Access Control Policy Generation Method Based on Access Control Logs

被引:1
|
作者
Liu Aodi
Du Xuehui [1 ]
Wang Na
Shan Dibin
Zhang Liu
机构
[1] Informat Engn Univ, Zhengzhou 450001, Peoples R China
基金
中国国家自然科学基金;
关键词
Access control; Attribute-Based Access Control (ABAC); Policy generation; Attribute selection;
D O I
10.11999/JEIT200924
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
To overcome the policy generation problem faced by other access control mechanism in the process of migration to attribution-based access control mechanism, an access control policy generation method based on access control log is proposed. The recursive attribute elimination method is utilized to implement attribute selection. Based on information impurity, the attribute-permission relationship is extracted from the access control logs, and the result of entity attribute selection is combined to build the policy structure tree, so as to realize the policy generation of Attribute-Based Access Control (ABAC). In addition, an optimization algorithm based on binary search is designed to calculate quickly the parameters of the optimal policy generation. The experimental results show that only 32.56% of the attribute information in the original entity attribute set can be used to cover 95% of the permission in the log. The size of the policies is also reduced to 33.33% of the original size. The effectiveness of the scheme is proved.
引用
收藏
页码:324 / 331
页数:8
相关论文
共 21 条
  • [1] A Deep Learning Approach for Extracting Attributes of ABAC Policies
    Alohaly, Manar
    Takabi, Hassan
    Blanco, Eduardo
    [J]. SACMAT'18: PROCEEDINGS OF THE 23RD ACM SYMPOSIUM ON ACCESS CONTROL MODELS & TECHNOLOGIES, 2018, : 137 - 148
  • [2] [Anonymous], 2013, MARKET TRENDS CLOUD
  • [3] PRUCC-RM: Permission-Role-Usage Cardinality Constrained Role Mining
    Blundo, Carlo
    Cimato, Stelvio
    Siniscalchi, Luisa
    [J]. 2017 IEEE 41ST ANNUAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE (COMPSAC), VOL 2, 2017, : 149 - 154
  • [4] Toward edge minability for role mining in bipartite networks
    Dong, Lijun
    Wang, Yi
    Liu, Ran
    Pi, Benjie
    Wu, Liuyi
    [J]. PHYSICA A-STATISTICAL MECHANICS AND ITS APPLICATIONS, 2016, 462 : 274 - 286
  • [5] [房梁 Fang Liang], 2017, [计算机学报, Chinese Journal of Computers], V40, P1680
  • [6] Hu VC, 2014, National Institute of Standards and Technology Special Publication, V800, P162
  • [7] Feature clustering based support vector machine recursive feature elimination for gene selection
    Huang, Xiaojuan
    Zhang, Li
    Wang, Bangjun
    Li, Fanzhang
    Zhang, Zhao
    [J]. APPLIED INTELLIGENCE, 2018, 48 (03) : 594 - 607
  • [8] Mining Positive and Negative Attribute-Based Access Control Policy Rules
    Iyer, Padmavathi
    Masoumzadeh, Amirreza
    [J]. SACMAT'18: PROCEEDINGS OF THE 23RD ACM SYMPOSIUM ON ACCESS CONTROL MODELS & TECHNOLOGIES, 2018, : 161 - 172
  • [9] Karimi L, 2018, IEEE INT CONF BIG DA, P1427, DOI 10.1109/BigData.2018.8622037
  • [10] Machine Learning-Based Fast Intra Mode Decision for HEVC Screen Content Coding via Decision Trees
    Kuang, Wei
    Chan, Yui-Lam
    Tsang, Sik-Ho
    Siu, Wan-Chi
    [J]. IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2020, 30 (05) : 1481 - 1496