- Context aware delegation
-
Use of contextual information (location, time) of a delegatee to mitigate this violation, which helps to achieve a higher level of practical security in nomadic environments used by nomadic user .
Delegation in access control domain is not practical for the most of pervasive computers due to its complicated and complex structure. Identity delegation Identity delegation at authentication level provides improved usability,however, identity delegation violates the principle of least privileges [1].
Theory
The term Validated identity refers to the identity that an authentication mechanism concludes with help of one or more authentication techniques. Similarly, the so-called authenticated identity provided to an access control mechanism is referred as Effective identity.
"A context-aware identity delegation at authen tication level is a process in which an authentication mechanism provides an effective identity that is different from the validated identity of a user provided the following conditions are true.”
- Whom: The owner of the effective identity (delegator) has previously delegated his identity to owner of the validated identity (delegatee).
- Which: The current context of authentication for the delegatee is same as previously specified by the delegator [1].
How it works
When a delegatee approaches a system, the claimed identity of the delegatee is validated by a classic authentication mechanism, in the usual way. After this, the module Delegation Controller maps the validated identity to an effective user identity based on the input from Delegation Configuration. Now, this effective identity is supplied to the access control mechanism. This effective identity could either be of the delegatee or of the delegator, depending on the inputs from Delegation Configuration and Context Monitor. A user A can be recognized as a user B in the access control mechanism if B has previously delegated his identity to A and the current context of the system for A is same as previously specified by B [2].
The log file provides a level of accountability in the system. Since our mech anism is at authentication level, one cannot restrict unnecessary delegated authorizations as they are part of the access control domain. This drawback is inherited from the very nature of identity delegation and is justified by the logfile and the assumption of mutual trust among co-workers and colleagues [2].In the mechanism one may restrict the propagation of unnecessary authorizations by limiting the delegation in particular context specified by the delegator. In thisway one can increase the security of a system by limiting the violation of the principle of least privileges [3].
References
- ^ a b http://ceur-ws.org/Vol-504/CAT09_Proceedings.pdf#page=9
- ^ Naveed Ahmed and Christian D. Jensen. A mechanism for identity delegation at authentication level. In The 14th Nordic Conference in Secure IT Systems, NordSec-2009, Oslo, Norway, October 2009.
- ^ M. Gasser and E. McDermott. An architecture for practical delegation a dis- tributed system. In Proceedings of the IEEE Symposium on Research in Security and Privacy, Oakland, California, U.S.A., 1990
Categories:- Systems
Wikimedia Foundation. 2010.