Role-Based Access Control on Graph Databases

被引:2
|
作者
Chabin, Jacques [1 ]
Ciferri, Cristina D. A. [2 ]
Halfeld-Ferrari, Mirian [1 ]
Hara, Carmem S. [3 ]
Penteado, Raqueline R. M. [4 ]
机构
[1] Univ Orleans, LIFO EA, INSA CVL, Orleans, France
[2] Univ Sao Paulo, Sao Carlos, Brazil
[3] Univ Fed Parana, Curitiba, Parana, Brazil
[4] Univ Estadual Maringa, Maringa, Parana, Brazil
关键词
D O I
10.1007/978-3-030-67731-2_38
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
We propose a novel access control system for graph-based models, which supports schema constraints and constraint rules to protect the data, as well as user context rules. We consider systems with huge volumes of data, where the efficient processing of aggregation operations is of paramount importance. To comply with this goal, we introduce an architecture with modules for rewriting, planning and executing queries in parallel, respecting the access constraints. Performance tests show the efficiency of our distributed query processing mechanism. Compared to a centralized approach, it reduces execution time from 25% to 68% for conjunctive queries and from 12% to 59% for queries involving aggregation.
引用
收藏
页码:519 / 534
页数:16
相关论文
共 50 条
  • [1] Extending a Role Graph for Role-Based Access Control
    Asakura, Yoshiharu
    Nakamoto, Yukikazu
    [J]. IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2009, E92D (02): : 211 - 219
  • [2] On the interaction between role-based access control and relational databases
    Osborn, SL
    Reid, LK
    Wesson, GJ
    [J]. DATABASE SECURITY VOLUME X - STATUS AND PROSPECTS, 1997, : 275 - 287
  • [3] Cryptographically Enforced Role-Based Access Control for NoSQL Distributed Databases
    Shalabi, Yossif
    Gudes, Ehud
    [J]. DATA AND APPLICATIONS SECURITY AND PRIVACY XXXI, DBSEC 2017, 2017, 10359 : 3 - 19
  • [4] A formal model for Role-Based Access Control using graph transformation
    Koch, M
    Mancini, LV
    Parisi-Presicce, F
    [J]. COMPUTER SECURITY - ESORICS 2000, PROCEEDINGS, 2000, 1895 : 122 - 139
  • [5] Role-based access control and the access control matrix
    Saunders, G
    Hitchens, M
    Varadharajan, V
    [J]. INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2003, 2836 : 145 - 157
  • [6] Role-based access control in DCOM
    Ahn, GJ
    [J]. JOURNAL OF SYSTEMS ARCHITECTURE, 2000, 46 (13) : 1175 - 1184
  • [7] Role-Based Access Control in Retrospect
    Franqueira, Virginia N. L.
    Wieringa, Roel J.
    [J]. COMPUTER, 2012, 45 (06) : 81 - 88
  • [8] Delegation in role-based access control
    Jason Crampton
    Hemanth Khambhammettu
    [J]. International Journal of Information Security, 2008, 7 : 123 - 136
  • [9] Practical Role-Based Access Control
    Galante, Victoria
    [J]. INFORMATION SECURITY JOURNAL, 2009, 18 (02): : 64 - 73
  • [10] Delegation in role-based access control
    Crampton, Jason
    Khambhammettu, Hemanth
    [J]. INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2008, 7 (02) : 123 - 136