Table of Contents
Introduction. 1
The
environment of LBAC.. 1
Creation
of security objects for LBAC.. 2
Security
label components. 2
Security
policy. 2
Security labels. 3
Multi
component security policy. 3
Use
of LBAC.. 4
Extra
control 4
Declaratively
control on the access. 4
Extra
protection to the sensitive data. 4
Provides
complete control against unauthorized access. 4
Working
of LBAC.. 5
Conclusion. 7
References. 8
Introduction of Label
Based Assess Control
It can be noted that Label based access control
is extremely important and add a column to a table that will label each row
according to categories. These categories are confidential, secret and top
secret. They are according to the defined user by the program. According to
this category, the user can access the data. This means that if a table is
accessed by the simple user then it is not possible to access the confidential,
secret and top-secret data. Then the higher department of the company can access
the confidential data and categories for the simple users. Moreover, the top-secret
data will be accessible for the top post of the company means CEO. Only the CEO
can access the whole data of the company. In this report, there is brief
information about LBSC. It will starts from the environment and moving towards
its security objects and then there is complete information about the working
of LBAC.
The
environment of LBAC of Label Based Assess Control
There are a lot of environments in which LBAC
is playing a major role. From them, the first and most important is related to
government data. This data is highly confidential. The simple citizen is not
able to access it. The most common environment of this technology is related to
the business. There are many huge companies that are operated online are using
it. Through this, it will become simple for the CEO of the company to hide its
top-secret data from other management.
Creation
of security objects for LBAC of Label Based Assess Control
There are some security objects that must be created by the developer in
proper order. This means that all of these objects are organized in proper
order. All of these objects are defined in the given section (Agrawal & Mohania, 2014).
Security
label components of Label Based Assess Control
It is the first object of the system and it is extremely important. This
object is involved in defining the labels that will be used by the developer.
Moreover, it can be noted that there are three different types of components
used in this object
·
The
first is related to set, and it is just the list of the label. It will just
check the label and organized it according to the match. Moreover, if it will
not match then it will not label it.
·
The
next component is the array. It is the list of labels and it has consisted of
different categories of the label. This shows that if the user can access only
those items that are present in that array. On the other hand, the user with the
second label can access the data label with the first and second array.
·
The
third component is related to the tree, it is only like the organizational
chart of the company. It can be noted that in the tree there are a lot of
elements present at each level and through these branches are defined. On the
other hand, the root label has access to all other labels.
Security
policy of Label Based Assess Control
The next object is related to security policy. It can be noted that it
is a group of more than one security component. Another thing is that every
table is containing more than one security policy. This can be explained
through the help of an example (Biswas & Ravi Sandhu, 2016).
Figure 1: Security policy example
Security labels of Label Based Assess Control
The next object is related to the security labels. For that case, there
is a need to create the main security label and then mapped them into a complete
set of items. The developer will write its proper syntax in which the complete
working of the security label is defined (Kirner, Glenn, Gupta, Nakashima, & Verghese, 2016).
Multi-component
security policy of
Label Based Assess Control
For that case, there will be each label will contain only one secret and
it will be defined as public, confidential and secret. The next thing is that
each label is also containing complete information about marketing, quality
assurance, and product development. This means that the marketing strategy is
completely secret. Moreover, each label is also containing mode of the entire
region and it is categorized as east and west.
Figure 2: Multicomponent security
policy
Use
of LBAC of Label Based Assess Control
It can be noted that there is a lot of use of LBAC. In this section,
there is complete information on why different organizations are using it (Leila Bahri, Carminati, Ferrari, & Lucia, 2016).
Extra
control of Label
Based Assess Control
It is obvious that LBAC is involved in providing extra control to the
whole system. It will only give access to those users that are the authorized
person of the company. For that case, all labels are applied to the main
column. Moreover, the next thing is that all labels are also applied to the row.
Due to this, unauthorized users are not able to see sensitive label rows.
Declaratively
control on the access of Label Based Assess Control
It will also provide declaratively access to authorized users. This can
be done easily through revoking and granting labels. Moreover, it can be done
easily by revoking and granting exemptions (Leila Bahri, Carminati, Ferrari, & Lucia, 2016).
Extra
protection to the sensitive data of Label Based Assess Control
It can be noted that LBAC is also providing some extra protection to
such data of the users. This can be done in the form of a credit card number.
This means that the credit card number cannot be seen by another person using
the system even the authorized person (Vincent C. Hu, 2017).
Provides
complete control against unauthorized access
If there is a requirement of presentation of data access from
unauthorized users then it can be done easily by LBAC. This is because it is
making such a platform that can be only accessible by the system administrator.
This shows that other users are not able to access such data (Leila Bahri, Carminati, Ferrari, & Lucia, 2016).
Working of LBAC of Label Based Assess Control
The working of this system is done through the help of tables. There are
different rows and columns defined by the developer for the user. The access of
data is given through the help of the User’s label and also data’s label. This
can be explained through the help of an example.
The first user label is public, this shows that only this data is
accessible for the users only (Wang, Chen, Ning Zhang, & Qin, 2017).
Security label for data
|
Name of the person
|
The rank of the person
|
A task is given to that person
|
Public
|
Michela
|
CFO
|
Running the accounts
department
|
Public
|
Trever
|
CEO
|
Running the company
|
Public
|
John
|
CIO
|
Running the IT
department
|
Now for the user label is
confidential. This means that this data is accessible for the lower management
of the company means employees
Security label for data
|
Name of the person
|
The rank of the person
|
The task is given to that person
|
Public
|
Michela
|
CFO
|
Running the accounts
department
|
Public
|
Trever
|
CEO
|
Running the company
|
Public
|
John
|
CIO
|
Running the IT
department
|
Confidential
|
Tracy
|
Accountant
|
Managing the SEC
relations
|
Confidential
|
Amanda
|
IT specialist
|
Making databases and
networks
|
Confidential
|
Knight
|
IT team leader
|
Arranging IT teams and
management
|
Now the last user label is
secret. This means that this data is only accessible by the top management of
the company. This means that the CEO, CFO, and CIO.
Security label for data
|
Name of the person
|
The rank of the person
|
The task is given to that person
|
Public
|
Michela
|
CFO
|
Running the accounts
department
|
Public
|
Trever
|
CEO
|
Running the company
|
Public
|
John
|
CIO
|
Running the IT
department
|
Confidential
|
Tracy
|
Accountant
|
Managing the SEC relations
|
Confidential
|
Amanda
|
IT specialist
|
Making databases and
networks
|
Confidential
|
Knight
|
IT team leader
|
Arranging IT teams and
management
|
Secret
|
Julia Megan
|
Main shareholders
|
Support the company’s
finance
|
Secret
|
Rode Ball
|
Main shareholders
|
Support the company’s
finance
|
Secret
|
James Franklin
|
Main shareholders
|
Support the company’s
finance
|
Figure 3: whole working of the
system
Conclusion of Label Based Assess Control
Summing up all the discussion from above it is concluded that LBAC is
extremely important for the system. This is because it will provide compete for
data protection to the user and the company end. There are many companies and
departments are using LBAC for protecting their confidential and secret data
from the user. From completing this report, I have learned many things about
the LBAC in detail. There are a lot of advantages to this system. All of these
are properly explained in this report. Moreover, the whole working of the
system is explained with proper information.
The next thing is that my experience in completing this report was
amazing. This is because it was a relatively new topic for me and it gave me a
lot of information. Before that, I was not familiar with such a system. But by
completing this report I have gained a lot of information about LBAC. The next
thing is that I have learned a lot of lessons from this report. The first
lesson was related to the working of LBAC. Then after this what are different
objects present in that system. Then after this, the main role of these objects
with the complete demonstration. Moreover, I have also gained information about
its usage. Overall, the whole topic was extremely informative.
References
of Label Based Assess Control
Agrawal,
S., & Mohania, M. K. (2014). Prevention of information leakage from a
document based on dynamic database label based access control (LBAC) policies. U.S. Patent 8,918,895, issued Decembe.
Biswas, P., &
Ravi Sandhu, a. R. (2016). Label-based access control: An ABAC model with
enumerated authorization policy. In
Proceedings of the 2016 ACM International Workshop on Attribute Based Access
Control.
Kirner, P. J.,
Glenn, M. K., Gupta, M., Nakashima, R. N., & Verghese, T. V. (2016).
Automated generation of access control rules for use in a distributed network
management system that uses a label-based policy model. U.S. Patent 9,485,279, issued .
Leila Bahri,
Carminati, B., Ferrari, E., & Lucia, W. (2016). Lamp-label-based
access-control for more privacy in online social networks. In IFIP International Conference on
Information Security Theory and Practice.
Vincent C. Hu, D.
F. (2017). Attribute-Based Access
Control. Artech House.
Wang, Q., Chen, D.,
Ning Zhang, Z. Q., & Qin, Z. (2017). LACS: A lightweight label-based access
control scheme in IoT-based 5G caching context. IEEE Access 5.
Zhou, W., &
Vinesh H. Raja, C. M. (2016). Label-based access control policy enforcement and
management. In Seventh ACIS
International Conference on Software Engineering, Artificial Intelligence,
Networking, and Parallel/Distributed Computing.