Secure Conflicts Avoidance in Multidomain Environments: A Distributed Approach

被引:15
|
作者
Yang, Benyuan [1 ]
Hu, Hesuan [1 ,2 ,3 ]
机构
[1] Xidian Univ, Sch Electromech Engn, Xian 710071, Peoples R China
[2] Nanyang Technol Univ, Coll Engn, Sch Comp Sci & Engn, Singapore 639798, Singapore
[3] Xi An Jiao Tong Univ, State Key Lab Mfg Syst Engn, Xian 710054, Peoples R China
来源
IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS | 2021年 / 51卷 / 09期
基金
中国国家自然科学基金;
关键词
IP networks; Organizations; Real-time systems; Blacklisting; Computational modeling; Distributed algorithm; multidomain; role inheritance violation (RIV); secure conflict resolution; separation of duty; CONTENT ACCESS-CONTROL; MULTI-DOMAINS; MODEL; INTEROPERATION; VERIFICATION; SEPARATION; WORKFLOW; DESIGN;
D O I
10.1109/TSMC.2019.2954589
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In a multidomain application environment, it is of paramount importance for different organizations to collaborate with each other to facilitate secure interoperation. However, various types of conflicts related to access control constraints may arise as a result of integrating access control policies for individual domains, such as role inheritance violations (RIVs) and separation of duty violations (SoDVs). Current methods solve the conflicts in a centralized way by withdrawing or removing all crossdomain relationships resulting in the violations with the knowledge of all domains. However, these methods are inappropriate for large-scale systems due to their high computational complexity. In this article, we propose a distributed approach to avoid secure conflicts in a multidomain environment. We first model the role inheritance hierarchies of multiple domains as an interoperation graph. We then develop RIVs and SoDVs avoidance algorithms based on the interoperation graph and the communications among different domains. Each domain can execute the algorithms autonomously and in real time by evaluating whether its succeeding activated role can result in RIVs and SoDVs. We show that the new algorithms perform well in contrast to the existing algorithms.
引用
收藏
页码:5478 / 5489
页数:12
相关论文
共 50 条
  • [41] A distributed approach for resource pricing in grid environments
    Weng, CL
    Lu, XD
    Deng, QN
    GRID AND COOPERATIVE COMPUTING, PT 2, 2004, 3033 : 620 - 627
  • [42] A hierarchical approach to formalization of distributed computing environments
    Kurkovsky, A
    ICWN'04 & PCC'04, VOLS, 1 AND 2, PROCEEDINGS, 2004, : 733 - 738
  • [43] A distributed optimization approach to ubiquitous display environments
    Heider, Thomas
    Giersich, Martin
    Kirste, Thomas
    PROCEEDINGS OF THE 18TH IASTED INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED COMPUTING AND SYSTEMS, 2006, : 407 - +
  • [44] An Approach to WebGL based Distributed Virtual Environments
    Zhang, Xiaoyu
    Gracanin, Denis
    WEB3D 2013: 18TH INTERNATIONAL CONFERENCE ON 3D WEB TECHNOLOGY, 2013, : 195 - 198
  • [45] Advance Reservation in Distributed Multidomain Networks
    Alazemi, Hamed M. K.
    Gu, Feng
    Xie, Chongyang
    Ghani, Nasir
    IEEE SYSTEMS JOURNAL, 2015, 9 (03): : 775 - 784
  • [46] Improving the Velocity Obstacle Approach for Obstacle Avoidance in Indoor Environments
    Alsaab, Ahmad
    Bicker, Robert
    2014 UKACC INTERNATIONAL CONFERENCE ON CONTROL (CONTROL), 2014, : 325 - 330
  • [47] A distributed queue approach to resource locations in broadband distributed computing environments
    Gabrani, G
    COMPUTER STANDARDS & INTERFACES, 2004, 27 (01) : 1 - 18
  • [48] Building Secure Resources to Ensure Safe Computations in Distributed and Potentially Corrupted Environments
    Varrette, Sebastien
    Roch, Jean-Louis
    Duc, Guillaume
    Keryell, Ronan
    EURO-PAR 2008 WORKSHOPS - PARALLEL PROCESSING, 2009, 5415 : 211 - +
  • [49] Harris Hawks Feature Selection in Distributed Machine Learning for Secure IoT Environments
    Hijazi, Neveen
    Aloqaily, Moayad
    Ouni, Bassem
    Karray, Fakhri
    Debbah, Merouane
    ICC 2023-IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, 2023, : 3169 - 3174
  • [50] Remote Mobile Screen (RMS): an approach for secure BYOD environments
    Ocano, Santiago Gimenez
    Ramamurthy, Byrav
    Wang, Yong
    2015 INTERNATIONAL CONFERENCE ON COMPUTING, NETWORKING AND COMMUNICATIONS (ICNC), 2015, : 52 - 56