A Model Checking Based Approach for Verification of Attribute-Based Access Control Policies in Cloud Infrastructures

被引:0
作者
Kotenko, Igor [1 ,2 ]
Saenko, Igor [1 ,2 ]
Levshun, Dmitry [1 ,2 ]
机构
[1] Russian Acad Sci SPIIRAS, St Petersburg Inst Informat & Automat, 14 Th Liniya,39, St Petersburg 199178, Russia
[2] St Petersburg Natl Res Univ Informat Technol Mech, ITMO Univ, 49 Kronverkskiy Prospekt, St Petersburg 197101, Russia
来源
PROCEEDINGS OF THE FOURTH INTERNATIONAL SCIENTIFIC CONFERENCE INTELLIGENT INFORMATION TECHNOLOGIES FOR INDUSTRY (IITI'19) | 2020年 / 1156卷
关键词
Access control; Model checking; Temporal logics; ABAC; Cloud infrastructure;
D O I
10.1007/978-3-030-50097-9_17
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Attribute-Based Access Control (ABAC) model is a perspective access control model for cloud infrastructures used for automation of industrial, transport and energy systems as they include large number of users, resources and dynamical changed permissions. The paper considers the features of ABAC model and the theoretical background for verification of the ABAC policies based on the model checking. The possibility of applying the model checking is justified on the example of the ABAC policy. Implementation of the proposed approach was made using the UPPAAL verification tool. Experimental assessment shows high acceptability of the model checking not only for finding anomalies in ABAC policies but for finding decisions to eliminate them.
引用
收藏
页码:165 / 175
页数:11
相关论文
共 50 条
  • [41] Attribute-based Access Control for Cloud-based Electronic Health Record (EHR) Systems
    Zarezadeh, Maryam
    Taluki, Maede Ashouri
    Siavashi, Mohammad
    ISECURE-ISC INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2020, 12 (02): : 129 - 140
  • [42] Attribute-Based Access Control with Constant-Size Ciphertext in Cloud Computing
    Teng, Wei
    Yang, Geng
    Xiang, Yang
    Zhang, Ting
    Wang, Dongyang
    IEEE TRANSACTIONS ON CLOUD COMPUTING, 2017, 5 (04) : 617 - 627
  • [43] Immediate attribute revocation in decentralized attribute-based access control
    Imine, Youcef
    Lounis, Ahmed
    Bouabdallah, Abdelmadjid
    2017 16TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS / 11TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING / 14TH IEEE INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS, 2017, : 33 - 40
  • [44] Efficiently Supporting Attribute-Based Access Control in Relational Databases
    Meena, Gaurav
    Paul, Proteet
    Sural, Shamik
    2023 5TH IEEE INTERNATIONAL CONFERENCE ON TRUST, PRIVACY AND SECURITY IN INTELLIGENT SYSTEMS AND APPLICATIONS, TPS-ISA, 2023, : 230 - 239
  • [45] POSTER: Enabling Attribute-Based Access Control in Linux Kernel
    Varshith, H. O. Sai
    Sural, Shamik
    Vaidya, Jaideep
    Atluri, Vijayalakshmi
    ASIA CCS'22: PROCEEDINGS OF THE 2022 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2022, : 1237 - 1239
  • [46] Trust and Attribute-based Dynamic Access Control Model For Internet of Things
    Wang, Junshe
    Wang, Han
    Zhang, Hongbin
    Cao, Ning
    2017 INTERNATIONAL CONFERENCE ON CYBER-ENABLED DISTRIBUTED COMPUTING AND KNOWLEDGE DISCOVERY (CYBERC), 2017, : 342 - 345
  • [47] Automatic Generation of Attribute-Based Access Control Policies from Natural Language Documents
    Shan, Fangfang
    Wang, Zhenyu
    Liu, Mengyao
    Zhang, Menghan
    CMC-COMPUTERS MATERIALS & CONTINUA, 2024, 80 (03): : 3881 - 3902
  • [48] An Attribute-Based Access Control Model in RFID Systems Based on Blockchain Decentralized Applications for Healthcare Environments
    Figueroa, Santiago
    Anorga, Javier
    Arrizabalaga, Saioa
    COMPUTERS, 2019, 8 (03)
  • [49] Attribute-based data access control in mobile cloud computing: Taxonomy and open issues
    Sookhak, Mehdi
    Yu, F. Richard
    Khan, Muhammad Khurram
    Xiang, Yang
    Buyya, Rajkumar
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2017, 72 : 273 - 287
  • [50] Extended File Hierarchy Access Control Scheme with Attribute-Based Encryption in Cloud Computing
    Li, Jiguo
    Chen, Ningyu
    Zhang, Yichen
    IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING, 2021, 9 (02) : 983 - 993