Permission-Based Separation of Duty in Dynamic Role-Based Access Control Model

被引:18
|
作者
Aftab, Muhammad Umar [1 ]
Qin, Zhiguang [1 ]
Hundera, Negalign Wake [1 ]
Ariyo, Oluwasanmi [1 ]
Zakria [1 ]
Ngo Tung Son [2 ]
Dinh, Tran Van [3 ]
机构
[1] Univ Elect Sci & Technol China, Sch Informat & Software Engn, Chengdu 610054, Sichuan, Peoples R China
[2] FPT Univ, Comp Fundamental Dept, Hanoi 10000, Vietnam
[3] Univ Freiburg, Dept Comp Sci, D-79098 Freiburg, Germany
来源
SYMMETRY-BASEL | 2019年 / 11卷 / 05期
基金
中国国家自然科学基金;
关键词
Efficient SOD; Dynamic RBAC; Hybrid Access Control; Attributed RBAC; Permission based SOD; RBAC; VERIFICATION; ABAC;
D O I
10.3390/sym11050669
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
A major development in the field of access control is the dominant role-based access control (RBAC) scheme. The fascination of RBAC lies in its enhanced security along with the concept of roles. In addition, attribute-based access control (ABAC) is added to the access control models, which is famous for its dynamic behavior. Separation of duty (SOD) is used for enforcing least privilege concept in RBAC and ABAC. Moreover, SOD is a powerful tool that is used to protect an organization from internal security attacks and threats. Different problems have been found in the implementation of SOD at the role level. This paper discusses that the implementation of SOD on the level of roles is not a good option. Therefore, this paper proposes a hybrid access control model to implement SOD on the basis of permissions. The first part of the proposed model is based on the addition of attributes with dynamic characteristics in the RBAC model, whereas the second part of the model implements the permission-based SOD in dynamic RBAC model. Moreover, in comparison with previous models, performance and feature analysis are performed to show the strength of dynamic RBAC model. This model improves the performance of the RBAC model in terms of time, dynamicity, and automatic permissions and roles assignment. At the same time, this model also reduces the administrator's load and provides a flexible, dynamic, and secure access control model.
引用
收藏
页数:24
相关论文
共 50 条
  • [1] Analysis of enhanced separation of duty in role-based access control model
    Zhang, ZK
    Geng, YP
    Li, TY
    Xiao, JG
    [J]. Proceedings of the 11th Joint International Computer Conference, 2005, : 69 - 72
  • [2] Permission Based Implementation of Dynamic Separation of Duty (DSD) in Role Based Access Control (RBAC)
    Habib, Muhammad Asif
    Mahmood, Nasir
    Shahid, Muhammad
    Aftab, Muhammad Umar
    Ahmad, Uzair
    Faisal, Ch. Muhammad Nadeem
    [J]. 2014 8TH INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING AND COMMUNICATION SYSTEMS (ICSPCS), 2014,
  • [3] Applications of the oriented permission role-based access control model
    Chen, Liang
    Crampton, Jason
    [J]. 2007 IEEE INTERNATIONAL PERFORMANCE COMPUTING AND COMMUNICATIONS CONFERENCE, VOLS 1 AND 2, 2007, : 387 - +
  • [4] Reliability of separation of duty in ANSI standard role-based access control
    Esna-Ashari, M.
    Rabiee, H. R.
    Mirian-Hosseinabadi, S. H.
    [J]. SCIENTIA IRANICA, 2011, 18 (06) : 1416 - 1424
  • [5] Permission and role automatic assigning of user in role-based access control
    韩道军
    卓汉逵
    夏兰亭
    李磊
    [J]. Journal of Central South University, 2012, 19 (04) : 1049 - 1056
  • [6] Permission and role automatic assigning of user in role-based access control
    Han Dao-jun
    Zhuo Han-kui
    Xia Lan-ting
    Li Lei
    [J]. JOURNAL OF CENTRAL SOUTH UNIVERSITY, 2012, 19 (04) : 1049 - 1056
  • [7] Permission and role automatic assigning of user in role-based access control
    Dao-jun Han
    Han-kui Zhuo
    Lan-ting Xia
    Lei Li
    [J]. Journal of Central South University, 2012, 19 : 1049 - 1056
  • [8] Advanced permission-role relationship in role-based access control
    Li, Min
    Wang, Hua
    Plank, Ashley
    Yong, Jianming
    [J]. INFORMATION SECURITY AND PRIVACY, 2008, 5107 : 391 - +
  • [9] Separation of duty in role-based environments
    Simon, RT
    Zurko, ME
    [J]. 10TH COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS, 1997, : 183 - 194
  • [10] Combination of Duty and Historical Constraints in Role-Based Access Control
    Hosseini, Ali
    Azgomi, Mohammad Abdollahi
    [J]. 2009 INTERNATIONAL CONFERENCE ON INNOVATIONS IN INFORMATION TECHNOLOGY, 2009, : 156 - +