Skip to main content

2019 | OriginalPaper | Buchkapitel

Automated Security Analysis of Authorization Policies with Contextual Information

verfasst von : Khai Kim Quoc Dinh, Anh Truong

Erschienen in: Transactions on Large-Scale Data- and Knowledge-Centered Systems XLI

Verlag: Springer Berlin Heidelberg

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Role-Based Access Control (RBAC) has made great attention in the security community and is widely deployed in the enterprise as a major tool to manage security and restrict system access to unauthorized users. As the RBAC model evolves to meet enterprise requirements, the RBAC policies will become complex and need to be managed by multiple collaborative administrators. The collaborative administrator may interact unintendedly with the policies, creates the undesired effect to the security requirements of the enterprise. Consequently, researchers have studied various safety analyzing techniques that are useful to prevent such issues in RBAC, especially with the Administrative Role-Based Access Control (ARBAC97). For critical applications, several extensions of RBAC, such as Spatial-Temporal Role-Based Access Control (STRBAC), are being adopted in recent years to enhance the security of an application on authorization with contextual information such as time and space. The features, which proposed in STRBAC for collaborative administrators, may interact in subtle ways that violate the original security requirements. However, the analysis of it has not been considered in the literature.
In this research, we consider the security analysis technique for the extension of STRBAC, named Administrative STRBAC (ASTRBAC), and illustrate the safety analysis technique to detect and report the violation of the security requirements. This technique leverages First-Order Logic and Symbolic Model Checking (SMT) by translating the policies to decidable reachability problems, which are essential to understand the security policies and inform policies designer using this model to take appropriate actions. Our extensive experimental evaluation demonstrates the correctness of our proposed solutions in practice, which supports finite ASTRBAC policies analysis without prior knowledge about the number of users in the system.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
2.
Zurück zum Zitat National Computer Security Center (NCSC): A guide to understanding discretionary access control in trusted system, Report NSCD-TG-003 Version1, 30 September 1987 National Computer Security Center (NCSC): A guide to understanding discretionary access control in trusted system, Report NSCD-TG-003 Version1, 30 September 1987
3.
Zurück zum Zitat Osborn, S.: Mandatory access control and role-based access control revisited. In: Proceedings of the 2nd ACM Workshop on Role-Based Access Control, RBAC 1997, pp 31–40. ACM (1997) Osborn, S.: Mandatory access control and role-based access control revisited. In: Proceedings of the 2nd ACM Workshop on Role-Based Access Control, RBAC 1997, pp 31–40. ACM (1997)
4.
Zurück zum Zitat Sandhu, R., Coyne, E.J., Feinstein, H.L., Youman, C.E.: Role-based access control models. IEEE Comput. 29, 38–47 (1996)CrossRef Sandhu, R., Coyne, E.J., Feinstein, H.L., Youman, C.E.: Role-based access control models. IEEE Comput. 29, 38–47 (1996)CrossRef
5.
Zurück zum Zitat Ferraiolo, D., Kuhn, R.: Role-based access control. In: 15th NIST-NCSC National Computer Security Conference, pp. 554–563, October 1992 Ferraiolo, D., Kuhn, R.: Role-based access control. In: 15th NIST-NCSC National Computer Security Conference, pp. 554–563, October 1992
6.
Zurück zum Zitat Sandhu, R., Ferraiolo, D., Kuhn, R.: The NIST model for role-based access control: toward a unified standard. In: 5th ACM Workshop Role-Based Access Control, pp. 47–63, July 2000 Sandhu, R., Ferraiolo, D., Kuhn, R.: The NIST model for role-based access control: toward a unified standard. In: 5th ACM Workshop Role-Based Access Control, pp. 47–63, July 2000
7.
Zurück zum Zitat Sandhu, R., Bhamidipati, V., Munawer, Q.: The ARBAC97 model for role-based administration of roles. ACM Trans. Inf. Syst. Secur. (TISSEC) 2, 105–135 (1999)CrossRef Sandhu, R., Bhamidipati, V., Munawer, Q.: The ARBAC97 model for role-based administration of roles. ACM Trans. Inf. Syst. Secur. (TISSEC) 2, 105–135 (1999)CrossRef
8.
Zurück zum Zitat Kumar, M., Newman, R.: STRBAC - an approach towards spatiotemporal role-based access control. In: Proceedings of the Third IASTED International Conference on Communication Network and Information Security CNIS, pp. 150–155 (2006) Kumar, M., Newman, R.: STRBAC - an approach towards spatiotemporal role-based access control. In: Proceedings of the Third IASTED International Conference on Communication Network and Information Security CNIS, pp. 150–155 (2006)
10.
Zurück zum Zitat Li, N., Tripunitara, M.: Security analysis in role-based access control. In: The Proceedings of ACM Symposium on Access Control Models and Technologies, pp. 126–135. ACM Press (2004) Li, N., Tripunitara, M.: Security analysis in role-based access control. In: The Proceedings of ACM Symposium on Access Control Models and Technologies, pp. 126–135. ACM Press (2004)
11.
Zurück zum Zitat Jha, S., Li, N., Tripunitara, M., Wang, Q., Winsborough, H.: Towards formal verification of role-based access control policies. IEEE TDSC 5(4), 242–255 (2008) Jha, S., Li, N., Tripunitara, M., Wang, Q., Winsborough, H.: Towards formal verification of role-based access control policies. IEEE TDSC 5(4), 242–255 (2008)
13.
Zurück zum Zitat Jayaraman, K., Tripunitara, M., Ganesh, V., Rinard, M., Chapin, S.: Mohawk abstraction-refinement and bound-estimation for verifying access control policies. ACM TISSEC 15, 18 (2013)CrossRef Jayaraman, K., Tripunitara, M., Ganesh, V., Rinard, M., Chapin, S.: Mohawk abstraction-refinement and bound-estimation for verifying access control policies. ACM TISSEC 15, 18 (2013)CrossRef
15.
Zurück zum Zitat Ranise, S., Truong, A., Vigano, L.: Automated analysis of RBAC policies with temporal constraints and static role hierarchies. In: the Proceeding of the 30th ACM Symposium on Applied Computing (SAC15), pp. 2177–2184. ACM (2015) Ranise, S., Truong, A., Vigano, L.: Automated analysis of RBAC policies with temporal constraints and static role hierarchies. In: the Proceeding of the 30th ACM Symposium on Applied Computing (SAC15), pp. 2177–2184. ACM (2015)
16.
Zurück zum Zitat Ranise, S., Truong, A., Armando, A.: Scalable and precise automated analysis of administrative temporal role-based access control. In: Proceedings of the 19th ACM Symposium on Access Control Models and Technologies, pp. 103–114. ACM (2014) Ranise, S., Truong, A., Armando, A.: Scalable and precise automated analysis of administrative temporal role-based access control. In: Proceedings of the 19th ACM Symposium on Access Control Models and Technologies, pp. 103–114. ACM (2014)
19.
Zurück zum Zitat Harrison, M., Ruzzo, W., Ullman, J.: Protection in operating systems. Commun. ACM 19, 461–471 (1976)CrossRef Harrison, M., Ruzzo, W., Ullman, J.: Protection in operating systems. Commun. ACM 19, 461–471 (1976)CrossRef
20.
Zurück zum Zitat Bertino, E., Bonatti, P., Ferrari, E.: TRBAC a temporal role-based access control model. ACM TISSEC 4(3), 191–233 (2001)CrossRef Bertino, E., Bonatti, P., Ferrari, E.: TRBAC a temporal role-based access control model. ACM TISSEC 4(3), 191–233 (2001)CrossRef
21.
Zurück zum Zitat Joshi, J., Bertino, E., Latif, U., Ghafoor, A.: A generalized temporal role-based access control model. IEEE Trans. Knowl. Data Eng. 17, 4–23 (2005)CrossRef Joshi, J., Bertino, E., Latif, U., Ghafoor, A.: A generalized temporal role-based access control model. IEEE Trans. Knowl. Data Eng. 17, 4–23 (2005)CrossRef
22.
Zurück zum Zitat Kumar, M., Newman, R.: STRBAC - an approach towards spatio-temporal role-based access control. In: Communication, Network, and Information Security, pp. 150–155 (2006) Kumar, M., Newman, R.: STRBAC - an approach towards spatio-temporal role-based access control. In: Communication, Network, and Information Security, pp. 150–155 (2006)
23.
Zurück zum Zitat Aich, S., Mondal, S., Sural, S., Majumdar, A.K.: Role based access control with spatiotemporal context for mobile applications. In: Gavrilova, M.L., Tan, C.J.K., Moreno, E.D. (eds.) Transactions on Computational Science IV. LNCS, vol. 5430, pp. 177–199. Springer, Heidelberg (2009). https://doi.org/10.1007/978-3-642-01004-0_10CrossRef Aich, S., Mondal, S., Sural, S., Majumdar, A.K.: Role based access control with spatiotemporal context for mobile applications. In: Gavrilova, M.L., Tan, C.J.K., Moreno, E.D. (eds.) Transactions on Computational Science IV. LNCS, vol. 5430, pp. 177–199. Springer, Heidelberg (2009). https://​doi.​org/​10.​1007/​978-3-642-01004-0_​10CrossRef
24.
Zurück zum Zitat Uzun, E., Atluri, V., Sural, S., Vaidya, J., Parlato, G., Ferrara, A.: Analyzing temporal role-based access control models. In: SACMAT, pp. 177–186. ACM (2012) Uzun, E., Atluri, V., Sural, S., Vaidya, J., Parlato, G., Ferrara, A.: Analyzing temporal role-based access control models. In: SACMAT, pp. 177–186. ACM (2012)
25.
Zurück zum Zitat Ghilardi, S., Ranise, S.: Backward reachability of array-based systems by SMT solving termination and invariant synthesis. Log. Methods Comput. Sci. 6, 1–48 (2010)MathSciNetCrossRef Ghilardi, S., Ranise, S.: Backward reachability of array-based systems by SMT solving termination and invariant synthesis. Log. Methods Comput. Sci. 6, 1–48 (2010)MathSciNetCrossRef
27.
Zurück zum Zitat Ranise, S.: Symbolic backward reachability with effectively propositional logic. Appl. Secur. Policy Anal. FMSD 42, 24–45 (2013)MATH Ranise, S.: Symbolic backward reachability with effectively propositional logic. Appl. Secur. Policy Anal. FMSD 42, 24–45 (2013)MATH
28.
Zurück zum Zitat Piskac, R., Moura, L., Bjørner, N.: Deciding effectively propositional logic using DPLL and substitution sets. J. Autom. Reason. 44, 401–424 (2010)MathSciNetCrossRef Piskac, R., Moura, L., Bjørner, N.: Deciding effectively propositional logic using DPLL and substitution sets. J. Autom. Reason. 44, 401–424 (2010)MathSciNetCrossRef
29.
Zurück zum Zitat Sasturkar, A., Yang, A., Stoller, S., Ramakrishnan, C.: Policy analysis for administrative role-based access control. In: 19th IEEE Computer Security Foundations Workshop, pp. 124–138 (2006) Sasturkar, A., Yang, A., Stoller, S., Ramakrishnan, C.: Policy analysis for administrative role-based access control. In: 19th IEEE Computer Security Foundations Workshop, pp. 124–138 (2006)
30.
Zurück zum Zitat Dinh, K.K.Q., Tran, T.D., Truong, A.: Security analysis of administrative role-based access control policies with contextual information. In: Dang, T.K., Wagner, R., Küng, J., Thoai, N., Takizawa, M., Neuhold, E.J. (eds.) FDSE 2017. LNCS, vol. 10646, pp. 243–261. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-70004-5_17CrossRef Dinh, K.K.Q., Tran, T.D., Truong, A.: Security analysis of administrative role-based access control policies with contextual information. In: Dang, T.K., Wagner, R., Küng, J., Thoai, N., Takizawa, M., Neuhold, E.J. (eds.) FDSE 2017. LNCS, vol. 10646, pp. 243–261. Springer, Cham (2017). https://​doi.​org/​10.​1007/​978-3-319-70004-5_​17CrossRef
Metadaten
Titel
Automated Security Analysis of Authorization Policies with Contextual Information
verfasst von
Khai Kim Quoc Dinh
Anh Truong
Copyright-Jahr
2019
Verlag
Springer Berlin Heidelberg
DOI
https://doi.org/10.1007/978-3-662-58808-6_5