Computable Access Control: Embedding Access Control Rules Into Euclidean Space

被引:1
作者
Dong, Lijun [1 ,2 ]
Wu, Tiejun [3 ]
Jia, Wei [1 ,2 ]
Jiang, Bo [1 ,2 ]
Li, Xinchuan [1 ,2 ]
机构
[1] China Univ Geosci, Sch Comp Sci, Wuhan 430078, Peoples R China
[2] China Univ Geosci, Hubei Key Lab Intelligent Geoinformat Proc, Wuhan 430078, Peoples R China
[3] NSFOCUS, Fuying Lab, Beijing 100089, Peoples R China
来源
IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS | 2023年 / 53卷 / 10期
基金
中国国家自然科学基金;
关键词
Access control; behavior detection; embedding; information system security; machine learning; CONTROL SCHEME; INTERNET;
D O I
10.1109/TSMC.2023.3283527
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Access control is one of the most basic techniques to ensure the security of the information system. The traditional access controls of information systems are usually performed based on the traversals or queries of rules. However, with the increasing complexity of information systems, massive data, and open environments bring great workload and risk for the traditional methods. This study proposes a model of embedding-based computable access control (ECAC), by employing the idea of representation learning in artificial intelligence. According to ECAC, access control rules can be embedded into a Euclidean vector space, and the security of arbitrary behavior can be computed by numerical vector operations, without any traditional querying or traversing of rules, and thus the workload of access control is reduced. Furthermore, by the embedding-based computation, the security of unknown behaviors can be predicted. Potentially, due to the use of numerical vectors instead of traditional semantic symbols, the risk of privacy leakage via semantics can be reduced. Finally, as the first embedding-based access control model, the effectiveness of ECAC is evaluated and concluded by the experiment-based analyses and discussions.
引用
收藏
页码:6530 / 6541
页数:12
相关论文
共 29 条
  • [1] MLS-ABAC: Efficient Multi-Level Security Attribute-Based Access Control scheme
    Aghili, Seyed Farhad
    Sedaghat, Mahdi
    Singelee, Dave
    Gupta, Maanak
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2022, 131 : 75 - 90
  • [2] Next-generation big data federation access control: A reference model
    Awaysheh, Feras M.
    Alazab, Mamoun
    Gupta, Maanak
    Pena, Tomas F.
    Cabaleiro, Jose C.
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2020, 108 : 726 - 741
  • [3] Bordes A., 2013, ADV NEURAL INFORM PR, V26, P2787, DOI DOI 10.5555/2999792.2999923
  • [4] Ontology-based Access Control for FAIR Data
    Brewster, Christopher
    Nouwt, Barry
    Raaijmakers, Stephan
    Verhoosel, Jack
    [J]. DATA INTELLIGENCE, 2020, 2 (1-2) : 66 - 77
  • [5] Ontology driven AI and Access Control Systems for Smart Fisheries
    Chukkapalli, Sai Sree Laya
    Aziz, Shaik Barakhat
    Alotaibi, Nouran
    Mittal, Sudip
    Gupta, Maanak
    Abdelsalam, Mahmoud
    [J]. SAT-CPS'21: PROCEEDINGS OF THE 2021 ACM WORKSHOP ON SECURE AND TRUSTWORTHY CYBER-PHYSICAL SYSTEMS, 2021, : 59 - 68
  • [6] Devlin J, 2019, 2019 CONFERENCE OF THE NORTH AMERICAN CHAPTER OF THE ASSOCIATION FOR COMPUTATIONAL LINGUISTICS: HUMAN LANGUAGE TECHNOLOGIES (NAACL HLT 2019), VOL. 1, P4171
  • [7] Privacy preserving authentication system based on non-interactive zero knowledge proof suitable for Internet of Things
    Dwivedi, Ashutosh Dhar
    Singh, Rajani
    Ghosh, Uttam
    Mukkamala, Raghava Rao
    Tolba, Amr
    Said, Omar
    [J]. JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2021, 13 (10) : 4639 - 4649
  • [8] Distributed representation learning for knowledge graphs with entity descriptions
    Fan, Miao
    Zhou, Qiang
    Zheng, Thomas Fang
    Grishman, Ralph
    [J]. PATTERN RECOGNITION LETTERS, 2017, 93 : 31 - 37
  • [9] Violin plots: A box plot-density trace synergism
    Hintze, JL
    Nelson, RD
    [J]. AMERICAN STATISTICIAN, 1998, 52 (02) : 181 - 184
  • [10] A Novel Group Recommendation Model With Two-Stage Deep Learning
    Huang, Zhenhua
    Liu, Yajun
    Zhan, Choujun
    Lin, Chen
    Cai, Weiwei
    Chen, Yunwen
    [J]. IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS, 2022, 52 (09): : 5853 - 5864