The NIST RBAC Model

660 Words2 Pages

NIST RBAC Model:
The NIST RBAC model comprises four model components (Figure 3.3): which are core RBAC, hierarchical RBAC, static separation of duty (SSD) relations, and dynamic separation of duty (DSD) relations.

2.3 RESEARCH GAP
Zoning is used to provide security in Storage Area Network by preventing the unauthorized access. Although there are two methods of Zoning, they have some advantages and drawbacks. WWN zoning provides flexibility but it is susceptible to spoofing, while port zoning provide security but it is not flexible.

2.3 OBJECTIVE
Objective of this research is to provide the better security, flexibility to a Storage Area Network using the concept of Zoning along with the concept of Role-Based Access Control (RBAC) model.

CHAPTER 3 METHODOLOGY

3.1 PROPOSED MODIFIED MODEL
The Role-Based Zoning model is proposed using the concept of SAN Zoning and Role-Based Access Control (RBAC) model. Role-Based Zoning model provides the better security, flexibility, and reduce traffic overhead.

3.2 Role-Based Zoning:
In SAN Zoning, hosts and storage devices are logically grouped together. These groups are called zones. There are several zones in a storage area network.
But In this proposed model, we logically group the roles instead of hosts and storage devices. Roles are assigned to hosts. There are many-to-many relationship between roles and hosts. Multiple hosts may have a single role and multiple roles may be assigned to a single host. The relationship between roles and the storage is also many-to-many. The specific access rights are associated with each role to access the storage.
The relationship between roles and zones is many-to-many and also there is a many-to-many relationship between zones and storage. Multip...

... middle of paper ...

... IMPLEMENTATION
4.1 Role Based Zoning Model
There are several steps in this model; create roles, create hosts or storage, assign roles to hosts, and create zones, apply constrained on roles, apply constrained on zones.
Definitions:
USERS (U) ← {H1, H2, H3, H4…, Hn}; Set of hosts
STORAGES (S) ← {S1, S2, S3…., Sn}; Set of storages
ROLES (R) ← {R1, R2, R3…, Rn}; Set of roles
HIERARCHY ← {R1 ≥ R2 ≥ R3….. ≥ Rn}; Role hierarchy
PERMISSIONS (P) ← {read, write, modify, own, control}; Set of permissions
Firstly, the system administrator creates roles (R1, R2.., Rn), then hosts (H1, H2…., Hn) and Storage (S1, S2.., Sn). after that Hosts are assigned to different roles. There is a many-to many relationship between hosts and roles. A Single host is assigned to multiple roles and multiple hosts are assigned to a single role.Table1 shows which host is assigned to which role.

Open Document