Hardware-Enhanced Distributed Access Enforcement for Role-Based Access Control

被引:1
作者
Bloom, Gedare [1 ]
Simha, Rahul [1 ]
机构
[1] George Washington Univ, Dept Comp Sci, Washington, DC 20052 USA
来源
PROCEEDINGS OF THE 19TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES (SACMAT'14) | 2014年
关键词
access control; enforcement; hardware data structures;
D O I
10.1145/2613087.2613096
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The protection of information in enterprise and cloud platforms is growing more important and complex with increasing numbers of users who need to access resources with distinct permissions. Role-based access control (RBAC) eases administrative complexity for large-scale access control, while a client-server model can ease performance bottlenecks by distributing access enforcement across multiple servers that consult the centralized access decision policy server as needed. In this paper, we propose a new approach to access enforcement using an existing associative array hardware data structure (HWDS) to cache authorizations in a distributed system using RBAC. This HWDS approach uses hardware that has previous been demonstrated as useful for several application domains including access control, network packet routing, and generic comparison-based integer search algorithms. We reproduce experiments from prior work on distributed access enforcement for RBAC systems, and we design and conduct new experiments to evaluate HWDS-based access enforcement. Experimental data show the HWDS cuts session initiation time by about a third compared to existing solutions, while achieving similar performance to authorize access requests. These results suggest that distributed systems using RBAC could use HWDS-based access enforcement to increase session throughput or to decrease the number of access enforcement servers without losing performance.
引用
收藏
页码:5 / 15
页数:11
相关论文
共 29 条
  • [1] Almeling D.S., 2010, GONZAGA LAW R, V45, P291
  • [2] [Anonymous], 2014, DIST RBAC EVAL A PLA
  • [3] Banerjee Preeta M., 2014, DELOITTE REV
  • [4] Binkert Nathan, 2011, Computer Architecture News, V39, P1, DOI 10.1145/2024716.2024718
  • [5] Bloom G., 2013, THESIS G WASHINGTON
  • [6] Bloom G, 2012, EMSOFT '12: PROCEEDINGS OF THE TENTH AMC INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE 2012, P133
  • [7] Borders K., 2005, Proceedings of the 12th ACM conference on Computer and communications security, P147, DOI [10.1145/1102120.1102142, DOI 10.1145/1102120.1102142]
  • [8] Boyle Jim, 2000, 2748 IETF
  • [9] Breslau L, 1999, IEEE INFOCOM SER, P126, DOI 10.1109/INFCOM.1999.749260
  • [10] Chandra Ramesh., 2010, Proceedings of the 2010 USENIX Conference on Web Application Development, WebApps'10, P1, DOI DOI 10.1109/IPDPSW.2010.5470740