28
Extensible Access Control Framework for Cloud Applications KTH-SEECS Applied Information Security Lab SEECS NUST Implementation Perspective

Extensible Access Control Framework for Cloud Applications KTH-SEECS Applied Information Security Lab SEECS NUST Implementation Perspective

Embed Size (px)

Citation preview

Page 1: Extensible Access Control Framework for Cloud Applications KTH-SEECS Applied Information Security Lab SEECS NUST Implementation Perspective

Extensible Access Control Framework for Cloud Applications

KTH-SEECS

Applied Information Security Lab SEECS NUST

Implementation Perspective

Page 2: Extensible Access Control Framework for Cloud Applications KTH-SEECS Applied Information Security Lab SEECS NUST Implementation Perspective

Agenda• Motivation • Background

– XACML– Access control models

• Our Contribution– Research Perspective– Implementation Perspective

• Work in Progress– Implementation Demo

• Q & A Session

Page 3: Extensible Access Control Framework for Cloud Applications KTH-SEECS Applied Information Security Lab SEECS NUST Implementation Perspective

Motivation

SECaaS

Email Security aaS

Access control aaS

Cloud Service Consumers

Identity aaS

Network Security aaS

Encryption aaS Data protection aaS

Page 4: Extensible Access Control Framework for Cloud Applications KTH-SEECS Applied Information Security Lab SEECS NUST Implementation Perspective

Extensible Access Control Framework for Cloud Applications

Framework: Essential

supporting structure of a

systemAccess Control:

Restrict the illegal access

from resources under

consideration

Extensible: Ability to extend

the system through addition

of new functionality

Page 5: Extensible Access Control Framework for Cloud Applications KTH-SEECS Applied Information Security Lab SEECS NUST Implementation Perspective

What we are providing ??

Access

Control

Framework

Extensible

Page 6: Extensible Access Control Framework for Cloud Applications KTH-SEECS Applied Information Security Lab SEECS NUST Implementation Perspective

Access Control Models

Page 7: Extensible Access Control Framework for Cloud Applications KTH-SEECS Applied Information Security Lab SEECS NUST Implementation Perspective

Holistic solution for deployment of these models??

Any Standard set for

implementation ??

Page 8: Extensible Access Control Framework for Cloud Applications KTH-SEECS Applied Information Security Lab SEECS NUST Implementation Perspective

What we need ??

Page 9: Extensible Access Control Framework for Cloud Applications KTH-SEECS Applied Information Security Lab SEECS NUST Implementation Perspective
Page 10: Extensible Access Control Framework for Cloud Applications KTH-SEECS Applied Information Security Lab SEECS NUST Implementation Perspective

XACML

XACML stands for eXtensible Access Control Markup

Language

Standard which is ratified by standards organization

Page 11: Extensible Access Control Framework for Cloud Applications KTH-SEECS Applied Information Security Lab SEECS NUST Implementation Perspective

Existing Solutions

Enhancements in XACML 3.0

ABAC Implementation (Proprietary)

Picket-Link XACML Implementation(Open-source)

XACML PEP in JAVA

XACML Implementation (Open-source)

Extensible Access Control Framework for

Cloud Applications

Our Solution

Page 12: Extensible Access Control Framework for Cloud Applications KTH-SEECS Applied Information Security Lab SEECS NUST Implementation Perspective

Why we need 3 ACMs ??

Identities Roles Resources

Page 13: Extensible Access Control Framework for Cloud Applications KTH-SEECS Applied Information Security Lab SEECS NUST Implementation Perspective

RBAC Issues

Challenges appears when extended across the domain

Doesn’t consider environment attributes

Not well suited for a highly distributed

environment

Adding, deleting the duties of a role involved updating too many policy stores.

Page 14: Extensible Access Control Framework for Cloud Applications KTH-SEECS Applied Information Security Lab SEECS NUST Implementation Perspective

Attribute based Access Control (ABAC)

ProfessorSoftware Teaches (CSP 401)Office (238)Head (SEC lab)

Page 15: Extensible Access Control Framework for Cloud Applications KTH-SEECS Applied Information Security Lab SEECS NUST Implementation Perspective

Fine Grained Access Control (FGAC)

Page 16: Extensible Access Control Framework for Cloud Applications KTH-SEECS Applied Information Security Lab SEECS NUST Implementation Perspective

Usage based Access Control (UCON)

PreUsage Decisions

PostUsage Decisions

On-Going Usage Decisions

Page 17: Extensible Access Control Framework for Cloud Applications KTH-SEECS Applied Information Security Lab SEECS NUST Implementation Perspective
Page 18: Extensible Access Control Framework for Cloud Applications KTH-SEECS Applied Information Security Lab SEECS NUST Implementation Perspective

Research Contribution

Page 19: Extensible Access Control Framework for Cloud Applications KTH-SEECS Applied Information Security Lab SEECS NUST Implementation Perspective

XACML Profile

• The standard set of OASIS eXtensible Access Control Markup Language (XACML) specifications for implementation of an [xyz] access control is known as the XACML profile for xyz access control.

Page 20: Extensible Access Control Framework for Cloud Applications KTH-SEECS Applied Information Security Lab SEECS NUST Implementation Perspective

Development Perspective

Page 21: Extensible Access Control Framework for Cloud Applications KTH-SEECS Applied Information Security Lab SEECS NUST Implementation Perspective

Architecture & Workflow

PDPaaS

Policy Repository

PEPaaS

Resources

3rd Party Resources

Application User

1. Authentication 2a. Access Application

Resource

2b. Redirect to PEPaaS

3. Forward XACML Request

6. Return XACML Request to PEPaaS

5.Evaluate

4a. Find Policy4b. Applicable Policy

6. Access Granted

Register User

Exchange Meta-data

Resources

System Administrator

b) After authenticationredirect browser to PAPaaS

a) Authenticate Admin

Attribute Repository

PAPaaS

c) Store d) Retrieve

Policy Repository

e) Store XACML

Policies

Page 22: Extensible Access Control Framework for Cloud Applications KTH-SEECS Applied Information Security Lab SEECS NUST Implementation Perspective

System Administrator

Register User

Exchange Meta-data

b) After authen

Redirect browser to PAPaaSa)Authenticate Admin

PDPaaS

Policy Repository

PEPaaS

Resources

3rd Party Resources

Application User

1. Authentication

2a. Access Application Resource

2b. Redirect to PEPaaS

3. Forward XACML Request

6. Return XACML Request to

5.

Evaluate

4a. Find Policy4b. Applicable Policy

Attribute Repository

PAPaaS

c) Store d) Retrieve

6. Access Granted

Workflow

Page 23: Extensible Access Control Framework for Cloud Applications KTH-SEECS Applied Information Security Lab SEECS NUST Implementation Perspective

PAP Components1. Subject2. Resource3. Action4. Environment

1. XACML Policy Generation2. XACML PolicySet Generation

1. Condition2. Target3. Rule4. Obligation5. Policy6. Policy Set

Page 24: Extensible Access Control Framework for Cloud Applications KTH-SEECS Applied Information Security Lab SEECS NUST Implementation Perspective

Technologies

Page 25: Extensible Access Control Framework for Cloud Applications KTH-SEECS Applied Information Security Lab SEECS NUST Implementation Perspective

MVC based Architecture

Page 26: Extensible Access Control Framework for Cloud Applications KTH-SEECS Applied Information Security Lab SEECS NUST Implementation Perspective

Implementation Demo

Page 27: Extensible Access Control Framework for Cloud Applications KTH-SEECS Applied Information Security Lab SEECS NUST Implementation Perspective

Conclusion

• Deliverables for this Quarter– Version 1.0* will be uploaded on sourcefourge.net.– Report 3: “Unit Testing of ABAC model”.– Initialization of Cloud Instances in AIS lab.

Page 28: Extensible Access Control Framework for Cloud Applications KTH-SEECS Applied Information Security Lab SEECS NUST Implementation Perspective

Q & A