Log2Policy: An Approach to Generate Fine-Grained Access Control Rules for Microservices from Scratch

被引:0
|
作者
Xu, Shaowen [1 ,2 ]
Zhou, Qihang [1 ]
Huang, Heqing [1 ]
Jia, Xiaoqi [1 ,2 ]
Du, Haichao [1 ]
Chen, Yang [1 ,2 ]
Xie, Yamin [1 ]
机构
[1] Chinese Acad Sci, Inst Informat Engn, Beijing, Peoples R China
[2] Univ Chinese Acad Sci, Sch Cyber Secur, Beijing, Peoples R China
基金
中国国家自然科学基金;
关键词
Microservice; Access Control; Access Log; Machine Learning;
D O I
10.1145/3627106.3627137
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Microservice application architecture is one of the most widely used service architectures in the industry. To prevent a compromised microservice from abusing other microservices, authorization policy is applied to regulate the access among them. However, configuring access control policy manually is challenging due to the complexity and dynamic nature of microservice applications. In this paper, we present Log2Policy, a novel approach to generate microservice authorization policy based on access logs. Our approach consists of three fundamental techniques: (1) a log-based topological graph generation mechanism that automatically infers the invocation logic among microservices, (2) a machine learning based attributes mining method that extracts the relevant attributes of requests, and (3) a policy upgrade mechanism based on traffic management that can significantly reduce the upgrade time. We have implemented a prototype of Log2Policy on mainstream microservice infrastructures and have evaluated it with several microservice applications. The results show that Log2Policy can generate fine-grained and effective access control rules and upgrade them with negligible overhead.
引用
收藏
页码:229 / 240
页数:12
相关论文
共 50 条
  • [1] Fine-Grained Access Control for Microservices
    Nehme, Antonio
    Jesus, Vitor
    Mahbub, Khaled
    Abdallah, Ali
    FOUNDATIONS AND PRACTICE OF SECURITY, FPS 2018, 2019, 11358 : 285 - 300
  • [2] Access policy sheet for access control in fine-grained XML
    Wu, J
    Mu, Y
    Seberry, J
    Ruan, C
    EMBEDDED AND UBIQUITOUS COMPUTING - EUC 2005 WORKSHOPS, PROCEEDINGS, 2005, 3823 : 1273 - 1282
  • [3] Fine-Grained Access Control in mHealth with Hidden Policy and Traceability
    Li, Qi
    Zhang, Yinghui
    Zhang, Tao
    BROADBAND COMMUNICATIONS, NETWORKS, AND SYSTEMS, 2019, 303 : 261 - 274
  • [4] Using XACML for Embedded and Fine-Grained Access Control Policy
    Hsieh, George
    Foster, Keith
    Emamali, Gerald
    Patrick, Gregory
    Marvel, Lisa
    2009 INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY, AND SECURITY (ARES), VOLS 1 AND 2, 2009, : 462 - +
  • [5] Fine-Grained Access Control via Policy-Carrying Data
    Padget, Julian A.
    Vasconcelos, Wamberto W.
    ACM TRANSACTIONS ON INTERNET TECHNOLOGY, 2018, 18 (03)
  • [6] Access control inference and feedback for policy managers: A fine-grained analysis
    Vatsavai, Ranga. R.
    Chakravarthy, Sharma
    Mohania, Mukesh
    SEVENTH IEEE INTERNATIONAL WORKSHOP ON POLICIES FOR DISTRIBUTED SYSTEMS AND NETWORKS, PROCEEDINGS, 2006, : 35 - +
  • [7] Fine-grained access control policy in blockchain-enabled edge computing
    He, Guangxuan
    Li, Chunlin
    Shu, Yong
    Luo, Youlong
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2024, 221
  • [8] HTAC: Fine-Grained Policy-Hiding and Traceable Access Control in mHealth
    Li, Qi
    Zhang, Yinghui
    Zhang, Tao
    Huang, Haiping
    He, Yingjie
    Xiong, Jinbo
    IEEE ACCESS, 2020, 8 : 123430 - 123439
  • [9] Fine-Grained Access Control via XACML Policy Optimization in Cloud Computing
    Pei, Xin
    Yu, Huiqun
    Fan, Guisheng
    INTERNATIONAL JOURNAL OF SOFTWARE ENGINEERING AND KNOWLEDGE ENGINEERING, 2015, 25 (9-10) : 1709 - 1714
  • [10] A flexible fine-grained dynamic access control approach for cloud computing environment
    Saima Mehraj
    M. Tariq Banday
    Cluster Computing, 2021, 24 : 1413 - 1434