A Nature-Inspired Framework for Optimal Mining of Attribute-Based Access Control Policies

被引:5
|
作者
Narouei, Masoud [1 ]
Takabi, Hassan [1 ]
机构
[1] Univ North Texas, Dept Comp Sci & Engn, Denton, TX 76203 USA
关键词
Access control policy; Attribute-based access control; Policy engineering; Particle swarm optimization; OPTIMIZATION;
D O I
10.1007/978-3-030-37231-6_29
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Even though attribute-based access control (ABAC) has been applied to address authorization in areas such as cloud and internet of things, implementing ABAC policies can become complex due to the high expressiveness of ABAC specifications. In order to semi-automate this process, several policy mining approaches have been proposed that mostly derive ABAC policies from access request logs. These approaches, however, do not take into account the existing ABAC policies and attempt to define all policies from scratch, which is not acceptable for an enterprise that already has an implemented ABAC system. Given basic assumptions on how access control configurations are generated, we first provide a formal definition of ABAC policy mining with minimal perturbation that fulfills the requirements that enterprises typically have. We then present an effective and efficient methodology based on particle swarm optimization algorithm for addressing the ABAC policy mining and ABAC policy mining with minimal perturbation problems. Experimental results demonstrate that the proposed methodology is able to generate much less complex policies than previous works using the same realistic case studies. Furthermore, we perform experiments on how to find an ABAC state as similar as possible to both the existing state and the optimal state.
引用
收藏
页码:489 / 506
页数:18
相关论文
共 50 条
  • [1] Mining Attribute-Based Access Control Policies
    Davari, Maryam
    Zulkernine, Mohammad
    [J]. INFORMATION SYSTEMS SECURITY, ICISS 2022, 2022, 13784 : 186 - 201
  • [2] Mining Attribute-Based Access Control Policies
    Xu, Zhongyuan
    Stoller, Scott D.
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2015, 12 (05) : 533 - 545
  • [3] Mining Attribute-Based Access Control Policies from RBAC Policies
    Xu, Zhongyuan
    Stoller, Scott D.
    [J]. 2013 10TH INTERNATIONAL CONFERENCE AND EXPO ON EMERGING TECHNOLOGIES FOR A SMARTER WORLD (CEWIT), 2013,
  • [4] Mining Attribute-Based Access Control Policies from Logs
    Xu, Zhongyuan
    Stoller, Scott D.
    [J]. DATA AND APPLICATIONS SECURITY AND PRIVACY XXVIII, 2014, 8566 : 276 - 291
  • [5] VisMAP: Visual Mining of Attribute-Based Access Control Policies
    Das, Saptarshi
    Sural, Shamik
    Vaidya, Jaideep
    Atluri, Vijayalakshmi
    Rigoll, Gerhard
    [J]. INFORMATION SYSTEMS SECURITY (ICISS 2019), 2019, 11952 : 79 - 98
  • [6] Polisma - A Framework for Learning Attribute-Based Access Control Policies
    Abu Jabal, Amani
    Bertino, Elisa
    Lobo, Jorge
    Law, Mark
    Russo, Alessandra
    Calo, Seraphin
    Verma, Dinesh
    [J]. COMPUTER SECURITY - ESORICS 2020, PT I, 2020, 12308 : 523 - 544
  • [7] Deconflicting policies in attribute-based access control systems
    Yahiaoui, Mohamed
    Zinedine, Ahmed
    Harti, Mostafa
    [J]. 2018 IEEE 5TH INTERNATIONAL CONGRESS ON INFORMATION SCIENCE AND TECHNOLOGY (IEEE CIST'18), 2018, : 130 - 136
  • [8] Attribute-based access control policies composition algebra
    Lin, Li
    Huai, Jin-Peng
    Li, Xian-Xian
    [J]. Ruan Jian Xue Bao/Journal of Software, 2009, 20 (02): : 403 - 414
  • [9] Evolutionary Inference of Attribute-Based Access Control Policies
    Medvet, Eric
    Bartoli, Alberto
    Carminati, Barbara
    Ferrari, Elena
    [J]. EVOLUTIONARY MULTI-CRITERION OPTIMIZATION, PT I, 2015, 9018 : 351 - 365
  • [10] On the Feasibility of Attribute-Based Access Control Policy Mining
    Chakraborty, Shuvra
    Sandhu, Ravi
    Krishnan, Ram
    [J]. 2019 IEEE 20TH INTERNATIONAL CONFERENCE ON INFORMATION REUSE AND INTEGRATION FOR DATA SCIENCE (IRI 2019), 2019, : 245 - 252