Skip to content

Models of Security in Operating Systems

Security models in an operating system provide a structured approach to enforcing security policies. These models define how data access, user permissions, and system integrity are maintained to prevent unauthorized access, data breaches, and cyber threats.


1. Types of Security Models

A. Bell-LaPadula Model (BLP) – Confidentiality

πŸ“Œ Focus: Prevents unauthorized access to sensitive data (confidentiality).
πŸ“Œ Used in: Military and government systems.
πŸ“Œ Rules:
βœ” No Read Up (Simple Security Property): A lower-level user cannot read higher-level data.
βœ” No Write Down (*-Property Rule): A higher-level user cannot write to a lower-level file (prevents data leaks).
βœ” Example: A classified government document cannot be accessed by an unauthorized employee.


B. Biba Model – Integrity

πŸ“Œ Focus: Prevents unauthorized modification of data (integrity).
πŸ“Œ Used in: Banking, finance, and medical records systems.
πŸ“Œ Rules:
βœ” No Write Up (Integrity Axiom): A lower-level user cannot modify higher-level data.
βœ” No Read Down (Simple Integrity Property): A higher-level user cannot read lower-level data to prevent corruption.
βœ” Example: A regular bank employee cannot alter high-level financial reports.


C. Clark-Wilson Model – Integrity in Transactions

πŸ“Œ Focus: Maintains integrity by enforcing well-formed transactions.
πŸ“Œ Used in: Commercial applications, e-commerce, and financial databases.
πŸ“Œ Rules:
βœ” Separation of Duties (SoD): One user cannot perform both authorization and execution of a transaction.
βœ” Auditing & Logging: Tracks data changes for accountability.
βœ” Example: In an online banking system, one user enters a transaction, and another approves it.


D. Brewer-Nash Model (Chinese Wall) – Conflict of Interest Prevention

πŸ“Œ Focus: Prevents conflicts of interest by restricting access based on past actions.
πŸ“Œ Used in: Financial firms, law firms, and consulting agencies.
πŸ“Œ Rules:
βœ” A user who accessed Company A’s confidential data cannot access competing Company B’s data.
βœ” Prevents leakage of sensitive business information.
βœ” Example: An investment analyst advising one company cannot work with its competitor.


E. Harrison-Ruzzo-Ullman Model – Access Control

πŸ“Œ Focus: Defines who can change access rights in a system.
πŸ“Œ Used in: Operating system file permissions.
πŸ“Œ Rules:
βœ” Defines subjects (users), objects (files), and rights (read, write, execute).
βœ” Dynamic access control – users’ permissions can change over time.
βœ” Example: A system administrator can grant and revoke file permissions dynamically.


F. Graham-Denning Model – Secure Object Management

πŸ“Œ Focus: Defines how users interact with system objects (files, programs).
πŸ“Œ Used in: Operating system security and resource management.
πŸ“Œ Rules:
βœ” Specifies eight operations (create/delete objects, grant/revoke access, etc.).
βœ” Controls ownership and delegation of access rights.
βœ” Example: A file owner in Windows can give or revoke access to other users.


2. Comparison of Security Models

ModelFocusUsed InKey Principle
Bell-LaPadulaConfidentialityMilitary, governmentNo Read Up, No Write Down
BibaIntegrityFinance, healthcareNo Write Up, No Read Down
Clark-WilsonData IntegrityBusiness transactionsWell-formed transactions
Brewer-NashConflict of InterestFinancial & legal firmsPrevents unethical access
Harrison-Ruzzo-UllmanAccess ControlOS file permissionsDynamic user permissions
Graham-DenningObject ManagementSystem security policiesSecure resource access

Conclusion

Security models help organizations enforce access control, confidentiality, and integrity based on different needs. A well-designed OS security framework often combines multiple models to provide comprehensive protection against cyber threats.