Tuple-Based Access Control: a Provenance-Based Information Flow Control for Relational Data

被引:0
|
作者
Thion, Romuald [1 ]
Lesueur, Francois [2 ]
Talbi, Meriam [2 ]
机构
[1] Univ Lyon 1, CNRS LIRIS, UMR5205, F-69622 Villeurbanne, France
[2] INSA Lyon, CNRS LIRIS, UMR5205, F-69621 Villeurbanne, France
来源
30TH ANNUAL ACM SYMPOSIUM ON APPLIED COMPUTING, VOLS I AND II | 2015年
关键词
access control; relational databases; provenance; information flow; personal data server;
D O I
10.1145/2695664.2695758
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
This paper proposes a flexible control framework for relational personal data that enforces data originators' dissemination policies. Inspired by the sticky policy paradigm and mandatory access control, dissemination policies are linked with atomic data and are combined when different pieces of data are merged. The background setting of relational provenance guarantees that the policy combining operations behave accordingly to the operations carried out on the data. We show that the framework can capture a large class of policies similar to those of lattice-based access control models and that it can be integrated seamlessly into relational database management systems. In particular, we define a path oriented dissemination control model where policies define authorized chains of transfers between databases. Promising ongoing research work include the generalization of the theoretical framework to more expressive query languages including aggregation and difference operators as well as experiments on secure tokens.
引用
收藏
页码:2165 / 2170
页数:6
相关论文
共 50 条
  • [1] A Provenance-Based Access Control Model for Securely Storing Data in Cloud
    Mirajkar, Shweta Balasaheb
    Khatawkar, S. D.
    2017 2ND INTERNATIONAL CONFERENCE FOR CONVERGENCE IN TECHNOLOGY (I2CT), 2017, : 906 - 909
  • [2] Delegation Enabled Provenance-Based Access Control Model
    Mohy, Noha Nagy
    Mokhtar, Hoda M. O.
    El-Sharkawi, Mohamed E.
    2015 SCIENCE AND INFORMATION CONFERENCE (SAI), 2015, : 1374 - 1379
  • [3] ProFact: A Provenance-Based Analytics Framework for Access Control Policies
    Abu Jabal, Amani
    Davari, Maryam
    Bertino, Elisa
    Makaya, Christian
    Calo, Seraphin
    Verma, Dinesh
    Williams, Christopher
    IEEE TRANSACTIONS ON SERVICES COMPUTING, 2021, 14 (06) : 1914 - 1928
  • [4] Provenance-based Analytics Services for Access Control Policies
    Bertino, Elisa
    Abu Jabal, Amani
    Calo, Seraphin
    Makaya, Christian
    Touma, Maroun
    Verma, Dinesh
    Williams, Christopher
    2017 13TH IEEE WORLD CONGRESS ON SERVICES (SERVICES), 2017, : 94 - 101
  • [5] PBAC4M: Provenance-Based Access Control for Mobile
    Lesas, Anne-Marie
    Boucelma, Omar
    Lacroix, Julien
    PROCEEDINGS OF THE 14TH EAI INTERNATIONAL CONFERENCE ON MOBILE AND UBIQUITOUS SYSTEMS: COMPUTING, NETWORKING AND SERVICES (MOBIQUITOUS 2017), 2017, : 529 - 530
  • [6] A Provenance-Based Policy Control Framework for Cloud Services
    Ali, Mufajjul
    Moreau, Luc
    PROVENANCE AND ANNOTATION OF DATA AND PROCESSES (IPAW 2014), 2015, 8628 : 127 - 138
  • [7] Location Based Privacy Preserving Access Control for Relational Data
    Lakadkutta, Ahmed H. I.
    Mante, R. V.
    2016 IEEE INTERNATIONAL CONFERENCE ON RECENT TRENDS IN ELECTRONICS, INFORMATION & COMMUNICATION TECHNOLOGY (RTEICT), 2016, : 2083 - 2087
  • [8] Information flow control in multithread applications based on access control lists
    Chou, Shih-Chien
    Lo, Wei-Kuang
    Lai, Chia-Wei
    INFORMATION AND SOFTWARE TECHNOLOGY, 2006, 48 (08) : 717 - 725
  • [9] Information Flow-Based Security Levels Assessment for Access Control Systems
    Boulares, Sofiene
    Adi, Kamel
    Logrippo, Luigi
    E-TECHNOLOGIES, MCETECH 2015, 2015, 209 : 105 - 121
  • [10] Information-Flow-Based Access Control for Web Browsers
    Yoshihama, Sachiko
    Tateishi, Takaaki
    Tabuchi, Naoshi
    Matsumoto, Tsutomu
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2009, E92D (05): : 836 - 850