TheHingineer

  • Operating System


  • OS Part-1

  • OS Part-2

  • OS Part-3

  • OS Part-4

  • OS Part-5

  • Security Design Principles & Authentication in Distributed Operating System

    Distributed Operating System (DOS) me security ek important aspect hota hai kyunki multiple devices network ke through connected hote hain. Is wajah se unauthorized access, data breaches, aur malware attacks ka risk hota hai.

    Is explanation me hum Security Design Principles aur Authentication Mechanisms ke baare me detail me samjhenge, diagrams aur examples ke saath.


    1️⃣ Security Design Principles in Distributed OS

    Security design principles secure system design ke liye guidelines provide karte hain.

    πŸ”Ή Key Security Design Principles

    1. Least Privilege

    πŸ”Ή Kisi user ya process ko sirf utni hi access di jaye jitni zaroori ho.
    βœ… Example:
    πŸ”Έ Ek banking system me teller sirf customer ke account balance check kar sakta hai, money transfer nahi.


    2. Defense in Depth

    πŸ”Ή Multiple security layers ka use karna taaki agar ek layer breach ho to doosri layer protection provide kare.
    βœ… Example:
    πŸ”Έ Firewall + Antivirus + Encryption ka ek sath use karna.


    3. Fail-Safe Defaults

    πŸ”Ή Default access policy β€œDeny” hoti hai. Jab tak explicitly permission na di jaye, access nahi milega.
    βœ… Example:
    πŸ”Έ Ek server me by default kisi bhi naye user ko restricted access diya jata hai jab tak admin permission na de.


    4. Economy of Mechanism

    πŸ”Ή Security mechanisms jitne simple honge, utne hi zyada effective honge.
    βœ… Example:
    πŸ”Έ Complex authentication systems me bugs hone ke chances badh jate hain, isliye simple password-based authentication + OTP better hota hai.


    5. Open Design

    πŸ”Ή Security system secret algorithms pe depend nahi karta, balki strong encryption aur secure keys ka use karta hai.
    βœ… Example:
    πŸ”Έ AES Encryption ek publicly known algorithm hai par phir bhi secure hai kyunki encryption keys secret hoti hain.


    6. Complete Mediation

    πŸ”Ή Har request ko re-check kiya jaye ki user abhi bhi authorized hai ya nahi.
    βœ… Example:
    πŸ”Έ Ek website me agar user login timeout hone ke baad request bhejta hai, to system usse dobara authenticate karega.


    7. Separation of Privileges

    πŸ”Ή Ek action perform karne ke liye multiple approvals ki zaroorat hoti hai.
    βœ… Example:
    πŸ”Έ Ek financial transaction approve karne ke liye dono manager aur accountant ka approval chahiye.


    8. Least Common Mechanism

    πŸ”Ή Shared resources ka minimum use ho taaki attackers ko kam attack points milein.
    βœ… Example:
    πŸ”Έ Ek multi-user system me har user ka separate memory allocation hota hai taaki ek user doosre ka data access na kar sake.


    9. Psychological Acceptability

    πŸ”Ή Security easy to use honi chahiye, taaki users security measures ko bypass na karein.
    βœ… Example:
    πŸ”Έ Agar password reset process bahut complex ho, to users weak passwords use karne lagte hain.


    2️⃣ Authentication in Distributed OS

    Authentication ka matlab hai verify karna ki user ya process jo claim kar raha hai, wahi hai ya nahi.

    πŸ”Ή Authentication Techniques

    1. Password-Based Authentication

    πŸ”Ή User username + password ka use karta hai.
    βœ… Example:
    πŸ”Έ Gmail ya Facebook me email + password enter karke login karna.
    πŸ“‰ Issue: Weak passwords easily guess ho sakte hain.


    2. Multi-Factor Authentication (MFA)

    πŸ”Ή Password + OTP + Biometric ka combination use hota hai.
    βœ… Example:
    πŸ”Έ Online banking password + OTP maangta hai.


    3. Biometric Authentication

    πŸ”Ή Fingerprint, Face Recognition, Retina Scan ka use hota hai.
    βœ… Example:
    πŸ”Έ Smartphone unlocking using fingerprint sensor.


    4. Token-Based Authentication

    πŸ”Ή User ko authentication token (OTP, Smart Card, USB Key) diya jata hai.
    βœ… Example:
    πŸ”Έ Google Authenticator App jo temporary login codes generate karta hai.


    5. Kerberos Authentication Protocol

    πŸ”Ή Distributed Systems me secure authentication ke liye use hota hai.
    πŸ”Ή Ye password ko network pe transmit nahi karta, balki tickets ka use karta hai.

    βœ… Working:

    1. User login request send karta hai.

    2. Server encrypted ticket generate karta hai.

    3. User jab bhi access request karega, ticket validate kiya jayega.

    πŸ“Œ Diagram: Kerberos Authentication

    User --------> Authentication Server (AS)
        <-------- Ticket Granting Ticket (TGT)
    User --------> Ticket Granting Server (TGS)
        <-------- Service Ticket
    User --------> Service Server (SS)
        <-------- Access Granted

    πŸ”Ή Is model me password directly transmit nahi hota jo security badhata hai.


    3️⃣ Secure Authentication Model in Distributed OS

    Ek secure authentication model ka structure kuch is tarah hota hai:

    πŸ“Œ Diagram: Secure Authentication Model

     +------------+
     | User Login |
     +------------+
            |
    +----------------+
    | Authentication |
    | (Password, MFA)|
    +----------------+
            |
    +----------------+
    | Authorization  |
    |(Access Control)|
    +----------------+
            |
      +-------------+
      | Secure Data |
      +-------------+

    πŸ”Ή Ye model ensure karta hai ki only authorized users secure resources access karein.


    Conclusion

    βœ… Security Design Principles help karte hain ek secure distributed system design karne me.
    βœ… Authentication methods (Password, MFA, Kerberos, Biometric) use karke system ko unauthorized access se protect kiya jata hai.
    βœ… Secure authentication models ka use distributed systems me security badhane ke liye hota hai.

    Scroll to Top