skip to main content
10.1145/1314466.1314475acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
Article

Improving multi-tier security using redundant authentication

Published:02 November 2007Publication History

ABSTRACT

Multi-tier web server systems are used in many important contexts and their security is a major cause of concern. Such systems can exploit strategies like least privilege to make lower tiers more secure in the presence of compromised higher tiers. In this paper, we investigate an extension of this technique in which higher tiers are required to provide evidence of the authentication of principals when they make requests of lower tiers. This concept, which we call redundant authentication, enables lower tiers to provide security guarantees that improve significantly over current least privilege strategies. We validate this technique by applying it to a practical Building Automation System (BAS) application, where we explore the use of redundant authentication in conjunction with an authentication proxy to enable interoperation with existing enterprise authentication services.

References

  1. A. Acharya and M. Raje. MAPbox: Using parameterized behavior classes to con.ne untrusted applications. In USENIX Security Symposium, 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. D. Brumley and D. Song. Privtrans: Automatically partitioning programs for privilege separation. In USENIX Security Sympoisum, Aug. 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. P. Efstathopoulos, M. Krohn, S. VanDeBogart, C. Frey, D. Ziegler, E. Kohler, D. Mazieres, F. Kaashoek, and R. Morris. Labels and event processes in the Asbestos operating system. In Symposium on Operating Systems Principles, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. P. Ehrlich and T. Considine (Chairs). Open Building Information Exchange (oBIX) version 1.0. OASIS Committee Speci.cation, December 2006. http://www.oasis-open.org/committees/tc_home.php?wg_abbrev=obix.Google ScholarGoogle Scholar
  5. T. Garfinkel, B. Pfa., and M. Rosenblum. Ostia: A delegating architecture for secure system call interposition. In Network and Distributed System Security Symposium, 2004.Google ScholarGoogle Scholar
  6. I. Goldberg, D. Wagner, R. Thomas, and E. Brewer. A secure environment for untrusted helper applications. In USENIX Security Symposium, July 1996. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. P. P. Gri.ths and B. W. Wade. An authorization mechanism for a relational database system. ACM Transactions on Database Systems (TODS), 1(3):242--255, September 1976. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Java. http://java.sun.com/.Google ScholarGoogle Scholar
  9. E. Kubaitis. Bluestem overview. Web Page, August 2000. https://www-s4.uiuc.edu/bluestem-notes/.Google ScholarGoogle Scholar
  10. K. Lawrence and C. Kaler (Chairs). Web Services Security (WS-Security) X.509 Certificate Token profile 1.1. OASIS Standard Speci.cation, February 2006. http://docs.oasis-open.org/wss/v1.1/ wss-v1.1-spec-os-x509TokenProfile.pdf.Google ScholarGoogle Scholar
  11. Microsoft. Active directory overview. Web Page, Janurary 2005. http://technet2.microsoft.com/windowsserver/en/library/7c981583-cf41-4e6c-b1f6-5b8863475ede1033.mspx?mfr=true.Google ScholarGoogle Scholar
  12. OPC Task Force. OPC overview. OPC White Paper, October 1998. http://www.opcfoundation.org/DownloadFile.aspx/General/OPC\%20Overview\%201.00.pdf?RI=1.Google ScholarGoogle Scholar
  13. D. S. Peterson, M. Bishop, and R. Pandey. A flexible containment mechanism for executing untrusted code. In USENIX Security Symposium, Aug. 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. N. Provos. Improving host security with system call policies. In USENIX Security Symposium, Aug. 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. N. Provos, M. Friedl, and P. Honeyman. Preventing privilege escalation. In USENIX Security Symposium, Washington, DC, Aug. 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. RSA Laboratories. Public-key cryptography standards (PKCS) #7: Cryptographic message syntax standard version 1.6. RSA Laboratories Technical Note, May 1997. http://www.rsa.com/rsalabs/node.asp?id=2129.Google ScholarGoogle Scholar
  17. J. S. Shapiro, J. M. Smith, and D. J. Farber. EROS: A fast capability system. In Symposium on Operating Systems Principles, 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. T. Wason, S. Cantor, J. Hodges, J. Kemp, and P. Thompson. Liberty ID-FF architecture overview, 2005.Google ScholarGoogle Scholar

Index Terms

  1. Improving multi-tier security using redundant authentication

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in
          • Published in

            cover image ACM Conferences
            CSAW '07: Proceedings of the 2007 ACM workshop on Computer security architecture
            November 2007
            92 pages
            ISBN:9781595938909
            DOI:10.1145/1314466
            • General Chair:
            • Peng Ning,
            • Program Chair:
            • Vijay Atluri

            Copyright © 2007 ACM

            Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            • Published: 2 November 2007

            Permissions

            Request permissions about this article.

            Request Permissions

            Check for updates

            Qualifiers

            • Article

            Upcoming Conference

            CCS '24
            ACM SIGSAC Conference on Computer and Communications Security
            October 14 - 18, 2024
            Salt Lake City , UT , USA

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader