A Fine-Grained Access Control Mechanism Based on Search Trees

被引:0
作者
Zou, Xianxia [1 ]
Zheng, Cenyu [1 ]
Lin, Haodong [1 ]
Du, Like [1 ]
Xu, Weiwu [1 ]
He, Chong [1 ]
机构
[1] Jinan Univ, Coll Informat Sci & Technol, Guangzhou, Peoples R China
来源
2023 IEEE 22ND INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS, TRUSTCOM, BIGDATASE, CSE, EUC, ISCI 2023 | 2024年
关键词
Database Security; Resource Protection; Fine-Grained Access Control; Search Trees;
D O I
10.1109/TrustCom60117.2023.00220
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The security of cloud-based databases is a crucial topic in current research. The primary solutions are focused on access control and data encryption. A central challenge these solutions face is navigating the balance between system security and operational efficiency. However, individualized data privacy requires fine-grained data protection at columns/rows or individual elements. In existing fine-grained resource or policy protection methods, resource access predominantly uses a traversal method, leading to a linear growth in time overhead. In response to these issues, this paper presents a fine-grained access control mechanism based on search trees. This mechanism provides element-level resource protection and accelerates policy search using an index tree, thereby reducing the time overhead of the fine-grained access control system. Experimental results demonstrate that this mechanism achieves element-level resource protection while maintaining low-performance overhead.
引用
收藏
页码:1614 / 1620
页数:7
相关论文
共 17 条
[1]   Performance Evaluation of LoRaWAN for Green Internet of Things [J].
Ali, Zulfiqar ;
Henna, Shagufta ;
Akhunzada, Adnan ;
Raza, Mohsin ;
Kim, Sung Won .
IEEE ACCESS, 2019, 7 :164102-164112
[2]   Label-Based Access Control: An ABAC Model with Enumerated Authorization Policy [J].
Biswas, Prosunjit ;
Sandhu, Ravi ;
Krishnan, Ram .
ABAC'16: PROCEEDINGS OF THE 2016 ACM INTERNATIONAL WORKSHOP ON ATTRIBUTE BASED ACCESS CONTROL, 2016, :1-12
[3]  
Borgelt, 2005, OSDM 05, P1, DOI DOI 10.1145/1133905.1133907
[4]   Purpose based access control for privacy protection in relational database systems [J].
Byun, Ji-Won ;
Li, Ninghui .
VLDB JOURNAL, 2008, 17 (04) :603-619
[5]  
Colombo P, 2016, PROC INT CONF DATA, P193, DOI 10.1109/ICDE.2016.7498240
[6]   Object-Tagged RBAC Model for the Hadoop Ecosystem [J].
Gupta, Maanak ;
Patwa, Farhan ;
Sandhu, Ravi .
DATA AND APPLICATIONS SECURITY AND PRIVACY XXXI, DBSEC 2017, 2017, 10359 :63-81
[7]   Attribute-Based Access Control [J].
Hu, Vincent C. ;
Kuhn, D. Richard ;
Ferraiolo, David F. .
COMPUTER, 2015, 48 (02) :85-88
[8]   An Attribute-Based Fine-Grained Access Control Mechanism for HBase [J].
Huang, Liangqiang ;
Zhu, Yan ;
Wang, Xin ;
Khurshid, Faisal .
DATABASE AND EXPERT SYSTEMS APPLICATIONS, PT I, 2019, 11706 :44-59
[9]   Attribute-Based Access Control Policy Review in Permissioned Blockchain [J].
Lawal, Sherifdeen ;
Krishnan, Ram .
SECURE KNOWLEDGE MANAGEMENT IN THE ARTIFICIAL INTELLIGENCE ERA, 2022, 1549 :97-109
[10]   An Efficient Distributed-Computing Framework for Association-Rule-Based Recommendation [J].
Li, Changsheng ;
Liang, Weichao ;
Wu, Zhiang ;
Cao, Jie .
2018 IEEE INTERNATIONAL CONFERENCE ON WEB SERVICES (IEEE ICWS 2018), 2018, :339-342