A Nature-Inspired Framework for Optimal Mining of Attribute-Based Access Control Policies

被引:5
|
作者
Narouei, Masoud [1 ]
Takabi, Hassan [1 ]
机构
[1] Univ North Texas, Dept Comp Sci & Engn, Denton, TX 76203 USA
关键词
Access control policy; Attribute-based access control; Policy engineering; Particle swarm optimization; OPTIMIZATION;
D O I
10.1007/978-3-030-37231-6_29
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Even though attribute-based access control (ABAC) has been applied to address authorization in areas such as cloud and internet of things, implementing ABAC policies can become complex due to the high expressiveness of ABAC specifications. In order to semi-automate this process, several policy mining approaches have been proposed that mostly derive ABAC policies from access request logs. These approaches, however, do not take into account the existing ABAC policies and attempt to define all policies from scratch, which is not acceptable for an enterprise that already has an implemented ABAC system. Given basic assumptions on how access control configurations are generated, we first provide a formal definition of ABAC policy mining with minimal perturbation that fulfills the requirements that enterprises typically have. We then present an effective and efficient methodology based on particle swarm optimization algorithm for addressing the ABAC policy mining and ABAC policy mining with minimal perturbation problems. Experimental results demonstrate that the proposed methodology is able to generate much less complex policies than previous works using the same realistic case studies. Furthermore, we perform experiments on how to find an ABAC state as similar as possible to both the existing state and the optimal state.
引用
收藏
页码:489 / 506
页数:18
相关论文
共 50 条
  • [31] PolicyMorph: Interactive Policy Transformations for a Logical Attribute-Based Access Control Framework
    LeMay, Michael
    Fatemieh, Omid
    Gunter, Carl A.
    [J]. SACMAT'07: PROCEEDINGS OF THE 12TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES, 2007, : 205 - 214
  • [32] Monotonicity and Completeness in Attribute-Based Access Control
    Crampton, Jason
    Morisset, Charles
    [J]. SECURITY AND TRUST MANAGEMENT (STM 2014), 2014, 8743 : 33 - 48
  • [33] ABACaaS: Attribute-Based Access Control as a Service
    Meshram, Augustee
    Das, Saptarshi
    Sural, Shamik
    Vaidya, Jaideep
    Atluri, Vijayalakshmi
    [J]. PROCEEDINGS OF THE NINTH ACM CONFERENCE ON DATA AND APPLICATION SECURITY AND PRIVACY (CODASPY '19), 2019, : 153 - 155
  • [34] Combining Mandatory and Attribute-based Access Control
    Kerr, Lawrence
    Alves-Foss, Jim
    [J]. PROCEEDINGS OF THE 49TH ANNUAL HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES (HICSS 2016), 2016, : 2616 - 2623
  • [35] A contextual attribute-based access control model
    Covington, Michael J.
    Sastry, Manoj R.
    [J]. On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops, Pt 2, Proceedings, 2006, 4278 : 1996 - 2006
  • [36] Immediate attribute revocation in decentralized attribute-based access control
    Imine, Youcef
    Lounis, Ahmed
    Bouabdallah, Abdelmadjid
    [J]. 2017 16TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS / 11TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING / 14TH IEEE INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS, 2017, : 33 - 40
  • [37] A Framework for Attribute-Based Access Control in Processing Big Data with Multiple Sensitivities
    Tall, Anne M.
    Zou, Cliff C.
    [J]. APPLIED SCIENCES-BASEL, 2023, 13 (02):
  • [38] Authorization Recycling in Attribute-Based Access Control
    An Y.
    Helil N.
    [J]. Wireless Communications and Mobile Computing, 2023, 2023
  • [39] Monotonicity and completeness in attribute-based access control
    Crampton, Jason
    Morisset, Charles
    [J]. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2014, 8743 : 33 - 48
  • [40] Attribute-Based Messaging: Access Control and Confidentiality
    Bobba, Rakesh
    Fatemieh, Omid
    Khan, Fariba
    Khan, Arindam
    Gunter, Carl A.
    Khurana, Himanshu
    Prabhakaran, Manoj
    [J]. ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 2010, 13 (04)