Skip to main content

2020 | OriginalPaper | Buchkapitel

Authorization Policy Extension for Graph Databases

verfasst von : Aya Mohamed, Dagmar Auer, Daniel Hofer, Josef Küng

Erschienen in: Future Data and Security Engineering

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The high increase in the use of graph databases also for business- and privacy-critical applications demands for a sophisticated, flexible, fine-grained authorization and access control approach. Attribute-based access control (ABAC) supports a fine-grained definition of authorization rules and policies. Attributes can be associated with the subject, the requested resource and action, but also the environment. Thus, this is a promising starting point. However, specific characteristics of graph-structured data such as attributes on vertices and edges along a path to the resource, are not yet considered. The well-established eXtensible Access Control Markup Language (XACML), which defines a declarative language for fine-grained, attribute-based authorization policies, is the basis for our proposed approach - XACML for Graph-structured data (XACML4G). The additional path-specific constraints, described in graph patterns, demand for specialized processing of the rules and policies as well as adapted enforcement and decision making in the access control process. To demonstrate XACML4G and its enforcement process, we present a scenario from the university domain. Due to the project’s environment, the prototype is built with the multi-model database ArangoDB. The results are promising and further studies concerning performance and use in practice are planned.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
5.
Zurück zum Zitat Ahmadi, H., Small, D.: Graph model implementation of attribute-based access control policies. arXiv preprint arXiv:1909.09904 (2019) Ahmadi, H., Small, D.: Graph model implementation of attribute-based access control policies. arXiv preprint arXiv:​1909.​09904 (2019)
6.
Zurück zum Zitat Anderson, A.: Extensible access control markup language (XACML). Technology report (2003) Anderson, A.: Extensible access control markup language (XACML). Technology report (2003)
8.
Zurück zum Zitat Bertino, E., Sandhu, R.: Database security-concepts, approaches, and challenges. IEEE Trans. Dependable Secur. Comput. 2(1), 2–19 (2005)CrossRef Bertino, E., Sandhu, R.: Database security-concepts, approaches, and challenges. IEEE Trans. Dependable Secur. Comput. 2(1), 2–19 (2005)CrossRef
10.
Zurück zum Zitat Browder, K., Davidson, M.A.: The virtual private database in oracle9ir2. Oracle Technical White Paper, Oracle Corporation 500, 280 (2002) Browder, K., Davidson, M.A.: The virtual private database in oracle9ir2. Oracle Technical White Paper, Oracle Corporation 500, 280 (2002)
11.
Zurück zum Zitat Cheng, Y., Park, J., Sandhu, R.: Relationship-based access control for online social networks: beyond user-to-user relationships. In: 2012 International Conference on Privacy, Security, Risk and Trust and 2012 International Conference on Social Computing, pp. 646–655. IEEE (2012) Cheng, Y., Park, J., Sandhu, R.: Relationship-based access control for online social networks: beyond user-to-user relationships. In: 2012 International Conference on Privacy, Security, Risk and Trust and 2012 International Conference on Social Computing, pp. 646–655. IEEE (2012)
13.
Zurück zum Zitat Diez, F.P., Vasu, A.C., Touceda, D.S., Cámara, J.M.S.: Modeling XACML security policies using graph databases. IT Prof. 19(6), 52–57 (2017)CrossRef Diez, F.P., Vasu, A.C., Touceda, D.S., Cámara, J.M.S.: Modeling XACML security policies using graph databases. IT Prof. 19(6), 52–57 (2017)CrossRef
15.
Zurück zum Zitat Fong, P.W.: Relationship-based access control: protection model and policy language. In: Proceedings of the First ACM Conference on Data and Application Security and Privacy, pp. 191–202 (2011) Fong, P.W.: Relationship-based access control: protection model and policy language. In: Proceedings of the First ACM Conference on Data and Application Security and Privacy, pp. 191–202 (2011)
16.
Zurück zum Zitat Giunchiglia, F., Zhang, R., Crispo, B.: RelBAC: relation based access control. In: 2008 Fourth International Conference on Semantics, Knowledge and Grid, pp. 3–11. IEEE (2008) Giunchiglia, F., Zhang, R., Crispo, B.: RelBAC: relation based access control. In: 2008 Fourth International Conference on Semantics, Knowledge and Grid, pp. 3–11. IEEE (2008)
18.
Zurück zum Zitat Hu, V.C., Ferraiolo, D.F., Chandramouli, R., Kuhn, D.R.: Attribute-Based Access Control. Artech House, Norwood (2018) Hu, V.C., Ferraiolo, D.F., Chandramouli, R., Kuhn, D.R.: Attribute-Based Access Control. Artech House, Norwood (2018)
19.
Zurück zum Zitat Jin, Y., Kaja, K.: XACML implementation based on graph database. In: Proceedings of 34th International Conference on Computers and Their Applications, vol. 58, pp. 65–74 (2019) Jin, Y., Kaja, K.: XACML implementation based on graph database. In: Proceedings of 34th International Conference on Computers and Their Applications, vol. 58, pp. 65–74 (2019)
20.
Zurück zum Zitat Mohan, A.: Design and implementation of an attribute-based authorization management system. Ph.D. thesis, Georgia Institute of Technology (2011) Mohan, A.: Design and implementation of an attribute-based authorization management system. Ph.D. thesis, Georgia Institute of Technology (2011)
22.
Zurück zum Zitat Rizvi, S., Mendelzon, A., Sudarshan, S., Roy, P.: Extending query rewriting techniques for fine-grained access control. In: Proceedings of the 2004 ACM SIGMOD international conference on Management of data, pp. 551–562 (2004) Rizvi, S., Mendelzon, A., Sudarshan, S., Roy, P.: Extending query rewriting techniques for fine-grained access control. In: Proceedings of the 2004 ACM SIGMOD international conference on Management of data, pp. 551–562 (2004)
Metadaten
Titel
Authorization Policy Extension for Graph Databases
verfasst von
Aya Mohamed
Dagmar Auer
Daniel Hofer
Josef Küng
Copyright-Jahr
2020
DOI
https://doi.org/10.1007/978-3-030-63924-2_3