Decentralized access control for secure microservices cooperation with blockchain

被引:2
作者
Xi, Ning [1 ]
Liu, Jin [1 ]
Li, Yajie [1 ]
Qin, Bojun [1 ]
机构
[1] Xidian Univ, Sch Cyber Engn, Taibai Rd 2, Xian 710071, Peoples R China
基金
中国国家自然科学基金;
关键词
Microservices; Service cooperation; Access control; Permission management; Blockchain; MANAGEMENT; INTERNET; SCHEME; THINGS;
D O I
10.1016/j.isatra.2023.07.018
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the rapid advancement of cloud-native computing, the microservice with high concurrency and low coupling has ushered in an unprecedented period of vigorous development. However, due to the mutability and complexity of cooperation procedures, it is difficult to realize high-efficient security management on these microservices. Traditional centralized access control has the defects of relying on a centralized cloud manager and a single point of failure. Meanwhile, decentralized mechanisms are defective by inconsistent policies defined by different participants. This paper first proposes a blockchain-based distributed access control policies and scheme, especially for microservices coopera-tion with dynamic access policies. We store the authorized security policies on the blockchain to solve the inconsistent policy problem while enabling individual management of personalized access policies by the providers rather than a central authority. Then we propose a graph-based decision-making scheme to achieve an efficient access control for microservices cooperation. Through the evaluations and experiments, it shows that our solution can realize effective distributed access control at an affordable cost.(c) 2023 ISA. Published by Elsevier Ltd. All rights reserved.
引用
收藏
页码:44 / 51
页数:8
相关论文
共 39 条
[1]   Web Services Policy Generation Based on SLA Requirements [J].
Alaeddine, Saadaoui ;
Scott, Stephen .
2017 IEEE 3RD INTERNATIONAL CONFERENCE ON COLLABORATION AND INTERNET COMPUTING (CIC), 2017, :146-154
[2]   A Deep Learning Approach for Extracting Attributes of ABAC Policies [J].
Alohaly, Manar ;
Takabi, Hassan ;
Blanco, Eduardo .
SACMAT'18: PROCEEDINGS OF THE 23RD ACM SYMPOSIUM ON ACCESS CONTROL MODELS & TECHNOLOGIES, 2018, :137-148
[3]  
[Anonymous], 2023, Tsung
[4]   Internet of Things for Smart Healthcare: Technologies, Challenges, and Opportunities [J].
Baker, Stephanie B. ;
Xiang, Wei ;
Atkinson, Ian .
IEEE ACCESS, 2017, 5 :26521-26544
[5]   IoTGUARD: Dynamic Enforcement of Security and Safety Policy in Commodity IoT [J].
Celik, Z. Berkay ;
Tan, Gang ;
McDaniel, Patrick .
26TH ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2019), 2019,
[6]  
Celik ZB, 2018, PROCEEDINGS OF THE 2018 USENIX ANNUAL TECHNICAL CONFERENCE, P147
[7]   Towards Continuous Access Control Validation and Forensics [J].
Xiang, Chengcheng ;
Wu, Yudong ;
Shen, Bingyu ;
Shen, Mingyao ;
Huang, Haochen ;
Xu, Tianyin ;
Zhou, Yuanyuan ;
Moore, Cindy ;
Jin, Xinxin ;
Sheng, Tianwei .
PROCEEDINGS OF THE 2019 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'19), 2019, :113-129
[8]   Cloud-Native Applications [J].
Gannon, Dennis ;
Barga, Roger ;
Sundaresan, Neel .
IEEE CLOUD COMPUTING, 2017, 4 (05) :16-21
[9]   TrustAccess: A Trustworthy Secure Ciphertext-Policy and Attribute Hiding Access Control Scheme Based on Blockchain [J].
Gao, Sheng ;
Piao, Guirong ;
Zhu, Jianming ;
Ma, Xindi ;
Ma, Jianfeng .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2020, 69 (06) :5784-5798
[10]  
Gao S, 2019, CHINA COMMUN, V16, P111, DOI 10.23919/JCC.2019.12.008