A heterogeneous graph-based semi-supervised learning framework for access control decision-making

被引:1
作者
Yin, Jiao [1 ,2 ]
Chen, Guihong [3 ,4 ]
Hong, Wei [2 ]
Cao, Jinli [1 ]
Wang, Hua [2 ]
Miao, Yuan [2 ]
机构
[1] Trobe Univ, Dept Comp Sci & Informat Technol, Melbourne, Vic 3086, Australia
[2] Victoria Univ, Inst Sustainable Ind & Liveable Cities, Melbourne, Vic 3011, Australia
[3] South China Univ Technol, Sch Automat Sci & Engn, Guangzhou 510641, Guangdong, Peoples R China
[4] Guangdong Polytech Normal Univ, Sch Cyber Secur, Guangzhou 510665, Guangdong, Peoples R China
来源
WORLD WIDE WEB-INTERNET AND WEB INFORMATION SYSTEMS | 2024年 / 27卷 / 04期
关键词
Access control; Semi-supervised learning; Heterogeneous graph; Node embedding; Link prediction;
D O I
10.1007/s11280-024-01275-2
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
For modern information systems, robust access control mechanisms are vital in safeguarding data integrity and ensuring the entire system's security. This paper proposes a novel semi-supervised learning framework that leverages heterogeneous graph neural network-based embedding to encapsulate both the intricate relationships within the organizational structure and interactions between users and resources. Unlike existing methods focusing solely on individual user and resource attributes, our approach embeds organizational and operational interrelationships into the hidden layer node embeddings. These embeddings are learned from a self-supervised link prediction task based on a constructed access control heterogeneous graph via a heterogeneous graph neural network. Subsequently, the learned node embeddings, along with the original node features, serve as inputs for a supervised access control decision-making task, facilitating the construction of a machine-learning access control model. Experimental results on the open-sourced Amazon access control dataset demonstrate that our proposed framework outperforms models using original or manually extracted graph-based features from previous works. The prepossessed data and codes are available on GitHub,facilitating reproducibility and further research endeavors.
引用
收藏
页数:24
相关论文
共 42 条
  • [1] A Long Short-Term Memory Based Framework for Early Detection of Mild Cognitive Impairment From EEG Signals
    Alvi, Ashik Mostafa
    Siuly, Siuly
    Wang, Hua
    [J]. IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTATIONAL INTELLIGENCE, 2023, 7 (02): : 375 - 388
  • [2] Bertino E., 2000, Proceedings of the fifth ACM workshop on Role-based access control, RBAC '00, P21
  • [3] Secure k-NN Query on Encrypted Cloud Data with Multiple Keys
    Cheng, Ke
    Wang, Liangmin
    Shen, Yulong
    Wang, Hua
    Wang, Yongzhi
    Jiang, Xiaohong
    Zhong, Hong
    [J]. IEEE TRANSACTIONS ON BIG DATA, 2021, 7 (04) : 689 - 702
  • [4] Evolutionary Dynamic Database Partitioning Optimization for Privacy and Utility
    Ge, Yong-Feng
    Wang, Hua
    Bertino, Elisa
    Zhan, Zhi-Hui
    Cao, Jinli
    Zhang, Yanchun
    Zhang, Jun
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2024, 21 (04) : 2296 - 2311
  • [5] Distributed Cooperative Coevolution of Data Publishing Privacy and Transparency
    Ge, Yong-Feng
    Bertino, Elisa
    Wang, Hua
    Cao, Jinli
    Zhang, Yanchun
    [J]. ACM TRANSACTIONS ON KNOWLEDGE DISCOVERY FROM DATA, 2024, 18 (01)
  • [6] MDDE: multitasking distributed differential evolution for privacy-preserving database fragmentation
    Ge, Yong-Feng
    Orlowska, Maria
    Cao, Jinli
    Wang, Hua
    Zhang, Yanchun
    [J]. VLDB JOURNAL, 2022, 31 (05) : 957 - 975
  • [7] Hamilton WL, 2017, ADV NEUR IN, V30
  • [8] A graph empowered insider threat detection framework based on daily activities
    Hong, Wei
    Yin, Jiao
    You, Mingshan
    Wang, Hua
    Cao, Jinli
    Li, Jianxin
    Liu, Ming
    Man, Chengyuan
    [J]. ISA TRANSACTIONS, 2023, 141 : 84 - 92
  • [9] Graph Intelligence Enhanced Bi-Channel Insider Threat Detection
    Hong, Wei
    Yin, Jiao
    You, Mingshan
    Wang, Hua
    Cao, Jinli
    Li, Jianxin
    Liu, Ming
    [J]. NETWORK AND SYSTEM SECURITY, NSS 2022, 2022, 13787 : 86 - 102
  • [10] Hua Wang, 2010, Proceedings of the 2010 Fourth International Conference on Network and System Security (NSS 2010), P239, DOI 10.1109/NSS.2010.13