Loading...

Messages

Proposals

Stuck in your homework and missing deadline?

Get Urgent Help In Your Essays, Assignments, Homeworks, Dissertation, Thesis Or Coursework Writing

100% Plagiarism Free Writing - Free Turnitin Report - Professional And Experienced Writers - 24/7 Online Support

Report on Label Based Assess Control

Category: Computer Sciences Paper Type: Report Writing Reference: APA Words: 1900

Table of Contents

Introduction. 1

The environment of LBAC.. 1

Creation of security objects for LBAC.. 2

Security label components. 2

Security policy. 2

Security labels. 3

Multi component security policy. 3

Use of LBAC.. 4

Extra control 4

Declaratively control on the access. 4

Extra protection to the sensitive data. 4

Provides complete control against unauthorized access. 4

Working of LBAC.. 5

Conclusion. 7

References. 8

 Introduction of Label Based Assess Control

It can be noted that Label based access control is extremely important and add a column to a table that will label each row according to categories. These categories are confidential, secret and top secret. They are according to the defined user by the program. According to this category, the user can access the data. This means that if a table is accessed by the simple user then it is not possible to access the confidential, secret and top-secret data. Then the higher department of the company can access the confidential data and categories for the simple users. Moreover, the top-secret data will be accessible for the top post of the company means CEO. Only the CEO can access the whole data of the company. In this report, there is brief information about LBSC. It will starts from the environment and moving towards its security objects and then there is complete information about the working of LBAC.

The environment of LBAC of Label Based Assess Control

There are a lot of environments in which LBAC is playing a major role. From them, the first and most important is related to government data. This data is highly confidential. The simple citizen is not able to access it. The most common environment of this technology is related to the business. There are many huge companies that are operated online are using it. Through this, it will become simple for the CEO of the company to hide its top-secret data from other management.

Creation of security objects for LBAC of Label Based Assess Control

There are some security objects that must be created by the developer in proper order. This means that all of these objects are organized in proper order. All of these objects are defined in the given section (Agrawal & Mohania, 2014).

Security label components of Label Based Assess Control

It is the first object of the system and it is extremely important. This object is involved in defining the labels that will be used by the developer. Moreover, it can be noted that there are three different types of components used in this object

·         The first is related to set, and it is just the list of the label. It will just check the label and organized it according to the match. Moreover, if it will not match then it will not label it.

·         The next component is the array. It is the list of labels and it has consisted of different categories of the label. This shows that if the user can access only those items that are present in that array. On the other hand, the user with the second label can access the data label with the first and second array.

·         The third component is related to the tree, it is only like the organizational chart of the company. It can be noted that in the tree there are a lot of elements present at each level and through these branches are defined. On the other hand, the root label has access to all other labels.

Security policy of Label Based Assess Control

The next object is related to security policy. It can be noted that it is a group of more than one security component. Another thing is that every table is containing more than one security policy. This can be explained through the help of an example (Biswas & Ravi Sandhu, 2016).


Figure 1: Security policy example

Security labels of Label Based Assess Control

The next object is related to the security labels. For that case, there is a need to create the main security label and then mapped them into a complete set of items. The developer will write its proper syntax in which the complete working of the security label is defined (Kirner, Glenn, Gupta, Nakashima, & Verghese, 2016).

Multi-component security policy of Label Based Assess Control

For that case, there will be each label will contain only one secret and it will be defined as public, confidential and secret. The next thing is that each label is also containing complete information about marketing, quality assurance, and product development. This means that the marketing strategy is completely secret. Moreover, each label is also containing mode of the entire region and it is categorized as east and west.  

Figure 2: Multicomponent security policy

Use of LBAC of Label Based Assess Control

It can be noted that there is a lot of use of LBAC. In this section, there is complete information on why different organizations are using it (Leila Bahri, Carminati, Ferrari, & Lucia, 2016).

Extra control of Label Based Assess Control

It is obvious that LBAC is involved in providing extra control to the whole system. It will only give access to those users that are the authorized person of the company. For that case, all labels are applied to the main column. Moreover, the next thing is that all labels are also applied to the row. Due to this, unauthorized users are not able to see sensitive label rows.

Declaratively control on the access of Label Based Assess Control

It will also provide declaratively access to authorized users. This can be done easily through revoking and granting labels. Moreover, it can be done easily by revoking and granting exemptions (Leila Bahri, Carminati, Ferrari, & Lucia, 2016).

Extra protection to the sensitive data of Label Based Assess Control

It can be noted that LBAC is also providing some extra protection to such data of the users. This can be done in the form of a credit card number. This means that the credit card number cannot be seen by another person using the system even the authorized person (Vincent C. Hu, 2017).

Provides complete control against unauthorized access

If there is a requirement of presentation of data access from unauthorized users then it can be done easily by LBAC. This is because it is making such a platform that can be only accessible by the system administrator. This shows that other users are not able to access such data (Leila Bahri, Carminati, Ferrari, & Lucia, 2016).

 Working of LBAC of Label Based Assess Control

The working of this system is done through the help of tables. There are different rows and columns defined by the developer for the user. The access of data is given through the help of the User’s label and also data’s label. This can be explained through the help of an example.

The first user label is public, this shows that only this data is accessible for the users only (Wang, Chen, Ning Zhang, & Qin, 2017).

Security label for data

Name of the person

The rank of the person

A task is given to that person

Public

Michela

CFO

Running the accounts department

Public

Trever

CEO

Running the company

Public

John

CIO

Running the IT department

Now for the user label is confidential. This means that this data is accessible for the lower management of the company means employees

Security label for data

Name of the person

The rank of the person

The task is given to that person

Public

Michela

CFO

Running the accounts department

Public

Trever

CEO

Running the company

Public

John

CIO

Running the IT department

Confidential

Tracy

Accountant

Managing the SEC relations

Confidential

Amanda

IT specialist

Making databases and networks

Confidential

Knight

IT team leader

Arranging IT teams and management

Now the last user label is secret. This means that this data is only accessible by the top management of the company. This means that the CEO, CFO, and CIO.

Security label for data

Name of the person

The rank of the person

The task is given to that person

Public

Michela

CFO

Running the accounts department

Public

Trever

CEO

Running the company

Public

John

CIO

Running the IT department

Confidential

Tracy

Accountant

Managing the SEC relations

Confidential

Amanda

IT specialist

Making databases and networks

Confidential

Knight

IT team leader

Arranging IT teams and management

Secret

Julia Megan

Main shareholders

Support the company’s finance

Secret

Rode Ball

Main shareholders

Support the company’s finance

Secret

James Franklin

Main shareholders

Support the company’s finance

 

Figure 3: whole working of the system

Conclusion of Label Based Assess Control

Summing up all the discussion from above it is concluded that LBAC is extremely important for the system. This is because it will provide compete for data protection to the user and the company end. There are many companies and departments are using LBAC for protecting their confidential and secret data from the user. From completing this report, I have learned many things about the LBAC in detail. There are a lot of advantages to this system. All of these are properly explained in this report. Moreover, the whole working of the system is explained with proper information.

The next thing is that my experience in completing this report was amazing. This is because it was a relatively new topic for me and it gave me a lot of information. Before that, I was not familiar with such a system. But by completing this report I have gained a lot of information about LBAC. The next thing is that I have learned a lot of lessons from this report. The first lesson was related to the working of LBAC. Then after this what are different objects present in that system. Then after this, the main role of these objects with the complete demonstration. Moreover, I have also gained information about its usage. Overall, the whole topic was extremely informative.

References of Label Based Assess Control

Agrawal, S., & Mohania, M. K. (2014). Prevention of information leakage from a document based on dynamic database label based access control (LBAC) policies. U.S. Patent 8,918,895, issued Decembe.

Biswas, P., & Ravi Sandhu, a. R. (2016). Label-based access control: An ABAC model with enumerated authorization policy. In Proceedings of the 2016 ACM International Workshop on Attribute Based Access Control.

Kirner, P. J., Glenn, M. K., Gupta, M., Nakashima, R. N., & Verghese, T. V. (2016). Automated generation of access control rules for use in a distributed network management system that uses a label-based policy model. U.S. Patent 9,485,279, issued .

Leila Bahri, Carminati, B., Ferrari, E., & Lucia, W. (2016). Lamp-label-based access-control for more privacy in online social networks. In IFIP International Conference on Information Security Theory and Practice.

Vincent C. Hu, D. F. (2017). Attribute-Based Access Control. Artech House.

Wang, Q., Chen, D., Ning Zhang, Z. Q., & Qin, Z. (2017). LACS: A lightweight label-based access control scheme in IoT-based 5G caching context. IEEE Access 5.

Zhou, W., & Vinesh H. Raja, C. M. (2016). Label-based access control policy enforcement and management. In Seventh ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing.

Our Top Online Essay Writers.

Discuss your homework for free! Start chat

Engineering Exam Guru

ONLINE

Engineering Exam Guru

1176 Orders Completed

WRITING LAND

ONLINE

Writing Land

924 Orders Completed

Instant Assignment Writer

ONLINE

Instant Assignment Writer

1722 Orders Completed