Secure Conflicts Avoidance in Multidomain Environments: A Distributed Approach

被引:15
|
作者
Yang, Benyuan [1 ]
Hu, Hesuan [1 ,2 ,3 ]
机构
[1] Xidian Univ, Sch Electromech Engn, Xian 710071, Peoples R China
[2] Nanyang Technol Univ, Coll Engn, Sch Comp Sci & Engn, Singapore 639798, Singapore
[3] Xi An Jiao Tong Univ, State Key Lab Mfg Syst Engn, Xian 710054, Peoples R China
来源
IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS | 2021年 / 51卷 / 09期
基金
中国国家自然科学基金;
关键词
IP networks; Organizations; Real-time systems; Blacklisting; Computational modeling; Distributed algorithm; multidomain; role inheritance violation (RIV); secure conflict resolution; separation of duty; CONTENT ACCESS-CONTROL; MULTI-DOMAINS; MODEL; INTEROPERATION; VERIFICATION; SEPARATION; WORKFLOW; DESIGN;
D O I
10.1109/TSMC.2019.2954589
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In a multidomain application environment, it is of paramount importance for different organizations to collaborate with each other to facilitate secure interoperation. However, various types of conflicts related to access control constraints may arise as a result of integrating access control policies for individual domains, such as role inheritance violations (RIVs) and separation of duty violations (SoDVs). Current methods solve the conflicts in a centralized way by withdrawing or removing all crossdomain relationships resulting in the violations with the knowledge of all domains. However, these methods are inappropriate for large-scale systems due to their high computational complexity. In this article, we propose a distributed approach to avoid secure conflicts in a multidomain environment. We first model the role inheritance hierarchies of multiple domains as an interoperation graph. We then develop RIVs and SoDVs avoidance algorithms based on the interoperation graph and the communications among different domains. Each domain can execute the algorithms autonomously and in real time by evaluating whether its succeeding activated role can result in RIVs and SoDVs. We show that the new algorithms perform well in contrast to the existing algorithms.
引用
收藏
页码:5478 / 5489
页数:12
相关论文
共 50 条
  • [31] Miller (1944) revisited: Movement times in relation to approach and avoidance conflicts
    Boyd, Ryan L.
    Robinson, Michael D.
    Fetterman, Adam K.
    JOURNAL OF EXPERIMENTAL SOCIAL PSYCHOLOGY, 2011, 47 (06) : 1192 - 1197
  • [32] Secure Data Broadcasting using Privacy Preservation Techniques in Distributed Environments
    Nikam, Rohit Ravindra
    Shahapurkar, Reksha
    JOURNAL OF ALGEBRAIC STATISTICS, 2022, 13 (02) : 1689 - 1698
  • [33] A secure protocol for computing dot-products in clustered and distributed environments
    Ioannidis, I
    Grama, A
    Atallah, M
    2002 INTERNATIONAL CONFERENCE ON PARALLEL PROCESSING, PROCEEDING, 2002, : 379 - 384
  • [34] A Secure Group Communication Approach for Tactical Network Environments
    Poltronieri, Filippo
    Fronteddu, Roberto
    Stefanelli, Cesare
    Suri, Niranjan
    Tortonesi, Mauro
    Paulini, Matthew
    Milligan, James
    2018 INTERNATIONAL CONFERENCE ON MILITARY COMMUNICATIONS AND INFORMATION SYSTEMS (ICMCIS), 2018,
  • [35] Collision and Deadlock Avoidance in Multirobot Systems: A Distributed Approach
    Zhou, Yuan
    Hu, Hesuan
    Liu, Yang
    Ding, Zuohua
    IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS, 2017, 47 (07): : 1712 - 1726
  • [36] Secure sharing of industrial IoT data based on distributed trust management and trusted execution environments: a federated learning approach
    Zheng, Wei
    Cao, Yang
    Tan, Haining
    NEURAL COMPUTING & APPLICATIONS, 2023, 35 (29): : 21499 - 21509
  • [37] Secure sharing of industrial IoT data based on distributed trust management and trusted execution environments: a federated learning approach
    Wei Zheng
    Yang Cao
    Haining Tan
    Neural Computing and Applications, 2023, 35 : 21499 - 21509
  • [38] A secure approach to distributed internet-enabled metrology
    Sand, Asmund
    Slinde, Harald
    Fjeldly, Tor A.
    IEEE TRANSACTIONS ON INSTRUMENTATION AND MEASUREMENT, 2007, 56 (05) : 1979 - 1985
  • [39] A distributed intrusion detection approach for secure software architecture
    Inverardi, P
    Mostarda, L
    SOFTWARE ARCHITECTURE, PROCEEDINGS, 2005, 3527 : 168 - 184
  • [40] A secure query assurance approach for distributed health records
    Clarke, Andrew
    Steele, Robert
    HEALTH SYSTEMS, 2014, 3 (01) : 60 - 73