DACP: Enforcing a dynamic access control policy in cross-domain environments

被引:6
|
作者
Salehi, Ahmad S. [1 ]
Han, Runchao [2 ]
Rudolph, Carsten [2 ]
Grobler, Marthie [3 ]
机构
[1] La Trobe Univ, Dept Comp Sci & Informat Technol, Melbourne, Australia
[2] Monash Univ, Dep Software Syst & Cybersecur, Cybersecur LAB, Melbourne, Australia
[3] CSIROs Data61, Cybersecur & Quantum Syst CQS, Melbourne, Australia
关键词
Access control policy; Authentication; Attribute-based access control (ABAC); Cross-domain environments (CDEs); Security; Privacy; FRAMEWORK; STORAGE;
D O I
10.1016/j.comnet.2023.110049
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Enabling hybrid authorisations to enforce dynamic access control policy from single-domain to cross-domain environments (CDEs) is important for distributed services. However, traditional Attribute-Based Access Control (ABAC) models are incompatible with CDEs. To fill this gap, approaches that apply cryptographic primitives, e.g., attribute-based encryption (ABE), have been proposed. The computation and storage overhead in most ABE constructions is non-negligible and increases with the complexity of the associated policies. In addition, most access control policy systems enforce authorisation policies in a centralised way, raising serious security and privacy issues. In this paper, we introduce DACP - a practical Dynamic Access Control Policy system supporting dynamic cross-domain authorisation. DACP combines traditional ABAC approach and a novel cryptographic primitive Attribute-based group signature (ABGS). ABAC is used for the access control decision and policy enforcement according to the user's attributes whereas ABGS is used for managing the user's attributes between users and authorities. Thus, the user's attributes are securely distributed along with the access structure in CDEs while preserving the user's privacy. We present the concrete design and implementation of DACP, and evaluate it in real-world settings. The evaluation shows that DACP is practical and efficient in CDEs.
引用
收藏
页数:11
相关论文
共 50 条
  • [21] A cross-domain access control mechanism based on model migration and semantic reasoning
    Tan, Ming
    Liu, Aodi
    Wang, Xiaohan
    Shang, Siyuan
    Wang, Na
    Du, Xuehui
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2024, 18 (06): : 1599 - 1618
  • [22] A Blockchain-Based IoT Cross-Domain Delegation Access Control Method
    Li, Chao
    Li, Fan
    Yin, Lihua
    Luo, Tianjie
    Wang, Bin
    SECURITY AND COMMUNICATION NETWORKS, 2021, 2021 (2021)
  • [23] An access control model for data security sharing cross-domain in consortium blockchain
    Liu Y.
    Yang W.
    Wang Y.
    IET Blockchain, 2023, 3 (01): : 18 - 34
  • [24] A Multi-level Security Access Control Framework for Cross-Domain Networks
    Zhang, Hongbin
    Chang, Jiang
    Wang, Junshe
    2017 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ENGINEERING (CSE) AND IEEE/IFIP INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING (EUC), VOL 2, 2017, : 316 - 319
  • [25] Cross-domain policy adaptation with dynamics alignment
    Gui, Haiyuan
    Pang, Shanchen
    Yu, Shihang
    Qiao, Sibo
    Qi, Yufeng
    He, Xiao
    Wang, Min
    Zhai, Xue
    NEURAL NETWORKS, 2023, 167 : 104 - 117
  • [26] A Survey on Identity and Access Management for Cross-Domain Dynamic Users: Issues, Solutions, and Challenges
    Badirova, Aytaj
    Dabbaghi, Shirin
    Moghaddam, Faraz Fatemi
    Wieder, Philipp
    Yahyapour, Ramin
    IEEE ACCESS, 2023, 11 : 61660 - 61679
  • [27] Virtual Reality as a Cross-Domain Language in Collaborative Environments
    Vizzi, Carlo
    AUGMENTED AND VIRTUAL REALITY, AVR 2015, 2015, 9254 : 507 - 514
  • [28] Adaptation to CT Reconstruction Kernels by Enforcing Cross-Domain Feature Maps Consistency
    Shimovolos, Stanislav
    Shushko, Andrey
    Belyaev, Mikhail
    Shirokikh, Boris
    JOURNAL OF IMAGING, 2022, 8 (09)
  • [29] Dynamic Policy Conflict Analysis in Operational Intensive Trust Services for Cross-domain Federations
    Wu, Zhengping
    Liu, Yuanyao
    Wang, Lifeng
    INTENSIVE: 2009 FIRST INTERNATIONAL CONFERENCE ON INTENSIVE APPLICATIONS AND SERVICES, 2009, : 1 - 6
  • [30] Cross-domain access control based on trusted third-party and attribute center
    Bai, Liyang
    Fan, Kai
    Bai, Yuhan
    Cheng, Xiaochun
    Li, Hui
    Yang, Yintang
    JOURNAL OF SYSTEMS ARCHITECTURE, 2021, 116