Discretionary Access Control (DAC)
Introduction
Discretionary Access Control (DAC) is an access control model in which the owner of a resource (object) has the authority to decide who can access it and what permissions they have.
π βAccess is controlled at the discretion of the owner.β
DAC is one of the oldest and most widely used access control models, commonly implemented in operating systems like Windows and Linux.
Meaning
In DAC:
- Every object has an owner
- The owner can grant or revoke access rights
- Access decisions are based on user identity and ownership
π Control is flexible and user-driven.
Key Features of DAC
- Ownership-based access control
- Flexible permission assignment
- Uses Access Control Lists (ACLs)
- Supports sharing of resources
- Identity-based access
Working of DAC
Step-by-Step Process
- A user creates a file β becomes the owner
- Owner assigns permissions to other users
- System checks permissions before granting access
- Access is allowed/denied based on owner-defined rules
Owner β Assign Permissions β System Checks β Access Granted / Denied
Access Control Mechanisms in DAC
1. Access Control List (ACL)
- Each object has a list of users and permissions
Example:
File1:
User A β Read, Write
User B β Read
2. Capability List
- Each user has a list of accessible objects and permissions
Examples of DAC
Example 1: Windows File System
- File owner sets permissions:
- Read
- Write
- Full control
Example 2: Linux File Permissions
- Owner, Group, Others
- Permissions: Read (r), Write (w), Execute (x)
Advantages of DAC
- Easy to implement
- Flexible and user-friendly
- Allows resource sharing
- Suitable for small to medium systems
Limitations of DAC
- Less secure compared to MAC
- Vulnerable to Trojan horse attacks
- Users may grant excessive permissions
- No strict control over information flow
π Security depends on user decisions.
DAC vs Other Models
| Feature | DAC | MAC | RBAC |
|---|---|---|---|
| Control | Owner | System | Role |
| Flexibility | High | Low | Medium |
| Security | Low | High | Medium |
| Example | File sharing | Military systems | Corporate systems |
DAC and Security Principles
- Violates least privilege if misused
- Supports sharing but reduces control
- Requires user awareness
DAC and CIA Triad
- Confidentiality β Depends on owner decisions
- Integrity β Risk if permissions are misused
- Availability β Easy access due to flexibility
DAC in Cyber Law (India)
Under IT Act, 2000:
- Section 43 β Unauthorized access due to weak control
- Section 66 β Misuse of system access
π Improper permission management may lead to legal issues.
Real-Life Example
In a college system:
- Teacher creates file β becomes owner
- Teacher gives:
- Students β Read access
- Admin β Full control
Use Cases of DAC
- Personal computers
- File sharing systems
- Small organizations
- Collaborative environments
Conclusion
Discretionary Access Control (DAC) is a flexible and user-controlled access mechanism where the owner decides access permissions. While it is easy to implement and supports sharing, it lacks strong security controls and is vulnerable to misuse. Therefore, DAC is suitable for less sensitive environments but should be used carefully in critical systems.
π MCA Exam Tip
For 10β15 marks:
- Definition
- Features
- Working
- Advantages & limitations
- Comparison with MAC & RBAC
