Authorization Recycling in Attribute-Based Access Control

被引:0
|
作者
An, Yan [1 ]
Helil, Nurmamat [1 ]
机构
[1] College of Mathematics and System Science, Xinjiang University, Urumqi, China
关键词
Decision making - Recycling;
D O I
10.1155/2023/4644778
中图分类号
学科分类号
摘要
In most access control scenarios, the communication between the PDP (policy decision point) and the PEP (policy enforcement point) can cause high authorization overhead. Authorization recycling enables PEP to use the previous access control decisions fetched from the PDP to handle some upcoming access control requests, reduce authorization costs, and increase the efficiency of access control decision-making. Inspired by the RBAC (role-based access control) authorization recycling mechanism, this article first presents an ABAC (attribute-based access control) model based on Boolean expressions of subject and object attributes. It then proposes an authorization recycling approach for this model. In this approach, we provide construction and update methods for authorization data caches and access control decision-making rules for SDP (secondary decision point) by using the caches. The proposed approach can deduce precise and approximate access control decisions from the cache of authorization data, reducing communication between the PEP and the PDP. Finally, the feasibility of the proposed method is verified by conducting a small-scale test. ABAC, SDP, authorization recycling, and authorization caching. © 2023 Yan An and Nurmamat Helil.
引用
收藏
相关论文
共 50 条
  • [1] Attribute-Based Access Control
    Hu, Vincent C.
    Kuhn, D. Richard
    Ferraiolo, David F.
    [J]. COMPUTER, 2015, 48 (02) : 85 - 88
  • [2] Using attribute-based access control to enable attribute-based messaging
    Bobba, Rakesh
    Fatemieh, Omid
    Khan, Fariba
    Gunter, Carl A.
    Khurana, Himanshu
    [J]. 22ND ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2006, : 403 - +
  • [3] Authorization Management in Multi-Cloud Collaboration using Attribute-based Access Control
    John, John C.
    Sural, Shamik
    Gupta, Arobinda
    [J]. 2016 15TH INTERNATIONAL SYMPOSIUM ON PARALLEL AND DISTRIBUTED COMPUTING (ISPDC), 2016, : 190 - 195
  • [4] Towards an Attribute-Based Authorization Model with Task-Role-Based Access Control for WfMS
    Liu, Kui
    Zhou, Zhurong
    Chen, Qianguo
    Yang, Xiaoli
    [J]. 2015 IEEE 16TH INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY (ICCT), 2015, : 361 - 371
  • [5] Attribute-Based Oblivious Access Control
    Han, Jinguang
    Susilo, Willy
    Mu, Yi
    Yan, Jun
    [J]. COMPUTER JOURNAL, 2012, 55 (10): : 1202 - 1215
  • [6] SCAuth: Selective Cloud User Authorization for Ciphertext-Policy Attribute-Based Access Control
    Sultan, Nazatul Haque
    Barbhuiya, Ferdous Ahmed
    Sarma, Nityananda
    [J]. 2017 IEEE INTERNATIONAL CONFERENCE ON CLOUD COMPUTING IN EMERGING MARKETS (CCEM 2017), 2017, : 93 - 98
  • [7] Using Chinese Natural Language to Configure Authorization Policies in Attribute-Based Access Control System
    Shen, Zhuoxiang
    Gao, Neng
    Liu, Zeyi
    Li, Min
    Wang, Chuanyin
    [J]. SCIENCE OF CYBER SECURITY, SCISEC 2021, 2021, 13005 : 110 - 125
  • [8] Attribute-Based Authorization for Grid Computing
    Khider, Husam
    Osman, Taha
    Sherkat, Nasser
    [J]. UKSIM-AMSS FIRST INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS, MODELLING AND SIMULATION, 2010, : 71 - 74
  • [9] Monotonicity and Completeness in Attribute-Based Access Control
    Crampton, Jason
    Morisset, Charles
    [J]. SECURITY AND TRUST MANAGEMENT (STM 2014), 2014, 8743 : 33 - 48
  • [10] Mining Attribute-Based Access Control Policies
    Davari, Maryam
    Zulkernine, Mohammad
    [J]. INFORMATION SYSTEMS SECURITY, ICISS 2022, 2022, 13784 : 186 - 201