A legal information flow (LIF) scheduler based on role-based access control model

被引:29
|
作者
Enokido, Tomoya [1 ]
Barolli, Valbona [2 ]
Takizawa, Makoto [2 ]
机构
[1] Rissho Univ, Fac Business Adm, Shinagawa Ku, Tokyo 1418602, Japan
[2] Tokyo Denki Univ, Dept Syst & Comp Engn, Hiki, Saitama 3500394, Japan
关键词
Information flow; Role-based access control model; Concurrency control; Security; Transaction;
D O I
10.1016/j.csi.2008.03.013
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Information systems have to be consistent and secure in presence of multiple conflicting transactions. The role-based access control (RBAC) model is widely used to keep information systems consistent and secure. A role shows a job function in an enterprise and is a set of access rights (permissions). Here, a subject s is allowed to issue a method op to an object o only if an access right < o, op > is included in the roles granted to the subject s. A subject is granted one or more than one role and issues a transaction to multiple objects. The transaction is assigned with some roles of the subject which is referred to as purpose. Even if every access request issued by every subject is authorized in the roles, illegal information flow might occur as well known confinement problem. In this paper, we define a legal information flow (LIF) relation (R-1 <=(1) R-2) among a pair of role families R-1 and R-2 to prevent illegal information flow. Here, an LIF relation R-1 <=(1) R-2 shows that no illegal information flow occur if a transaction T-1 with a role family R-1 is performed prior to another transaction T-2 with a role family R-2. In addition, it is significant to discuss which transaction to be performed prior to another transaction if the both transactions manipulate the same object in a conflicting way. In this paper, we define a significantly precedent relation R-1 <=(1) R-2 among role families R-1 and R-2 which implies that the role family R-2 is more significant than R-1. Suppose a pair of transactions T-1 and T-2 with role families R-1 and R-2 issue conflicting methods op(1) and op(2), respectively, to an object o. If R-1 <=(s) R-2, op(2) is performed on the object o prior to op(1). The more significant a transaction is, the more prior it is performed. We discuss a legal information flow (LIF) scheduler to synchronize transactions so as to prevent illegal information flow and to serialize conflicting methods from multiple transactions in terms of significancy and information flow relation of roles families. We evaluate the LIF scheduler in terms of how much illegal information flow can be prevented compared with the other scheduler. (C) 2008 Published by Elsevier B.V.
引用
收藏
页码:906 / 912
页数:7
相关论文
共 50 条
  • [1] Preventing Illegal Information Flow Based on Role-Based Access Control Model
    Enokido, Toaloya
    Takizawa, Makoto
    [J]. NETWORK-BASED INFORMATION SYSTEMS, PROCEEDINGS, 2008, 5186 : 242 - +
  • [2] Information flow control among objects in role-based access control model
    Izaki, K
    Tanaka, K
    Takizawa, M
    [J]. DATABASE AND EXPERT SYSTEMS APPLICATIONS, 2001, 2113 : 299 - 308
  • [3] A role-based access control model for information mediation
    Yang, L
    Ege, RK
    Ezenwoye, O
    Kharma, Q
    [J]. PROCEEDINGS OF THE 2004 IEEE INTERNATIONAL CONFERENCE ON INFORMATION REUSE AND INTEGRATION (IRI-2004), 2004, : 277 - 282
  • [4] Information flow control in role-based model for distributed objects
    Izaki, K
    Tanaka, K
    Takizawa, M
    [J]. PROCEEDINGS OF THE EIGHTH INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED SYSTEMS, 2001, : 363 - 370
  • [5] A Synchronization Protocol to Prevent Illegal Information Flow Based on Maximal Roles in the Role-Based Access Control Model
    Hayashi, Shohei
    Nakamura, Shigenari
    Duolikun, Dilawaer
    Enokido, Tomoya
    Takizawa, Makoto
    [J]. ADVANCES ON BROADBAND AND WIRELESS COMPUTING, COMMUNICATION AND APPLICATIONS, BWCCA-2018, 2019, 25 : 525 - 533
  • [6] Role-based Information Flow Control Models
    Nakamura, Shigenari
    Doulikun, Dilewaer
    Aikebaier, Ailixier
    Enokido, Tomoya
    Takizawa, Makoto
    [J]. 2014 IEEE 28TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS (AINA), 2014, : 1140 - 1147
  • [7] Role-based access control model for GIS
    Pan, Yuqing
    Sheng, Yehua
    Zhou, Jieyu
    [J]. GEOINFORMATICS 2007: GEOSPATIAL INFORMATION TECHNOLOGY AND APPLICATIONS, PTS 1 AND 2, 2007, 6754
  • [8] A Role-Based Workflow Access Control Model
    Zhang Wen-dong
    Zhang Kai-ji
    [J]. PROCEEDINGS OF THE FIRST INTERNATIONAL WORKSHOP ON EDUCATION TECHNOLOGY AND COMPUTER SCIENCE, VOL II, 2009, : 1136 - 1139
  • [9] APPLICATION OF ROLE-BASED ACCESS CONTROL IN INFORMATION SYSTEM
    Zhu, Rui-Feng
    Ning, Jie
    Yu, Pei
    [J]. 2012 INTERNATIONAL CONFERENCE ON WAVELET ACTIVE MEDIA TECHNOLOGY AND INFORMATION PROCESSING (LCWAMTIP), 2012, : 426 - 428
  • [10] A legal information flow (LIF) scheduler for distributed systems
    Enokido, Tomoya
    Takizawa, Makoto
    [J]. 2007 INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED SYSTEMS, VOLS 1 AND 2, 2007, : 829 - +