Tuple-Based Access Control: a Provenance-Based Information Flow Control for Relational Data

被引:0
|
作者
Thion, Romuald [1 ]
Lesueur, Francois [2 ]
Talbi, Meriam [2 ]
机构
[1] Univ Lyon 1, CNRS LIRIS, UMR5205, F-69622 Villeurbanne, France
[2] INSA Lyon, CNRS LIRIS, UMR5205, F-69621 Villeurbanne, France
来源
30TH ANNUAL ACM SYMPOSIUM ON APPLIED COMPUTING, VOLS I AND II | 2015年
关键词
access control; relational databases; provenance; information flow; personal data server;
D O I
10.1145/2695664.2695758
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
This paper proposes a flexible control framework for relational personal data that enforces data originators' dissemination policies. Inspired by the sticky policy paradigm and mandatory access control, dissemination policies are linked with atomic data and are combined when different pieces of data are merged. The background setting of relational provenance guarantees that the policy combining operations behave accordingly to the operations carried out on the data. We show that the framework can capture a large class of policies similar to those of lattice-based access control models and that it can be integrated seamlessly into relational database management systems. In particular, we define a path oriented dissemination control model where policies define authorized chains of transfers between databases. Promising ongoing research work include the generalization of the theoretical framework to more expressive query languages including aggregation and difference operators as well as experiments on secure tokens.
引用
收藏
页码:2165 / 2170
页数:6
相关论文
共 50 条
  • [21] Attribute-Based Information Flow Control
    Han, Jinguang
    Bei, Maoxuan
    Chen, Liqun
    Xiang, Yang
    Cao, Jie
    Guo, Fuchun
    Meng, Weizhi
    COMPUTER JOURNAL, 2019, 62 (08) : 1214 - 1231
  • [22] Purpose based access control for privacy protection in relational database systems
    Ji-Won Byun
    Ninghui Li
    The VLDB Journal, 2008, 17 : 603 - 619
  • [23] Access Control and Information Flow Control for Web Services Security
    Kedjar, Saadia
    Tari, Abdelkamel
    Bertok, Peter
    INTERNATIONAL JOURNAL OF INFORMATION TECHNOLOGY AND WEB ENGINEERING, 2016, 11 (01) : 44 - 76
  • [24] Medical Information Access Control Method Based on Weighted Information Entropy
    Zheng, Lijuan
    Zhang, Linhao
    Cui, Meng
    Chen, Jianyou
    Yang, Shaobo
    Li, Zhaoxuan
    CLOUD COMPUTING AND SECURITY, PT III, 2018, 11065 : 113 - 122
  • [25] Verification of Information Flow and Access Control Policies with Dependent Types
    Nanevski, Aleksandar
    Banerjee, Anindya
    Garg, Deepak
    2011 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2011), 2011, : 165 - 179
  • [26] Access control in very loosely structured data model using relational databases
    Pan, Ying
    Tang, Yong
    Liu, Hai
    Tien Tzu Hsueh Pao/Acta Electronica Sinica, 2012, 40 (03): : 600 - 606
  • [27] Access Control Policies for Relational Databases in Data Exchange Process
    Jbali, Adel
    Sassi, Salma
    DATABASE AND EXPERT SYSTEMS APPLICATIONS, DEXA 2017, PT I, 2017, 10438 : 264 - 271
  • [28] Research on a Data Access Control Model based on Region
    Zhong, Qi
    Xiu, Jiapeng
    Yang, Zhengqiu
    Liu, Chen
    PROCEEDINGS OF 2016 SIXTH INTERNATIONAL CONFERENCE ON INSTRUMENTATION & MEASUREMENT, COMPUTER, COMMUNICATION AND CONTROL (IMCCC 2016), 2016, : 936 - 940
  • [29] Ontology-based Access Control for FAIR Data
    Brewster, Christopher
    Nouwt, Barry
    Raaijmakers, Stephan
    Verhoosel, Jack
    DATA INTELLIGENCE, 2020, 2 (1-2) : 66 - 77
  • [30] Purpose based Access Control for Privacy Protection in Object Relational Database Systems
    Shyni, C. Emilin C.
    Swamynathan, S.
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON DATA STORAGE AND DATA ENGINEERING (DSDE 2010), 2010, : 90 - 94