Spf: Security Performance Flexibility Framework for Trusted Operating Systems
نویسندگان
چکیده
The rapid growth of networking, data sharing, and the Internet has made computer security an important part of computer research and development. A number of highly secure operating systems have been developed to handle the increasing need for security. These operating systems, typically called Trusted Operating Systems, offer a number of security mechanisms that can help protect information, make a system difficult to break into, and confine attacks far better than traditional operating systems. However, this security will come at a cost, since it can degrade the performance of an operating system. This performance loss is one of the reasons why Trusted Operating Systems have not become popular. While Trusted Operating Systems offer an incredible amount of security, observations about computing workloads suggest that only some parts of the operating system security are actually necessary. Web servers are the best example. For many web servers, the majority of the information on the server is publicly readable and available on the Internet. Therefore, if a Trusted Operating System is used on a web server, any security used to secure the confidentiality of the server's information is not necessary. Any security used to protect the confidentiality of web server data can be considered a waste of computational resources. The security needed in web servers is the security to protect the integrity of data, not the confidentiality of data. Other workloads such as multimedia or database workloads may also only need parts of the operating system security. Based on this observation, this thesis proposes the Security Performance Flexibility (SPF) framework for Trusted Operating Systems. SPF recognizes that not all computing workloads require all the security in Trusted Operating Systems. SPF allows system administrators to selectively disable parts of the security in Trusted Operating Systems. By disabling parts of the Trusted Operating System security, performance of the system can potentially be increased. The SPF framework allows system administrators to balance the security and performance needs in their particular computing environment. iv To my parents.
منابع مشابه
A Collaborative Role-Based Access Control for Trusted Operating Systems in Distributed Environment
The research communitiy has shown considerable interest in studying access control in single Trusted Operating Systems (TOS). However, interactions among multiple TOSs have attracted relatively little attention. In this paper, we propose a Collaborative Role-Based Access Control (C-RBAC) model for distributed systems in which accesses across system domain boundaries are allowed. Access entities...
متن کاملObject Oriented Secure Modeling using SELinux Trusted Operating System
Dr. Nitish Pathak 1 * 1 Bharati Vidyapeeth's Institute of Computers Applications and Management (BVICAM), Guru Gobind Singh Indraprastha University (GGSIPU), New Delhi, India Email: [email protected] Neelam Sharma 2 MAIT, Guru Gobind Singh Indraprastha University (GGSIPU), New Delhi, India -------------------------------------------------------------------ABSTRACT--------------------------...
متن کاملRuntime integrity framework based on trusted computing
I present in this dissertation, a technique to measure the integrity of an operating system, so that the user can verify that all critical software components, including the operating system kernel, is running in a known valid state. The technique solves a key problem of providing continuous runtime verification of kernel memory-space. The measurement is integrated with a trustworthy verificati...
متن کاملLinux Provenance Modules: Secure Provenance Collection for the Linux Kernel
In spite of a growing interest in provenance-aware systems, mechanisms for automated provenance collection have failed to win acceptance in mainstream operating systems. This is due in part to a lack of consensus within disparate provenance development communities on a single general solution – provenance collection mechanisms have been proposed at a variety of operational layers wthin host sys...
متن کاملUsing Trusted Computing for enhancing Embedded Computing Platforms
Overview: The Trusted Computing (TC) technology is today already widely applied on Personal Computer (PC) oriented platforms. Typical use scenarios are measuring system integrity for Trusted Operating Systems, secure storage for key material and certificates, identification of platforms and together with other technology like smartcards and biometrics also the authentication and identification ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2002