Secure Conflicts Avoidance in Multidomain Environments: A Distributed Approach

被引:15
|
作者
Yang, Benyuan [1 ]
Hu, Hesuan [1 ,2 ,3 ]
机构
[1] Xidian Univ, Sch Electromech Engn, Xian 710071, Peoples R China
[2] Nanyang Technol Univ, Coll Engn, Sch Comp Sci & Engn, Singapore 639798, Singapore
[3] Xi An Jiao Tong Univ, State Key Lab Mfg Syst Engn, Xian 710054, Peoples R China
来源
IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS | 2021年 / 51卷 / 09期
基金
中国国家自然科学基金;
关键词
IP networks; Organizations; Real-time systems; Blacklisting; Computational modeling; Distributed algorithm; multidomain; role inheritance violation (RIV); secure conflict resolution; separation of duty; CONTENT ACCESS-CONTROL; MULTI-DOMAINS; MODEL; INTEROPERATION; VERIFICATION; SEPARATION; WORKFLOW; DESIGN;
D O I
10.1109/TSMC.2019.2954589
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In a multidomain application environment, it is of paramount importance for different organizations to collaborate with each other to facilitate secure interoperation. However, various types of conflicts related to access control constraints may arise as a result of integrating access control policies for individual domains, such as role inheritance violations (RIVs) and separation of duty violations (SoDVs). Current methods solve the conflicts in a centralized way by withdrawing or removing all crossdomain relationships resulting in the violations with the knowledge of all domains. However, these methods are inappropriate for large-scale systems due to their high computational complexity. In this article, we propose a distributed approach to avoid secure conflicts in a multidomain environment. We first model the role inheritance hierarchies of multiple domains as an interoperation graph. We then develop RIVs and SoDVs avoidance algorithms based on the interoperation graph and the communications among different domains. Each domain can execute the algorithms autonomously and in real time by evaluating whether its succeeding activated role can result in RIVs and SoDVs. We show that the new algorithms perform well in contrast to the existing algorithms.
引用
收藏
页码:5478 / 5489
页数:12
相关论文
共 50 条
  • [1] Secure Interoperation in Multidomain Environments Employing UCON Policies
    Lu, Jianfeng
    Li, Ruixuan
    Varadharajan, Vijay
    Lu, Zhengding
    Ma, Xiaopu
    INFORMATION SECURITY, PROCEEDINGS, 2009, 5735 : 395 - +
  • [2] A Demonstration of Approach and Avoidance Conflicts
    Terry, W. Scott
    TEACHING OF PSYCHOLOGY, 2010, 37 (02) : 132 - 134
  • [3] RESOLUTION OF APPROACH-APPROACH AND AVOIDANCE-AVOIDANCE CONFLICTS
    ARKOFF, A
    JOURNAL OF ABNORMAL AND SOCIAL PSYCHOLOGY, 1957, 55 (03): : 402 - 404
  • [4] Secure access control in multidomain environments and formal analysis of model specifications
    Nazerian, Fatemeh
    Motameni, Homayun
    Nematzadeh, Hossein
    TURKISH JOURNAL OF ELECTRICAL ENGINEERING AND COMPUTER SCIENCES, 2018, 26 (05) : 2525 - 2540
  • [5] Secure delegation for distributed object environments
    Nagaratnam, N
    Lea, D
    PROCEEDINGS OF THE FOURTH USENIX CONFERENCE ON OBJECT-ORIENTED TECHNOLOGIES AND SYSTEMS: COOTS, 1998, : 101 - 115
  • [6] A collaborative approach in secure environments
    Lamb, Rebecca
    Plummer, Vicki
    Wyper, Shirley
    INTERNATIONAL JOURNAL OF MENTAL HEALTH NURSING, 2010, 19 : A25 - A25
  • [7] Secure Data Storage in Distributed Cloud Environments
    Jordao, Renata
    Martins, Valerio Aymore
    Buiati, Fabio
    de Sousa Junior, Rafael Timoteo
    de Deus, Flavio Elias
    2014 IEEE INTERNATIONAL CONFERENCE ON BIG DATA (BIG DATA), 2014,
  • [8] Secure and distributed knowledge management in pervasive environments
    Malatras, A
    Pavlou, G
    Belsis, P
    Gritzalis, S
    Skourlas, C
    Chalaris, I
    INTERNATIONAL CONFERENCE ON PERVASIVE SERVICES 2005, PROCEEDINGS, 2005, : 79 - 87
  • [9] A secure file sharing service for distributed computing environments
    Castiglione, Aniello
    Catuogno, Luigi
    Del Sorbo, Aniello
    Fiore, Ugo
    Palmieri, Francesco
    JOURNAL OF SUPERCOMPUTING, 2014, 67 (03): : 691 - 710
  • [10] SDRP: a secure distributed revocation protocol for vehicular environments
    Chaib, Noureddine
    Lagraa, Nasreddine
    Yagoubi, Mohamed Bachir
    Lakas, Abderrahmane
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (04) : 279 - 289