Working set-based access control for network file systems

  • Authors:
  • Stephen Smaldone;Vinod Ganapathy;Liviu Iftode

  • Affiliations:
  • Rutgers, The State University of New Jersey, Piscataway, NJ, USA;Rutgers, The State University of New Jersey, Piscataway, NJ, USA;Rutgers, The State University of New Jersey, Piscataway, NJ, USA

  • Venue:
  • Proceedings of the 14th ACM symposium on Access control models and technologies
  • Year:
  • 2009

Quantified Score

Hi-index 0.00

Visualization

Abstract

Securing access to files is an important and growing concern in corporate environments. Employees are increasingly accessing files from untrusted devices, including personal home computers and mobile devices, such as smart phones, which are not under the control of the corporation, and may be infected with viruses, worms, and other malware. In such cases, it is crucial to protect the confidentiality and integrity of corporate data from malicious accesses. This paper proposes a novel scheme called Working Set-Based Access Control (WSBAC) to restrict network file system accesses from untrusted devices. The key idea is to continuously observe and extract working sets for users when they access files from trusted devices and use the working sets to restrict user file accesses from untrusted devices. This paper reports on the design and implementation of tools to automatically extract working sets, and transparently enforce WSBAC without requiring changes to the file system. Our experiments with realistic network file system traces lead us to conclude that WSBAC offers a flexible yet secure way to restrict access from untrusted devices, and that the runtime overheads of WSBAC enforcement are negligible.