DACP: Enforcing a dynamic access control policy in cross-domain environments

被引:6
|
作者
Salehi, Ahmad S. [1 ]
Han, Runchao [2 ]
Rudolph, Carsten [2 ]
Grobler, Marthie [3 ]
机构
[1] La Trobe Univ, Dept Comp Sci & Informat Technol, Melbourne, Australia
[2] Monash Univ, Dep Software Syst & Cybersecur, Cybersecur LAB, Melbourne, Australia
[3] CSIROs Data61, Cybersecur & Quantum Syst CQS, Melbourne, Australia
关键词
Access control policy; Authentication; Attribute-based access control (ABAC); Cross-domain environments (CDEs); Security; Privacy; FRAMEWORK; STORAGE;
D O I
10.1016/j.comnet.2023.110049
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Enabling hybrid authorisations to enforce dynamic access control policy from single-domain to cross-domain environments (CDEs) is important for distributed services. However, traditional Attribute-Based Access Control (ABAC) models are incompatible with CDEs. To fill this gap, approaches that apply cryptographic primitives, e.g., attribute-based encryption (ABE), have been proposed. The computation and storage overhead in most ABE constructions is non-negligible and increases with the complexity of the associated policies. In addition, most access control policy systems enforce authorisation policies in a centralised way, raising serious security and privacy issues. In this paper, we introduce DACP - a practical Dynamic Access Control Policy system supporting dynamic cross-domain authorisation. DACP combines traditional ABAC approach and a novel cryptographic primitive Attribute-based group signature (ABGS). ABAC is used for the access control decision and policy enforcement according to the user's attributes whereas ABGS is used for managing the user's attributes between users and authorities. Thus, the user's attributes are securely distributed along with the access structure in CDEs while preserving the user's privacy. We present the concrete design and implementation of DACP, and evaluate it in real-world settings. The evaluation shows that DACP is practical and efficient in CDEs.
引用
收藏
页数:11
相关论文
共 50 条
  • [1] XSACd Cross-domain resource sharing & access control for smart environments
    Fysarakis, Konstantinos
    Soultatos, Othonas
    Manifavas, Charalampos
    Papaefstathiou, Ioannis
    Askoxylakis, Ioannis
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 80 : 572 - 582
  • [2] Lark: Verified Cross-Domain Access Control for Trusted Execution Environments
    Zeng, Fanlang
    Zhang, Zhuoruo
    Chang, Rui
    Yu, Chenyang
    Zhang, Zijun
    Zhao, Yongwang
    [J]. 2023 IEEE 34TH INTERNATIONAL SYMPOSIUM ON SOFTWARE RELIABILITY ENGINEERING, ISSRE, 2023, : 160 - 171
  • [3] Cross-domain dynamic access control based on “blockchain + artificial intelligence”
    Fengling Wang
    Zhenlong Hu
    Han Wang
    Xingji Chen
    Weigong Feng
    [J]. Neural Computing and Applications, 2023, 35 : 24575 - 24585
  • [4] A Dynamic Cross-Domain Access Control Model for Collaborative Healthcare Application
    Salehi, Ahmad S.
    Rudolph, Carsten
    Grobler, Marthie
    [J]. 2019 IFIP/IEEE SYMPOSIUM ON INTEGRATED NETWORK AND SERVICE MANAGEMENT (IM), 2019, : 643 - 648
  • [5] Cross-domain access control policy mapping mechanism for balancing interoperability and autonomy
    Zhu T.
    Li F.
    Jin W.
    Guo Y.
    Fang L.
    Cheng L.
    [J]. Tongxin Xuebao/Journal on Communications, 2020, 41 (09): : 29 - 48
  • [6] Cross-Domain Access Control in a Military SOA
    Nordbotten, Nils Agne
    [J]. MILITARY COMMUNICATIONS CONFERENCE, 2010 (MILCOM 2010), 2010, : 448 - 455
  • [7] Cross-domain access control via PKI
    Denker, G
    Millen, J
    Miyake, Y
    [J]. THIRD INTERNATION WORKSHOP ON POLICIES FOR DISTRIBUTED SYSTEMS AND NETWORKS, PROCEEDINGS, 2002, : 202 - 205
  • [8] Cross-domain dynamic access control based on "blockchain plus artificial intelligence"
    Wang, Fengling
    Hu, Zhenlong
    Wang, Han
    Chen, Xingji
    Feng, Weigong
    [J]. NEURAL COMPUTING & APPLICATIONS, 2023, 35 (35): : 24575 - 24585
  • [9] User-Generated Services: Policy Management and Access Control in a cross-domain Environment
    Catania, Vincenzo
    La Torre, Giuseppe
    Monteleone, Salvatore
    Panno, Daniela
    Patti, Davide
    [J]. 2015 INTERNATIONAL WIRELESS COMMUNICATIONS & MOBILE COMPUTING CONFERENCE (IWCMC), 2015, : 668 - 673
  • [10] A Cross-domain Access Control Method for Large Organizations
    Wang Chao
    Chen Ji-zhou
    Liu Yu-jun
    Li An-qi
    [J]. APPLIED SCIENCE, MATERIALS SCIENCE AND INFORMATION TECHNOLOGIES IN INDUSTRY, 2014, 513-517 : 941 - 946