Log2Policy: An Approach to Generate Fine-Grained Access Control Rules for Microservices from Scratch

被引:3
|
作者
Xu, Shaowen [1 ,2 ]
Zhou, Qihang [1 ]
Huang, Heqing [1 ]
Jia, Xiaoqi [1 ,2 ]
Du, Haichao [1 ]
Chen, Yang [1 ,2 ]
Xie, Yamin [1 ]
机构
[1] Chinese Acad Sci, Inst Informat Engn, Beijing, Peoples R China
[2] Univ Chinese Acad Sci, Sch Cyber Secur, Beijing, Peoples R China
基金
中国国家自然科学基金;
关键词
Microservice; Access Control; Access Log; Machine Learning;
D O I
10.1145/3627106.3627137
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Microservice application architecture is one of the most widely used service architectures in the industry. To prevent a compromised microservice from abusing other microservices, authorization policy is applied to regulate the access among them. However, configuring access control policy manually is challenging due to the complexity and dynamic nature of microservice applications. In this paper, we present Log2Policy, a novel approach to generate microservice authorization policy based on access logs. Our approach consists of three fundamental techniques: (1) a log-based topological graph generation mechanism that automatically infers the invocation logic among microservices, (2) a machine learning based attributes mining method that extracts the relevant attributes of requests, and (3) a policy upgrade mechanism based on traffic management that can significantly reduce the upgrade time. We have implemented a prototype of Log2Policy on mainstream microservice infrastructures and have evaluated it with several microservice applications. The results show that Log2Policy can generate fine-grained and effective access control rules and upgrade them with negligible overhead.
引用
收藏
页码:229 / 240
页数:12
相关论文
共 50 条
  • [21] DECENT: Secure and fine-grained data access control with policy updating for constrained IoT devices
    Huang, Qinlong
    Wang, Licheng
    Yang, Yixian
    WORLD WIDE WEB-INTERNET AND WEB INFORMATION SYSTEMS, 2018, 21 (01): : 151 - 167
  • [22] Fine-grained user access control in ciphertext-policy attribute-based encryption
    Hur, Junbeom
    Park, Chanil
    Hwang, Seong Oun
    SECURITY AND COMMUNICATION NETWORKS, 2012, 5 (03) : 253 - 261
  • [23] An Efficient and Fine-Grained Big Data Access Control Scheme With Privacy-Preserving Policy
    Yang, Kan
    Han, Qi
    Li, Hui
    Kan, Zheng
    Zhou, Su
    Shen, Xuemin
    IEEE INTERNET OF THINGS JOURNAL, 2017, 4 (02): : 563 - 571
  • [24] Fine-grained flexible access control: ciphertext policy attribute based encryption for arithmetic circuits
    Mahdi MahdaviOliaee
    Zahra Ahmadian
    Journal of Computer Virology and Hacking Techniques, 2023, 19 : 515 - 528
  • [25] When Query Authentication Meets Fine-Grained Access Control: A Zero-Knowledge Approach
    Xu, Cheng
    Xu, Jianliang
    Hu, Haibo
    Au, Man Ho
    SIGMOD'18: PROCEEDINGS OF THE 2018 INTERNATIONAL CONFERENCE ON MANAGEMENT OF DATA, 2018, : 147 - 162
  • [26] A Secure Revocable Personal Health Record System With Policy-Based Fine-Grained Access Control
    Debnath, Mitu Kumar
    Samet, Saeed
    Vidyasankar, Krishnamurthy
    2015 THIRTEENTH ANNUAL CONFERENCE ON PRIVACY, SECURITY AND TRUST (PST), 2015, : 109 - 116
  • [27] Fine-grained data access control with attribute-hiding policy for cloud-based IoT
    Hao, Jialu
    Huang, Cheng
    Ni, Jianbing
    Rong, Hong
    Xian, Ming
    Shen, Xuemin
    COMPUTER NETWORKS, 2019, 153 : 1 - 10
  • [28] A Fine-grained Access Control Model with Enhanced Flexibility and On-chain Policy Execution for IoT Systems
    Pham, Hoang-Anh
    Do, Ngoc Nhuan
    Huynh-Tuong, Nguyen
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2023, 14 (06) : 83 - 93
  • [29] Reliable Policy Updating Under Efficient Policy Hidden Fine-Grained Access Control Framework for Cloud Data Sharing
    Ying, Zuobin
    Jiang, Wenjie
    Liu, Ximeng
    Xu, Shengmin
    Deng, Robert H.
    IEEE TRANSACTIONS ON SERVICES COMPUTING, 2022, 15 (06) : 3485 - 3498
  • [30] Secure Power Data Sharing with Fine-grained Control: A Multi-strategy Access Tree Approach
    Jiang, Zhuo Yun
    Zhang, Jia Wei
    Yang, Hao Jie
    Geng, Peng
    RADIOENGINEERING, 2024, 33 (04) : 704 - 712