Skip to main content

2022 | OriginalPaper | Buchkapitel

A Comprehensive Framework Integrating Attribute-Based Access Control and Privacy Protection Models

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

NoSQL databases have recently become increasingly popular as data platforms for big data and real-time web applications. Due to the simplicity in design but effectiveness in horizontal scaling and performance, NoSQL databases can be a better alternative approach in comparison with traditional relational databases. However, the lack of a fine-grained access control system together with a data privacy protection mechanism is one of the most important issues in NoSQL databases. In this paper, we investigate the attribute based access control model (ABAC) and use it as the main access control system in NoSQL databases. Moreover, we propose and implement a comprehensive framework for enforcing attribute-based security policies stored in JSON document together with a data privacy protection mechanism in the fine-grained level. We use Polish notation for modeling conditional expressions (i.e., the combination of subject, resource, and environment attributes) so that ABAC policies can be flexible, dynamic and fine grained. Moreover, for data privacy protection, privacy rules of the policies are constrained not only by access and intended purpose but also by subject, resource, and environment attributes as well as data disclosure level. The experiment is carried out to show the relationship between the processing time for access decision together with the privacy protection mechanism and the complexity of access and privacy policies.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Literatur
2.
Zurück zum Zitat Bertino, E., Ghinita, G., Kamra, A.: Access Control for Databases: Concepts and Systems Bertino, E., Ghinita, G., Kamra, A.: Access Control for Databases: Concepts and Systems
3.
Zurück zum Zitat Hu, V.C., et al.: Now Publishers, Hanover (2011) Hu, V.C., et al.: Now Publishers, Hanover (2011)
4.
Zurück zum Zitat Sandlin, K., Miller, R., Scarfone, K.: Guide to attribute-based access control (ABAC) definition and considerations (draft). NIST Spec. Publ. 800, 162 (2013) Sandlin, K., Miller, R., Scarfone, K.: Guide to attribute-based access control (ABAC) definition and considerations (draft). NIST Spec. Publ. 800, 162 (2013)
5.
Zurück zum Zitat Byun, J.W., Li, N.: Purpose-based access control for privacy protection in relational database systems. VLDB J. 17(4), 603–619 (2008)CrossRef Byun, J.W., Li, N.: Purpose-based access control for privacy protection in relational database systems. VLDB J. 17(4), 603–619 (2008)CrossRef
6.
Zurück zum Zitat Colombo, P., Ferrari, E.: Enforcement of purpose-based access control within relational database management systems. IEEE Trans. Knowl. Data Eng. 26(11), 2703–2716 (2014)CrossRef Colombo, P., Ferrari, E.: Enforcement of purpose-based access control within relational database management systems. IEEE Trans. Knowl. Data Eng. 26(11), 2703–2716 (2014)CrossRef
7.
Zurück zum Zitat Rissanen, E.: eXtensible Access Control Markup Language (XACML) Version 3.0 Rissanen, E.: eXtensible Access Control Markup Language (XACML) Version 3.0
9.
Zurück zum Zitat Hua, L.S., Varadharajan, V.: Purpose-based access control policies and conflicting analysis. Security and Privacy – Silver Linings in the Cloud. 217–228 (2010) Hua, L.S., Varadharajan, V.: Purpose-based access control policies and conflicting analysis. Security and Privacy – Silver Linings in the Cloud. 217–228 (2010)
11.
Zurück zum Zitat InterNational Committee for Information Technology Standards: Information technology – Next Generation Access Control – Generic Operations and Data Structures (2015) InterNational Committee for Information Technology Standards: Information technology – Next Generation Access Control – Generic Operations and Data Structures (2015)
16.
Zurück zum Zitat Sandhu, R., Coyne, E., Feinstein, H., Youmann, C.: Role-based access control models. IEEE Computer 2(29), 38–47 (1996)CrossRef Sandhu, R., Coyne, E., Feinstein, H., Youmann, C.: Role-based access control models. IEEE Computer 2(29), 38–47 (1996)CrossRef
17.
Zurück zum Zitat ISO/IEC DIS 10181–3: Information Technology, OSI Security Model, Security Frameworks, Part 3: Access Control (1993) ISO/IEC DIS 10181–3: Information Technology, OSI Security Model, Security Frameworks, Part 3: Access Control (1993)
18.
Zurück zum Zitat Hu, V.C., et al.: Guide to Attribute-Based Access Control (ABAC) Definition and Considerations (draft). NIST Special Publication. 800(162) (2013) Hu, V.C., et al.: Guide to Attribute-Based Access Control (ABAC) Definition and Considerations (draft). NIST Special Publication. 800(162) (2013)
19.
Zurück zum Zitat Hu, V.C., Kuhn, D.R., Ferraiolo, D.F.: Attribute-based access control. IEEE Computer 48(2), 85–88 (2015)CrossRef Hu, V.C., Kuhn, D.R., Ferraiolo, D.F.: Attribute-based access control. IEEE Computer 48(2), 85–88 (2015)CrossRef
20.
Zurück zum Zitat Huang, J., Nicol, D.M., Bobba, R., Huh, J.H.: A framework integrating attribute-based policies into role-based access control. In: Proceedings of the 17th ACM symposium on access control models and technologies, pp. 187–196. ACM (2012) Huang, J., Nicol, D.M., Bobba, R., Huh, J.H.: A framework integrating attribute-based policies into role-based access control. In: Proceedings of the 17th ACM symposium on access control models and technologies, pp. 187–196. ACM (2012)
21.
Zurück zum Zitat Jin, X., Krishnan, R., Sandhu, R.: A unified attribute-based access control model covering DAC, MAC, and RBAC. In: IFIP Annual Conference on Data and Applications Security and Privacy, pp. 41–55. Springer (2012) Jin, X., Krishnan, R., Sandhu, R.: A unified attribute-based access control model covering DAC, MAC, and RBAC. In: IFIP Annual Conference on Data and Applications Security and Privacy, pp. 41–55. Springer (2012)
22.
Zurück zum Zitat Westin, A.F.: Privacy and Freedom, vol 7. Atheneum, New York (1967) Westin, A.F.: Privacy and Freedom, vol 7. Atheneum, New York (1967)
23.
Zurück zum Zitat Byun, J.W., Bertino, E., Li, N.: Purpose based access control of complex data for privacy protection. In: Proceedings of the Tenth ACM Symposium on Access Control Models and Technologies, pp. 102–110. ACM (2005) Byun, J.W., Bertino, E., Li, N.: Purpose based access control of complex data for privacy protection. In: Proceedings of the Tenth ACM Symposium on Access Control Models and Technologies, pp. 102–110. ACM (2005)
24.
Zurück zum Zitat Byun, J.W., Li, N.: Purpose based access control for privacy protection in relational database systems. VLDB J. 17(4), 603–619 (2008)CrossRef Byun, J.W., Li, N.: Purpose based access control for privacy protection in relational database systems. VLDB J. 17(4), 603–619 (2008)CrossRef
25.
Zurück zum Zitat Kabir, M.E., Wang, H.: Conditional purpose based access control model for privacy protection. In: Proceedings of the twentieth australasian conference on australasian database, vol 92, pp 135–142. Australian Computer Society Inc. (2009) Kabir, M.E., Wang, H.: Conditional purpose based access control model for privacy protection. In: Proceedings of the twentieth australasian conference on australasian database, vol 92, pp 135–142. Australian Computer Society Inc. (2009)
26.
Zurück zum Zitat Wang, H., Sun, L., Bertino, E.: Building access control policy model for privacy-preserving and testing policy connecting problems. J. Comput. Syst. Sci. 80(8), 1493–1503 (2014)CrossRef Wang, H., Sun, L., Bertino, E.: Building access control policy model for privacy-preserving and testing policy connecting problems. J. Comput. Syst. Sci. 80(8), 1493–1503 (2014)CrossRef
27.
Zurück zum Zitat Kabir, M.E., Wang, H., Bertino, E.: A role-involved conditional purpose-based access control model. In: E-Government, E-Services and Global Processes, pp. 167–180. Springer (2010) Kabir, M.E., Wang, H., Bertino, E.: A role-involved conditional purpose-based access control model. In: E-Government, E-Services and Global Processes, pp. 167–180. Springer (2010)
Metadaten
Titel
A Comprehensive Framework Integrating Attribute-Based Access Control and Privacy Protection Models
verfasst von
Anh Tuan Truong
Copyright-Jahr
2022
DOI
https://doi.org/10.1007/978-3-030-92574-1_5

    Marktübersichten

    Die im Laufe eines Jahres in der „adhäsion“ veröffentlichten Marktübersichten helfen Anwendern verschiedenster Branchen, sich einen gezielten Überblick über Lieferantenangebote zu verschaffen.