xRAC: Execution and Access Control for Restricted Application Containers on Managed Hosts

07/08/2019
by   Frederik Hauser, et al.
0

We propose xRAC to permit users to run special applications on managed hosts and to grant them access to protected network resources. We use restricted application containers (RACs) for that purpose. A RAC is a virtualization container with only a selected set of applications. Authentication verifies the RAC user's identity and the integrity of the RAC image. If the user is permitted to use the RAC on a managed host, launching the RAC is authorized and access to protected network resources may be given, e.g., to internal networks, servers, or the Internet. xRAC simplifies traffic control as the traffic of a RAC has a unique IPv6 address so that it can be easily identified in the network. The architecture of xRAC reuses standard technologies, protocols, and infrastructure. Those are the Docker virtualization platform and 802.1X including EAP-over-UDP and RADIUS. Thus, xRAC improves network security without modifying core parts of applications, hosts, and infrastructure. In this paper, we review the technological background of xRAC, explain its architecture, discuss selected use cases, and investigate on the performance. To demonstrate the feasibility of xRAC, we implement it based on standard components with only a few modifications. Finally, we validate xRAC through experiments.

READ FULL TEXT

page 1

page 6

research
07/29/2018

Trust Based Identity Sharing For Token Grants

Authentication and authorization are two key elements of a software appl...
research
11/07/2017

AppSwitch: Resolving the Application Identity Crisis

Networked applications traditionally derive their identity from the iden...
research
12/10/2017

Datacenter Traffic Control: Understanding Techniques and Trade-offs

Datacenters provide cost-effective and flexible access to scalable compu...
research
06/09/2021

Benchmarking NetBASILISK: a Network Security Project for Science

Infrastructures supporting distributed scientific collaborations must ad...
research
07/01/2022

A Functional Architecture for 6G Special Purpose Industrial IoT Networks

Future industrial applications will encompass compelling new use cases r...
research
10/15/2020

5G-Flow: Flexible and Efficient 5G RAN Architecture Using OpenFlow

Convergence of multiple access technologies is one of the key enablers i...
research
04/13/2021

Balboa: Bobbing and Weaving around Network Censorship

We introduce Balboa, a link obfuscation framework for censorship circumv...

Please sign up or login with your details

Forgot password? Click here to reset