Vous êtes sur la page 1sur 10

SECURED ROLE BASED ACCESS CONTROL IN AN ORGANIZATION &enior roles inherit all permissions from

Chithra Mol CR, Pre- Final Year , Rinju Maria Francis, Pre- Final Year AMS ENGG College, Namakkal

ABSTRACT
A

unior

roles.

Therefore,

senior' unior

relationship e(ists in the figure. )ermission

glo al e!ucation s"stem, as a ke" area in #uture $%, approval has #ostere! to operation 'ro&i!e &arious is an for !e&elo'ers a particular to learning s"stems (ith lo(-cost) *hile a &ariet" o# e-learning a!&antages has een recogni+e! #or a long be performed on one or more ob #or ects. As time an! man" a!&ances in e-learning s"stems ha&e een im'lemente!, the nee!s e##ecti&e in#ormation sharing in a secure manner ha&e to !ate een largel" ignore!, es'eciall" #or &irtual shown in the figure, uni&ersit" colla orati&e en&ironments) $n#ormation sharing o# &irtual uni&ersities usuall" occurs in roa!, highl" !"namic net(ork- ase! en&ironments, an! #ormall" accessing Role+name, the resources in a secure manner *ser+name, )erm+name, 'oses a !i##icult an! &ital challenge) %his 'a'er aims to uil! a ne( rule- ase! #rame(ork to i!enti#" and role,b ect+name are an! a!!ress issues o# sharing in &irtual uni&ersit",per+name, en&ironments through ase! access control ,R-AC. management) %he #rame(ork inclu!es a rolease! grou' !elegation granting mo!el, grou' attributes of *ser, Role, )ermission, /elegation re&ocation mo!el, authori+ation granting, an! authori+ation re&ocation) *e anal"+e &arious re&ocations an! the im'act o# re&ocations on role ,peration, hierarchies) and %he im'lementation (ith 0M1ase! ,b ect, respectivel". Four tools !emonstrates the #easi ilit" o# the #rame(ork an! authori+ation metho!s) Finall", the current between and !elegation, roles, 'ro'osal is com'are! (ith other relate! (ork) $n!e2relationships %ermsE-learning, R-AC,users role- ase! re&ocation) between roles and permissions, between

roles and roles, and between operations INTRODUCTION The basic elements and relations in RBAC are depicted in Fig. 1. RBAC involves individual users being associated with roles, as well as roles being associated with permissions (each permission is a pair of ob ects and operations!. As such, a role is used to associate users and permissions. A user in this model of the virtual universit" environment is a human being, such as a lecturer or professor. A role is obs function or ob title within the organi#ation associated with authorit" and responsibilit". There are two t"pes of roles$ regular role and administrative role. %e onl" address regular roles in this paper. Roles have hierarch" structure in the RBAC model. and ob ects are man" to man". The securit" polic" of the organi#ation determines role membership and the allocation of each role-s capabilities As shown in the figure, *ser+name,

Role+name, )erm+name, ,per+name, and ,b ect+name are attributes of *ser, Role, )ermission, users and ,peration, roles, and ,b ect, and respectivel". Four relationships between between roles permissions, between roles and roles, and between operations and ob ects are man" to man". The securit" polic" of the organi#ation determines role membership and the allocation of each role-s capabilities.

1 e(presses an e(ample of user'role assignment in ),C&. There are two sets of users associated with a role r$ 1! ,riginal users are those users who are assigned to r and 2! 3elegated users are those users who are delegated to r. The same user can be an original user of one role and a delegated user of another role. Also, it is possible for a user to be both an original user and a delegated user of the same role

1.1.1 Role-Based Delegation Model: An important concept within RBAC is a session, which involves a mapping between a user and possibl" man" roles. For e(ample, a user ma" establish a session b" activating some subset of assigned roles. A session is alwa"s associated with a single user and each user ma" establish #ero or more sessions. There ma" be hierarchies within roles. &enior roles are shown at the top of the hierarchies. &enior roles inherit permissions from unior roles. .et ( / " denote ( is senior to " with the obvious e(tension to ( + ". Role hierarchies provide a powerful and convenient means to enforce the principle of least privilege since onl" re0uired permissions to perform a tas1 are assigned to the role. Fig. 2 shows the role hierarch" structure of RBAC in ),C&. Table

and 2! 3elegated users are those users who are delegated to r. The same user can be an original user of one role and a delegated user of another role. Also, it is possible for a user to be both an original user and a delegated user of the same role.

1.1.2 Role-Based Group Delegation: The scope of our model is to address role'based group delegation with role hierarchies and constraints that support multistep and partial delegations. There are two 1inds of group delegation$ user'group delegation and group'group delegation. %e first discuss user'group delegations, which consist of original user'group and delegated user'group delegations.

Fig : UAO and UAD Relationships

The new relation of user'group delegation is defined as delegation group relation

assignments

*A,6

delegated

user

assignments *A36 delegated group Fig : Role based Delegation model. (34.*5R!, which includes$ original user assignments 5A36 and constraints. 7n a user'group components$ delegated delegation, a user!6 a there are (or role6 five a a delegating user

delegating

delegated group6 a delegated role6 and

associated delegation

constraints. relation is

A a

user'group one'to'man"

role to revo1e the user from the delegated role. Resilien"e: This dimension describes revocation

relationship on user assignments. 7t consists of original user group delegation (,R7*53! and delegated user group delegation (34.*53!. Fig. 8 illustrates components and their relations in the role based delegation model. 9ence, we have the following elements and functions for user' group delegation. 1.1. Role-Based Delegation Re!o"ation: Revocation is a significant function in role'based group delegations. For e(ample, Ton" delegated role 37R to group )ro ect 16 if the group moves to another compan" and does not e(ist at the universit" an"more, the delegated role 37R has to be revo1ed instantl". For simplicit", we do not

through deleting or negative authori#ation. The effect of a role deleting revocation from a user is acted6 another user ma" grant the user the same role that was ust revo1ed, and as a result, the revocation has no effect on the user. The negative authori#ation has high priorit" in this dimension, which means that the authori#ation overrules an" other authori#ations until the negative one is in turn revo1ed. $ropagation: This dimension distinguishes revocations according to a delegation structure of role locations. There are local revocation and global revocation in the dimension. happens The to local the revocation direct onl" delegation

differentiate roles and groups in this section. Re!o"ation dimension: Dependen"#: 3ependenc" refers to the legitimac" of a user who can revo1e a delegated revo1e the role. 3ependent user revocation from the means that onl" the delegating user can delegated delegated role. 7ndependent revocation

relationship, while the global revocation affects all other users authori#ed b" the revo1ed user.

1.1.% Re!o"ating Delegation: Dependent &ea' (o"al Delete )D&(D*:

allows an" original user of the delegating

The

3ependent

%ea1

.ocal

3elete

2. 7mplicit role r< that is senior to role r is removed, :. Roles other than r and its senior role are intact, and ;. The delegation structure ma" need to be updated since roles delegated b" *2 have to remain. Dependent &ea' Global Delete (DWGD): The 3ependent %ea1 5lobal 3elete

(3%.3!, as the first revocation scheme, is the easiest operation. 7t does neither have resilience, propagation, nor dominance, and onl" the direct delegating user can remove the delegation relationship. The features of scheme 3%.3 when user *1 wants to revo1e role r from user *2 are$ 1. *1 does not grant role r to *2, 2. Role r ma" still sta" with *2 if users other than *1delegate r to him, :. Roles granted b" users other than *1 are intact, and ;. The delegation structure ma" need to be updated since roles delegated b" *2 have to remain. Dependent +trong (o"al Delete (DSLD): The 3ependent &trong .ocal 3elete (3&.3! is different from 3%.3 in the dominance aspect. 7t does not have resilience and propagation but does have dominance, and onl" the direct delegating user ma" ta1e awa" the delegation relationship. The features of scheme 3&.3 when user *1 wants to revo1e role r from user *2 are$ 1. *1 does not grant role r to *2,

(3%53! is different from 3%.3 in the propagation aspect. 7t does not have resilience and dominance but does have propagation, and onl" the direct delegating user ma" remove the delegation relationship. The features of scheme 3%53 when user *1 wants tore revo1e role r from user *2 are$ 1. *1 does not grant role r to *2, 2. Role r delegated b" *2 to users is removed, :. Roles other than r are intact, and ;. The delegation structure ma" need to be updated since roles other than r delegated b" *2 have to remain. Dependent &ea' (o"al ,egati!e (DWLN):

The

3ependent

%ea1

.ocal

=egative

A prere0uisite condition is evaluated for a user u b" interpreting r to be true if *A and +r to be true if *A, where *A is a set of user role assignments. %e sa" a group satisfies a prere0uisite condition if all users in the group satisf" the prere0uisite condition. For a given set of roles R, let CR denote all possible prere0uisite conditions that can be formed using the roles in R. delegation times as the ma(imum delegation depth (D33!. D33 is a number to limit the delegation times. A delegation becomes a single'step delegation if its D33 is e0ual to one. =ot ever" user can delegate a role to another user. The following relation provides what roles a user can delegate with prere0uisite conditions. .1.1 RBA/: The basic idea of RBAC is to give permissions to the users indirectl" b" using roles which are assigned to a particular user. Thus, the user gets a role (or several roles!, and then the role (or roles! gives him predefined other permissions. s"stems database The and roles privilege indirection is similar to groups in *=7E and operating in groupings management

(3%.=! is the scheme with negative authori#ation in resilience dimension. %hen a negative authori#ation of a role is granted to a revo1e as wea1 and local revocation, the negative authori#ation will remain with the revo1e until the authori#ation is removed, and the revo1e cannot act in the role even though the role is delegated to her>him. The negative revocation scheme is different from other revocation schemes in the resilience dimension. %e use blac1 for the role with negative authori#ation. 1.1.- Delegation Authori.ation: %e develop delegation and revocation models in this section. The notion of prere0uisite condition, Can delegate, and Can revo1e are 1e" parts in the group delegation process. Authori.ation Models: The delegation authori#ation goal imposes restrictions on which roles can be delegated to whom. %e partiall" adopt the notion of prere0uisite condition from ?::@ to introduce delegation authori#ation in the delegation framewor1. A prere0uisite condition is an e(pression using Boolean operators ABC and A+C on terms of the form r and +r, where r is a role, ABC means Aand,C and A+C means Aor.C

s"stems. Though, groups can include onl" users as their members, RBAC can contain collections of users, permissions, and other

roles Ain a single access control model in terms of roles and role hierarchies, role activation, and constraints on user>role membership and role set activationC RBAC controls the usersaccess to

all of the permissions of some other roles, it is a wa" to go for organi#ations where roles have overlapping permissions. 5.1 CONCLUSION: This )ro ect has discussed a role' based delegation model for virtual universit" learning environments with cF.net. and %e its have implementation

information and s"stem resources based on users- activities in the s"stem, and re0uires the roles- identification in the s"stem. &uch a model is supposed to have a set of basics elements such as users, roles, permissions, operations, and ob ects, and relations between these elements ?1@. A set of actions and responsibilities related to a particular activit" can defined a role, then permissions to access ob ects are specified for roles, and afterward, users are assigned to appropriate roles. ,rgani#ations ma" re0uire various numbers of roles and access rules. 7n most organi#ations roles are 0uite constant while users and tas1s which are assigned to them can be impermanent, and reassignment is essential. &o, RBAC is a most suitable approach to provide secure association and access, powerful because ARBAC for provides reducing a the mechanism

anal"#ed a delegating framewor1 including delegating authori#ation and revocation with constraints and e(tended it to include group' based delegation. The revocation dimensions and delegating revocations are discussed. Furthermore, role assignment changes, as the impact result of original role delegating revocation, are described. To provide a practical solution for role'based group delegations, we have anal"#ed role hierarchies and the relationship of senior and unior roles. The wor1 in this pro ect has significantl" e(tended previous wor1 in several aspects, for e(ample group'based delegation, group delegation authori#ation with prere0uisite conditions, and revocation authori#ation. 5.2 FUTURE WORK: The future wor1 includes two parts. ,ne is to anal"#e constraints in the
Task Assignment

comple(it", cost, and potential for error in assigning permissions to users within the organi#ationC ?2@. &ince RBAC has role hierarchies, where a given role can enclose

delegation model at a virtual universit". %e have mentioned the time temporal duration as a constraint in our delegation model, but it needs more wor1 on constraints including the constraints in the 5TRBAC model ?2<@. The other one is the wor1flow anal"sis of delegation processes in the role'based delegation model at a virtual universit".

BIBLIOGRAPHY ?1@ D. Abadi, D. Burrows, B. .ampson, and 5. )lot1in, AA Calculus for Access Control in 3istributed &"stems,C ACD Trans. )rogramming .anguages and &"stems, vol. 18, no. ;, pp. G<H'G:;, 1II:. ?2@ 5. Ahn, B. Dohan, and &. 9ong, ATowards &ecure 7nformation &haring *sing

Role'Based 3elegation,C J. =etwor1 and Computer Applications, vol. :<, no. 1, pp. ;2'8I, 2<<G. ?:@ 5. Ahn and R. &andhu, ARole'Based Authori#ation Constraints &pecification,C 7nformation and &"stem &ecurit", vol. :, no. ;, pp. 2<G'22H, 2<<<. ?;@ 5. Ahn and R. &andhu, A3ecentrali#ed *ser 5roup Assignment in %indows =T,C J. &"stems and &oftware, vol. 8H, no. 1, pp. :I';I, 2<<1. ?8@ D. Arenas and .. .ib1in, AA =ormal Form for ED. 3ocuments,C ACD Trans. 3atabase &"stems, vol. 2I, no. 1, pp. 1I8'2:2, 2<<;. ?H@ T. Aura, A3istributed Access'Rights Danagement with 3elegation Certificates,C &ecurit" 7nternet )rogramming, pp. 211' 2:8, 1III. ?G@ 4. Bar1a and R. &andhu, AFramewor1 for Role'Based 3elegation Dodels and &ome 4(tensions,C )roc. 1Hth Ann. Computer &ecurit" Applications Conf. (AC&AC -<<!, pp. 1HK'1GG, 2<<<

C.R Chithra Mol Pre-#inal "ear stu!ent o# Annai mathammal sheela Engineering college ha&e ma!e man" research in kno(le!ge Engineering Area un!er the gui!ance o# Research scholors in con#erences) Rinju Maria Francis Pre- #inal "ear stu!ent o# Annai mathammal sheela Engineering college ha&e een 'ro'ose! her research an! un!er kno(le!ge engineering so#t(are her $nstitution an! 'resente! the same conce't in man"

engineering area)

Authors:

Vous aimerez peut-être aussi