A Weighted GraphSAGE-Based Context-Aware Approach for Big Data Access Control

被引:0
作者
Shan, Dibin [1 ,2 ]
Du, Xuehui [1 ,2 ]
Wang, Wenjuan [1 ]
Liu, Aodi [1 ]
Wang, Na [1 ]
机构
[1] PLA Informat Engn Univ, Dept Informat Syst Secur, Zhengzhou, Peoples R China
[2] PLA Informat Engn Univ, Dept Informat Syst Secur, Zhengzhou 450001, Peoples R China
基金
中国国家自然科学基金;
关键词
big data; access control; graph neural network; context awareness; VALIDATION;
D O I
10.1089/big.2021.0473
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Context information is the key element to realizing dynamic access control of big data. However, existing context-aware access control (CAAC) methods do not support automatic context awareness and cannot automatically model and reason about context relationships. To solve these problems, this article proposes a weighted GraphSAGE-based context-aware approach for big data access control. First, graph modeling is performed on the access record data set and transforms the access control context-awareness problem into a graph neural network (GNN) node learning problem. Then, a GNN model WGraphSAGE is proposed to achieve automatic context awareness and automatic generation of CAAC rules. Finally, weighted neighbor sampling and weighted aggregation algorithms are designed for the model to realize automatic modeling and reasoning of node relationships and relationship strengths simultaneously in the graph node learning process. The experiment results show that the proposed method has obvious advantages in context awareness and context relationship reasoning compared with similar GNN models. Meanwhile, it obtains better results in dynamic access control decisions than the existing CAAC models.
引用
收藏
页码:390 / 411
页数:22
相关论文
共 52 条
[1]  
[Anonymous], 1974, Commun. Statist.-Simul. Comput., DOI DOI 10.1080/03610927408827101
[2]  
Baltrunas L., 2015, COMPUT SCI, P1
[3]  
Bertino E., 2001, ACM Transactions on Information and Systems Security, V4, P191, DOI 10.1145/501978.501979
[4]  
Bertino Elisa., 2005, SACMAT 05, P29
[5]  
Bui T., 2020, LEARNING ATTRIBUTE B
[6]   A Decision Tree Learning Approach for Mining Relationship-Based Access Control Policies [J].
Bui, Thang ;
Stoller, Scott D. .
SACMAT'20: PROCEEDINGS OF THE 25TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES, 2020, :167-178
[7]  
Chandran SM, 2005, LECT NOTES COMPUT SC, V3806, P361
[8]  
Chen Fenxiao, 2020, APSIPA TRANS SIGNAL, V9, P1
[9]  
Corradi A., 2004, Proceedings of the 28th Annual International Computer Software and Applications Conference. COMPSAC 2004, P444, DOI 10.1109/CMPSAC.2004.1342877
[10]   Poster: Using Gini Impurity to Mine Attribute-based Access Control Policies with Environment Attributes [J].
Das, Saptarshi ;
Sural, Shamik ;
Vaidya, Jaideep ;
Atluri, Vijayalakshmi .
SACMAT'18: PROCEEDINGS OF THE 23RD ACM SYMPOSIUM ON ACCESS CONTROL MODELS & TECHNOLOGIES, 2018, :213-215