A novel conflict detection method for ABAC security policies

被引:9
作者
Liu, Gang [1 ]
Pei, Wenxian [1 ]
Tian, Yumin [1 ]
Liu, Chen [1 ]
Li, Shancang [2 ]
机构
[1] XIDIAN Univ, Sch Comp Sci & Technol, Xian 710071, Peoples R China
[2] Cardiff Univ, Sch Comp Sci & Informat, Cardiff CF24 3AA, Wales
基金
英国工程与自然科学研究理事会;
关键词
Attributed-based access control; Security policies; Industrial Internet of Things; Conflict detection; Conflicting probability; ACCESS-CONTROL;
D O I
10.1016/j.jii.2021.100200
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Attributed-based access control (ABAC) is widely used in systems with large resources and users such as the Industrial Internet of Things (IIoT), Industrial information integration system, and so on. Attribute-based security policy is highly flexible and expressive, but conflicts between policies occur frequently, affecting the security and availability of the system. Based on analyzing the ABAC security policies represented by the eXtensible Access Control Markup Language (XACML), this study proposes a formal definition of explicit conflicting rules, probable-conflicting rules, and never-conflicting rules. Also, we found that conflicts occur on a pair of rules in which attribute expressions have overlapping values and that be applied to the same request. A new conflict detection method is proposed in which implicit conflicting rules are converted to explicit conflicting rules by completing the absent attribute expressions and then compare all the rules in pairs to detect all the probable conflicting rules in a rule set. In this way, we can analyze the conflicting probability of each pair of policy rules. Furthermore, we define two metrics to evaluate the conflict level of a rule set. Experiment results show that implicit conflicting rules are more numerous than explicit conflicting rules in the policy set. Also, with an increase in the number of attribute expressions in each rule, the conflicting level of a rule set is significantly reduced, which provides a reference for policymaking. With this method, administrators can formulate more robust and efficient security policies, improve the security and availability of systems.
引用
收藏
页数:9
相关论文
共 39 条
  • [1] ProFact: A Provenance-Based Analytics Framework for Access Control Policies
    Abu Jabal, Amani
    Davari, Maryam
    Bertino, Elisa
    Makaya, Christian
    Calo, Seraphin
    Verma, Dinesh
    Williams, Christopher
    [J]. IEEE TRANSACTIONS ON SERVICES COMPUTING, 2021, 14 (06) : 1914 - 1928
  • [2] Methods and Tools for Policy Analysis
    Abu Jabal, Amani
    Davari, Maryam
    Bertino, Elisa
    Makaya, Christian
    Calo, Seraphin
    Verma, Dinesh
    Russo, Alessandra
    Williams, Christopher
    [J]. ACM COMPUTING SURVEYS, 2019, 51 (06)
  • [3] An Attribute Based Access Control Framework for Healthcare System
    Afshar, Majid
    Samet, Saeed
    Hu, Ting
    [J]. 10TH INTERNATIONAL CONFERENCE ON COMPUTER AND ELECTRICAL ENGINEERING, 2018, 933
  • [4] XACML Policy Evaluation with Dynamic Context Handling
    Ammar, Nariman
    Malik, Zaki
    Bertino, Elisa
    Rezgui, Abdelmounaam
    [J]. IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2015, 27 (09) : 2575 - 2588
  • [5] [Anonymous], 2015, INT C INN INF COMP T
  • [6] Provenance-based Analytics Services for Access Control Policies
    Bertino, Elisa
    Abu Jabal, Amani
    Calo, Seraphin
    Makaya, Christian
    Touma, Maroun
    Verma, Dinesh
    Williams, Christopher
    [J]. 2017 13TH IEEE WORLD CONGRESS ON SERVICES (SERVICES), 2017, : 94 - 101
  • [7] Chen M, 2017, IEEE INT CONF ELECTR, P548, DOI 10.1109/ICEIEC.2017.8076625
  • [8] Christian L, 2018, P 15 INT JOINT C E B, P168
  • [9] Fatema K, 2014, LECT NOTES BUS INF P, V178, P310
  • [10] Attribute-Based Access Control for the Swarm With Distributed Policy Management
    Fedrecheski, Geovane
    Costa De Biase, Laisa Caroline
    Calcina-Ccori, Pablo C.
    Zuffo, Marcelo Knorich
    [J]. IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2019, 65 (01) : 90 - 98