A User Controlled Approach for Securing Sensitive Information in Directory Services
نویسندگان
چکیده
Enterprise directory services are commonly used in enterprise systems to store object information relating to employees, computers, contacts, etc. These stores can act as information providers or sources for authentication and access control decisions, and could potentially contain sensitive information. An insider attack, particularly if carried out using administrative privileges, could compromise large amounts of directory information. We present two solutions for protecting directory services information from insider attacks. The first is a centralized approach utilizing a customized virtual directory server. The second is a distributed approach using existing key management infrastructure and a new component called a Personal Virtual Directory Service. We explain how these solutions interact with existing directory services and client applications. We also show how impact to existing users, client applications, and directory services are minimized, and how we prevent insider attacks from revealing protected data. We compare and contrast both solutions, including potential tradeoffs, administrative overhead, and enterprise systems impact. Additionally, our solution is supported by implementation results showing the impact to client performance and directory storage capacity.
منابع مشابه
A symbol-based fuzzy decision-making approach to evaluate the user satisfaction on services in academic digital libraries
Academic libraries play a significant role in providing core services that include research, teaching and learning. Usersatisfaction is an important indicator for evaluating the performance of library service. This paper develops a methodfor measuring the user satisfaction in a group decision-making environment. First, the performance of service isevaluated by using questionnaire survey. The sc...
متن کاملProtecting Sensitive Information in Directory Services Using Virtual Directories
Directory services are commonly used to store information related to individuals, and often act as a source for security services, such as authentication and access control, in collaborative applications within/across organizations. Hence, there is an urgent need to protect the sensitive information they contain. Existing solutions offer minimal protection against insider attacks, a growing thr...
متن کاملEnhancing File Security by Integrating Steganography Technique in Linux Kernel
In today‟s world securing file data is very important. The proposed Secure File System (SFS) provides file data security using steganographic techniques in a transparent and convenient way. The proposed SFS pushes information hiding services into the Linux kernel space, mounting it between the Virtual File System layer and underlying file system. After SFS is integrated with the Linux operating...
متن کاملDesigning Health Information Services Model in Tehran’s Public Libraries
Purpose: Considering that health information has a fundamental role in increasing the level of health of people in today's societies, it provides a suitable platform for the growth and development of health systems in different countries. This study aimed to investigate the health information needs and how to access health information among those referred to public libraries in Tehran. Method:...
متن کاملFinding Community Base on Web Graph Clustering
Search Pointers organize the main part of the application on the Internet. However, because of Information management hardware, high volume of data and word similarities in different fields the most answers to the user s’ questions aren`t correct. So the web graph clustering and cluster placement in corresponding answers helps user to achieve his or her intended results. Community (web communit...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- J. UCS
دوره 15 شماره
صفحات -
تاریخ انتشار 2009