A Role-Based Model of Linux Privilege Management and its Implementation

被引:0
|
作者
Li, Yanzhao [1 ]
Tu, Bibo [1 ]
Zhu, Min [1 ]
Meng, Dan [1 ]
机构
[1] Chinese Acad Sci, Inst Informat Engn, Beijing, Peoples R China
关键词
Capabilities; Linux; Access Control; Privilege Separation;
D O I
10.1109/CICN.2015.278
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
At present, With the wide application of Linux system, the security performance of Linux system is meeting more and more challenges. This paper analyzes the the security flaw of traditional Linux security mechanism in which the presence of superuser root violates the principle of least privilege in security system design, which brings various kinds of privilege elevation attacks. The current fine-grained solution Capabilities mechanism proposed by POSIX1e divides root superuser into privilege units, but it fails to remove root user from the Linux system. By analyzing the imperfection of current solutions, this paper proposes a novel role-based privilege management model. By distributing capabilities to roles and assigning roles to specific users, this model not only removes superuser root from the Linux system but also builds an privilege-separation system. With implementation in Linux system and experiments, this model proves to be fine-grained and privilege-seprated with no performance loss.
引用
收藏
页码:1442 / 1445
页数:4
相关论文
共 50 条
  • [31] Quantitative analysis and enforcement of the principle of least privilege in role-based access control
    Lai, Chunren
    Zhang, Chang N.
    SECRYPT 2006: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2006, : 69 - +
  • [32] A role-based interactions model for innovation
    Garimella, Kiran
    2007 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN AND CYBERNETICS, VOLS 1-8, 2007, : 2723 - 2727
  • [33] Role-based Workflow Model in SRS
    Zhang, Lin
    Chen, Yan
    Zhang, Jinsong
    2010 2ND INTERNATIONAL CONFERENCE ON COMPUTER AND AUTOMATION ENGINEERING (ICCAE 2010), VOL 1, 2010, : 388 - 392
  • [34] A role-based secure workflow model
    Song, Chunyan
    Xu, Jianliang
    Li, Shenhua
    Wang, Mingqiang
    SIXTH INTERNATIONAL CONFERENCE ON GRID AND COOPERATIVE COMPUTING, PROCEEDINGS, 2007, : 764 - +
  • [35] RESEARCH AND IMPLEMENTATION OF A ROLE-BASED TRUSTWORTHINESS MECHANISM FOR IAAS
    Wu, Xu
    Xie, Xiaqing
    Li, Chunwen
    2012 IEEE 2nd International Conference on Cloud Computing and Intelligent Systems (CCIS) Vols 1-3, 2012, : 313 - 317
  • [36] A role-based infrastructure for the management of dynamic communities
    Schaeffer-Filho, Alberto
    Lupu, Emil
    Sloman, Morris
    Keoh, Sye-Loong
    Lobo, Jorge
    Calo, Seraphin
    RESILIENT NETWORKS AND SERVICES, 2008, 5127 : 1 - +
  • [37] Design and implementation of role-based CIMS security model under B/S environment
    Liu, Xiao-Bao
    Du, Ping-An
    Dianzi Keji Daxue Xuebao/Journal of the University of Electronic Science and Technology of China, 2008, 37 (01): : 109 - 112
  • [38] Rights management for role-based access control
    Bouwman, Bart
    Mauw, Sjouke
    Petkovic, Milan
    2008 5TH IEEE CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE, VOLS 1-3, 2008, : 1085 - +
  • [39] Toward Social Role-Based Interruptibility Management
    Anderson, Christoph
    Heinisch, Judith Simone
    Deldari, Shohreh
    Salim, Flora
    Ohly, Sandra
    David, Klaus
    Pejovic, Veljko
    IEEE PERVASIVE COMPUTING, 2023, 22 (01) : 59 - 68
  • [40] Extended role-based sensor management framework
    Kim, S
    Moon, M
    Yeom, K
    8TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY, VOLS 1-3: TOWARD THE ERA OF UBIQUITOUS NETWORKS AND SOCIETIES, 2006, : U175 - U180