Log2Policy: An Approach to Generate Fine-Grained Access Control Rules for Microservices from Scratch

被引:3
|
作者
Xu, Shaowen [1 ,2 ]
Zhou, Qihang [1 ]
Huang, Heqing [1 ]
Jia, Xiaoqi [1 ,2 ]
Du, Haichao [1 ]
Chen, Yang [1 ,2 ]
Xie, Yamin [1 ]
机构
[1] Chinese Acad Sci, Inst Informat Engn, Beijing, Peoples R China
[2] Univ Chinese Acad Sci, Sch Cyber Secur, Beijing, Peoples R China
基金
中国国家自然科学基金;
关键词
Microservice; Access Control; Access Log; Machine Learning;
D O I
10.1145/3627106.3627137
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Microservice application architecture is one of the most widely used service architectures in the industry. To prevent a compromised microservice from abusing other microservices, authorization policy is applied to regulate the access among them. However, configuring access control policy manually is challenging due to the complexity and dynamic nature of microservice applications. In this paper, we present Log2Policy, a novel approach to generate microservice authorization policy based on access logs. Our approach consists of three fundamental techniques: (1) a log-based topological graph generation mechanism that automatically infers the invocation logic among microservices, (2) a machine learning based attributes mining method that extracts the relevant attributes of requests, and (3) a policy upgrade mechanism based on traffic management that can significantly reduce the upgrade time. We have implemented a prototype of Log2Policy on mainstream microservice infrastructures and have evaluated it with several microservice applications. The results show that Log2Policy can generate fine-grained and effective access control rules and upgrade them with negligible overhead.
引用
收藏
页码:229 / 240
页数:12
相关论文
共 50 条
  • [31] Ciphertext-policy hierarchical attribute-based encryption for fine-grained access control of encryption data
    Liu, Ximeng
    Ma, Jianfeng
    Xiong, Jinbo
    Liu, Guangjun
    International Journal of Network Security, 2014, 16 (06) : 437 - 443
  • [32] Secure Fine-grained Attribute-based Access Control with Hidden Policy for Electronic Health Record System
    Ji, Sai
    Jin, Xin
    Lai, Jin-Feng
    Shen, Jian
    JOURNAL OF INTERNET TECHNOLOGY, 2020, 21 (04): : 941 - 948
  • [33] A Fine-Grained Access Control and Security Approach for Intelligent Vehicular Transport in 6G Communication System
    Zhou, Zhili
    Gaurav, Akshat
    Gupta, Brij Bhooshan
    Lytras, Miltiadis D.
    Razzak, Imran
    IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2022, 23 (07) : 9726 - 9735
  • [34] Key-Policy Attribute-Based Encryption With Switchable Attributes for Fine-Grained Access Control of Encrypted Data
    Luo, Fucai
    Wang, Haiyan
    Yan, Xingfu
    Wu, Jiahui
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2024, 19 : 7245 - 7258
  • [35] PM-ABE: Puncturable Bilateral Fine-Grained Access Control From Lattices for Secret Sharing
    Yang, Mengxue
    Wang, Huaqun
    He, Debiao
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2025, 22 (02) : 1210 - 1223
  • [36] Efficient revocable and grantable attribute-based encryption from lattices with fine-grained access control
    Wang, Shangping
    Zhang, Xia
    Zhang, Yaling
    IET INFORMATION SECURITY, 2018, 12 (02) : 141 - 149
  • [37] Partially-hiding functional encryption for degree-2 polynomials with fine-grained access control
    Haifeng Qian
    Cheng Lin
    Qiaohan Chu
    Jie Chen
    Frontiers of Computer Science, 2024, 18
  • [38] P-Hera: Scalable fine-grained access control for P2P infrastructures
    Crispo, B
    Sivasubramanian, S
    Mazzoleni, P
    Bertino, E
    11TH INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL I, PROCEEDINGS, 2005, : 585 - 591
  • [39] Partially-hiding functional encryption for degree-2 polynomials with fine-grained access control
    Qian, Haifeng
    Lin, Cheng
    Chu, Qiaohan
    Chen, Jie
    FRONTIERS OF COMPUTER SCIENCE, 2024, 18 (03)
  • [40] Secure, Efficient and Fine-Grained Data Access Control Mechanism for P2P Storage Cloud
    He, Heng
    Li, Ruixuan
    Dong, Xinhua
    Zhang, Zhao
    IEEE TRANSACTIONS ON CLOUD COMPUTING, 2014, 2 (04) : 471 - 484