An application-layer based centralized information access control for VPN

With the rapid development of Virtual Private Network (VPN), many companies and organizations use VPN to implement their private communication. Traditionally, VPN uses security protocols to protect the confidentiality of data, the message integrity and the endpoint authentication. One core technique...

Full description

Saved in:
Bibliographic Details
Published inJournal of Zhejiang University. A. Science Vol. 7; no. 2; pp. 240 - 249
Main Author 欧阳凯 周敬利 夏涛 余胜生
Format Journal Article
LanguageEnglish
Published School of Computer Science & Technology, Huazhong University of Science & Technology, Wuhan 430074, China 01.02.2006
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:With the rapid development of Virtual Private Network (VPN), many companies and organizations use VPN to implement their private communication. Traditionally, VPN uses security protocols to protect the confidentiality of data, the message integrity and the endpoint authentication. One core technique of VPN is tunneling, by which clients can access the internal servers traversing VPN. However, the tunneling technique also introduces a concealed security hole. It is possible that if one vicious user can establish tunneling by the VPN server, he can compromise the internal servers behind the VPN server. So this paper presents a novel Application-layer based Centralized Information Access Control (ACIAC) for VPN to solve this problem. To implement an efficient, flexible and multi-decision access control model, we present two key techniques to ACIAC-the centralized management mechanism and the stream-based access control. Firstly, we implement the information center and the constraints/events center for ACIAC. By the two centers, we can provide an abstract access control mechanism, and the material access control can be decided dynamically by the ACIAC's constraint/event mechanism. Then we logically classify the VPN communication traffic into the access stream and the data stream so that we can tightly couple the features of VPN communication with the access control model. We also provide the design of our ACIAC prototype in this paper.
Bibliography:TP393.1
Virtual private network, Access control, Tunneling, Centralized management, Stream
33-1236/O4
ISSN:1673-565X
1862-1775
DOI:10.1631/jzus.2006.A0240