 220 - 225
  • [9] A Role-Based Coordination Model and its Realization
    Chen, Nianen
    Yu, Yue
    Ren, Shangping
    Beckman, Mattox
    INFORMATICA-JOURNAL OF COMPUTING AND INFORMATICS, 2008, 32 (03): : 229 - 244
  • [10] Multiagent design of a role-based model for project management
    Schweyer, B
    INTEGRATED COMPUTER-AIDED ENGINEERING, 1997, 4 (03) : 219 - 234