Combined access control model embedding configurable policy for fine-grained data security

被引:1
|
作者
Zhu, Lei [1 ,3 ]
He, Ping [1 ,4 ]
Hei, Xinhong [1 ,3 ]
Yao, Yanni [1 ,3 ]
Wang, Yichuan [1 ]
Ji, Wenjiang [1 ]
Zhao, Qin [2 ,3 ]
Pan, Long [4 ]
机构
[1] Xian Univ Technol, Sch Comp Sci & Engn, Xian, Peoples R China
[2] Xian Univ Technol, Sch Civil Engn & Architecture, Xian, Peoples R China
[3] State Key Lab Rail Transit Engn Informat FSDI, Xian, Peoples R China
[4] Shenzhen Tencent Comp Syst Co Ltd, Shenzhen, Peoples R China
基金
中国国家自然科学基金;
关键词
Data Access Control; RBAC; LBAC; Fine-grained data security; Embedding configurable policy; PRIVACY;
D O I
10.1016/j.micpro.2020.103060
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
With the wide applications of the Internet of Things, a lot of business data is generated by mobile embedded devices, and traditional data access control faces the new security risk. To enforce security and privacy requirements of information, the fixed data access control model needs to be added with the configurable authority policy, and it is necessary to ensure that new model is embedded without changing the original architecture. In this paper, we study the data access strategies on BlueKing platform, and design an embedded model by combing the role-based access control (RBAC) and label-based access control (LBAC) for fine-grained data access control. In proposed model, we first obtain the preliminary permissions result by using the original RBAC method. Then, we analyze the difference between the requirements and preliminary result, and we design the embedded polices components based on LBAC for the original framework. Finally, we generate the data access result for row and column by parsing the requirements with authority policies. The proposed model does not invade the original RBAC, and perform the fine-grained data access control, which has begun to be integrated into BlueKing platform. (C) 2020 Elsevier B.V. All rights reserved.
引用
收藏
页数:8
相关论文
共 50 条
  • [1] The Fine-Grained Security Access Control of Spatial Data
    Ma, Fuguang
    Gao, Yong
    Yan, Menglong
    Xu, Fuchun
    Liu, Ding
    2010 18TH INTERNATIONAL CONFERENCE ON GEOINFORMATICS, 2010,
  • [2] A Unified Network Security and Fine-Grained Database Access Control Model
    Pan, Leon
    PROCEEDINGS OF THE SECOND INTERNATIONAL SYMPOSIUM ON ELECTRONIC COMMERCE AND SECURITY, VOL I, 2009, : 265 - 269
  • [3] Fine-Grained Access Control via Policy-Carrying Data
    Padget, Julian A.
    Vasconcelos, Wamberto W.
    ACM TRANSACTIONS ON INTERNET TECHNOLOGY, 2018, 18 (03)
  • [4] Access policy sheet for access control in fine-grained XML
    Wu, J
    Mu, Y
    Seberry, J
    Ruan, C
    EMBEDDED AND UBIQUITOUS COMPUTING - EUC 2005 WORKSHOPS, PROCEEDINGS, 2005, 3823 : 1273 - 1282
  • [5] A Fine-Grained Image Access Control Model
    Al Bouna, Bechara
    Chbeir, Richard
    Gabillon, Alban
    Capolsini, Patrick
    8TH INTERNATIONAL CONFERENCE ON SIGNAL IMAGE TECHNOLOGY & INTERNET BASED SYSTEMS (SITIS 2012), 2012, : 603 - 612
  • [6] A Fine-Grained Access Control Model with Secure Label on Data Resource
    Gao, Lijie
    Liu, Lianzhong
    Jin, Ze
    Han, Chunyan
    2013 3RD INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND NETWORK TECHNOLOGY (ICCSNT), 2013, : 14 - 18
  • [7] Using XACML for Embedded and Fine-Grained Access Control Policy
    Hsieh, George
    Foster, Keith
    Emamali, Gerald
    Patrick, Gregory
    Marvel, Lisa
    2009 INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY, AND SECURITY (ARES), VOLS 1 AND 2, 2009, : 462 - +
  • [8] Fine-Grained Access Control in mHealth with Hidden Policy and Traceability
    Li, Qi
    Zhang, Yinghui
    Zhang, Tao
    BROADBAND COMMUNICATIONS, NETWORKS, AND SYSTEMS, 2019, 303 : 261 - 274
  • [9] Fine-grained Access Control Model Based on RBAC
    Gao, Lei
    Pan, Shulin
    AUTOMATION EQUIPMENT AND SYSTEMS, PTS 1-4, 2012, 468-471 : 1667 - +
  • [10] Design and Application of Fine-Grained Access Control Model
    Xie, Xuelian
    Yang, Haibo
    Li, Lanyou
    NETWORK COMPUTING AND INFORMATION SECURITY, 2012, 345 : 23 - +