A Role-Based Model of Linux Privilege Management and its Implementation

被引:0
|
作者
Li, Yanzhao [1 ]
Tu, Bibo [1 ]
Zhu, Min [1 ]
Meng, Dan [1 ]
机构
[1] Chinese Acad Sci, Inst Informat Engn, Beijing, Peoples R China
关键词
Capabilities; Linux; Access Control; Privilege Separation;
D O I
10.1109/CICN.2015.278
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
At present, With the wide application of Linux system, the security performance of Linux system is meeting more and more challenges. This paper analyzes the the security flaw of traditional Linux security mechanism in which the presence of superuser root violates the principle of least privilege in security system design, which brings various kinds of privilege elevation attacks. The current fine-grained solution Capabilities mechanism proposed by POSIX1e divides root superuser into privilege units, but it fails to remove root user from the Linux system. By analyzing the imperfection of current solutions, this paper proposes a novel role-based privilege management model. By distributing capabilities to roles and assigning roles to specific users, this model not only removes superuser root from the Linux system but also builds an privilege-separation system. With implementation in Linux system and experiments, this model proves to be fine-grained and privilege-seprated with no performance loss.
引用
收藏
页码:1442 / 1445
页数:4
相关论文
共 50 条
  • [41] The Semantics of Role-Based Trust Management Languages
    Felkner, Anna
    Sacha, Krzysztof
    ADVANCES IN SOFTWARE ENGINEERING TECHNIQUES, 2012, 7054 : 179 - 189
  • [42] The application research of role-based access control model in workflow management system
    Wang, BY
    Zhang, SM
    Xia, XD
    GRID AND COOPERATIVE COMPUTING, PT 2, 2004, 3033 : 1034 - 1037
  • [43] Design and Implementation of Privilege Management System Based on RBAC
    Lu Pengyu
    Song Hui
    He Liangjun
    EBM 2010: INTERNATIONAL CONFERENCE ON ENGINEERING AND BUSINESS MANAGEMENT, VOLS 1-8, 2010, : 5078 - 5081
  • [44] Role-based collaboration and its kernel mechanisms
    Zhu, Haibin
    Zhou, MengChu
    IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART C-APPLICATIONS AND REVIEWS, 2006, 36 (04): : 578 - 589
  • [45] Role-based signature and its security proof
    Lin, Changlu (cllin@fjnu.edu.cn), 1600, Institute of Information Science (32):
  • [46] Role-Based Signature and Its Security Proof
    Luo, Fucai
    Lin, Changlu
    Zhu, Yan
    JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2016, 32 (06) : 1525 - 1539
  • [47] An Expanded Model of Role-Based Access Model Based on Resource Model
    Liang, Zhi-hong
    Sun, Xing-ping
    Chen, Qing-yi
    Hu, Jun-hua
    Sun, Shu-qiong
    COMPUTER SCIENCE AND TECHNOLOGY (CST2016), 2017, : 1044 - 1053
  • [48] Design and Implementation of Dynamic Menu Based on Role-Based Access Control
    Chen, Ying
    Yang, Fengyu
    MATERIALS PROCESSING AND MANUFACTURING III, PTS 1-4, 2013, 753-755 : 2990 - 2994
  • [49] Detecting conflicts in a role-based delegation model
    Schaad, A
    17TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2001, : 117 - 126
  • [50] A Role-Based Maturity Model for Digital Relevance
    Bley, Katja
    Schoen, Hendrik
    DIGITAL TRANSFORMATION FOR A SUSTAINABLE SOCIETY IN THE 21ST CENTURY, 2019, 11701 : 738 - 744