XACML Extension for Graphs: Flexible Authorization Policy Specification and Datastore-Independent Enforcement

被引:0
|
作者
Mohamed, Aya [1 ,2 ]
Auer, Dagmar [1 ,2 ]
Hofer, Daniel [1 ,2 ]
Kueng, Josef [1 ,2 ]
机构
[1] Johannes Kepler Univ Linz, Inst Applicat Oriented Knowledge Proc, Linz, Austria
[2] Johannes Kepler Univ Linz, LIT Secure & Correct Syst Lab, Linz, Austria
关键词
Access Control; Authorization Policy; Graph-Structured Data; Graph Database; Cypher; Neo4j; XACML;
D O I
10.5220/0012090000003555
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The increasing use of graph-structured data for business- and privacy-critical applications requires sophisticated, flexible and fine-grained authorization and access control. Currently, role-based access control is supported in graph databases, where access to objects is restricted via roles. This does not take special properties of graphs into account, such as vertices and edges along the path between a given subject and resource. In our previous research iterations, we started to design an authorization policy language and access control model, which considers the specification of graph paths and enforces them in the multi-model database ArangoDB. Since this approach is promising to consider graph characteristics in data protection, we improve the language in this work to provide flexible path definitions and specifying edges as protected resources. Furthermore, we introduce a method for a datastore-independent policy enforcement. Besides discussing the latest work in our XACML4G model, which is an extension to the Extensible Access Control Markup Language (XACML), we demonstrate our prototypical implementation with a real case giving an outlook on performance.
引用
收藏
页码:442 / 449
页数:8
相关论文
共 2 条
  • [1] Specification and enforcement of flexible security policy for active cooperation
    Sun, Yuqing
    Gong, Bin
    Meng, Xiangxu
    Lin, Zongkai
    Bertino, Elisa
    [J]. INFORMATION SCIENCES, 2009, 179 (15) : 2629 - 2642
  • [2] Authorization Policy Specification and Enforcement for Group-Centric Secure Information Sharing
    Krishnan, Ram
    Sandhu, Ravi
    [J]. INFORMATION SYSTEMS SECURITY, 2011, 7093 : 102 - 115