Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/3322431.3325106acmconferencesArticle/Chapter ViewAbstractPublication PagessacmatConference Proceedingsconference-collections
research-article
Public Access

Efficient and Extensible Policy Mining for Relationship-Based Access Control

Published: 28 May 2019 Publication History

Abstract

Relationship-based access control (ReBAC) is a flexible and expressive framework that allows policies to be expressed in terms of chains of relationship between entities as well as attributes of entities. ReBAC policy mining algorithms have a potential to significantly reduce the cost of migration from legacy access control systems to ReBAC, by partially automating the development of a ReBAC policy. Existing ReBAC policy mining algorithms support a policy language with a limited set of operators; this limits their applicability.
This paper presents a ReBAC policy mining algorithm designed to be both (1) easily extensible (to support additional policy language features) and (2) scalable. The algorithm is based on Bui et al.'s evolutionary algorithm for ReBAC policy mining algorithm. First, we simplify their algorithm, in order to make it easier to extend and provide a methodology that extends it to handle new policy language features. However, extending the policy language increases the search space of candidate policies explored by the evolutionary algorithm, thus causes longer running time and/or worse results. To address the problem, we enhance the algorithm with a feature selection phase. The enhancement utilizes a neural network to identify useful features. We use the result of feature selection to reduce the evolutionary algorithm's search space. The new algorithm is easy to extend and, as shown by our experiments, is more efficient and produces better policies.

References

[1]
Manar Alohaly, Hassan Takabi, and Eduardo Blanco. 2018. A Deep LearningApproach for Extracting Attributes of ABAC Policies. In Proc. 23rd ACM on Symposium on Access Control Models and Technologies (SACMAT). ACM, 137--148.
[2]
Matthias Beckerle and Leonardo A. Martucci. 2013. Formal Definitions for Usable Access Control Rule Sets-From Goals to Metrics. In Proceedings of the Ninth Symposium on Usable Privacy and Security (SOUPS). ACM, Article 2, 11 pages.
[3]
Jasper Bogaerts, Maarten Decat, Bert Lagaisse, and Wouter Joosen. 2015. Entity-Based Access Control: supporting more expressive access control policies. In Proceedings of the 31st Annual Computer Security Applications Conference (ACSAC2015). ACM, 291--300. https://lirias.kuleuven.be/handle/123456789/521795
[4]
Thang Bui, Scott D. Stoller, and Jiajie Li. 2017. Mining Relationship-Based Access Control Policies. In Proc. 22nd ACM Symposium on Access Control Models and Technologies (SACMAT).
[5]
Thang Bui, Scott D. Stoller, and Jiajie Li. 2018. Mining Relationship-Based AccessControl Policies from Incomplete and Noisy Data. In Proceedings of the 11th International Symposium on Foundations & Practice of Security (FPS 2018) (Lecture Notes in Computer Science), Vol. 11358. Springer-Verlag.
[6]
Thang Bui, Scott D. Stoller, and Jiajie Li. 2019. Greedy and Evolutionary Algo-rithms for Mining Relationship-Based Access Control Policies. Computers & Security 80 (jan 2019), 317--333. Also available at http://arxiv.org/abs/1708.04749. An earlier version appeared as a short paper in ACM SACMAT 2017.
[7]
Carlos Cotrini, Thilo Weghorn, and David Basin. 2018. Mining ABAC Rulesfrom Sparse Logs. In Proc. 3rd IEEE European Symposium on Security and Privacy(Euro S&P). 2141--2148.
[8]
Saptarshi Das, Barsha Mitra, Vijayalakshmi Atluri, Jaideep Vaidya, and ShamikSural. 2018. Policy Engineering in RBAC and ABAC. Lecture Notes in Computer Science, Vol. 11170. Shaker Verlag, 24--54.
[9]
Maarten Decat, Jasper Bogaerts, Bert Lagaisse, and Wouter Joosen. 2014. Thee-document case study: functional analysis and access control requirements. CW Reports CW 654. Department of Computer Science, KU Leuven.
[10]
Maarten Decat, Jasper Bogaerts, Bert Lagaisse, and Wouter Joosen. 2014.Theworkforce management case study: functional analysis and access control requirements. CW Reports CW 655. Department of Computer Science, KU Leuven.
[11]
FS-SEA* Software Release and ReBAC-Policies Data Release 2019. http://www.cs.stonybrook.edu/~stoller/software/.
[12]
Wenbo Guo, Dongliang Mu, Jun Xu, Purui Su, Gang Wang, and Xinyu Xing. 2018. LEMNA: Explaining Deep Learning Based Security Applications. In Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security(CCS '18). ACM.
[13]
Kaiming He, Xiangyu Zhang, Shaoqing Ren, and Jian Sun. 2015. Delving Deepinto Rectifiers: Surpassing Human-Level Performance on Image Net Classification. In The IEEE International Conference on Computer Vision (ICCV). IEEE Computer Society, 1026--1034.
[14]
Padmavathi Iyer and Amirreza Masoumzadeh. 2018. Mining Positive and Negative Attribute-Based Access Control Policy Rules. In Proc. 23rd ACM on Symposiumon Access Control Models and Technologies (SACMAT). ACM, 161--172.
[15]
Robert I. McKay, Nguyen Xuan Hoai, Peter Alexander Whigham, Yin Shan,and Michael O'Neill. 2010. Grammar-based Genetic Programming: A Survey.Genetic Programming and Evolvable Machines11, 3 (Sep 2010), 365--396.
[16]
Eric Medvet, Alberto Bartoli, Barbara Carminati, and Elena Ferrari. 2015. Evo-lutionary Inference of Attribute-based Access Control Policies. In Proceedings of the 8th International Conference on Evolutionary Multi-Criterion Optimization(EMO): Part I (Lecture Notes in Computer Science), Vol. 9018. Springer, 351--365.
[17]
Barsha Mitra, Shamik Sural, Jaideep Vaidya, and Vijayalakshmi Atluri. 2016. A Survey of Role Mining. Comput. Surveys 48, 4 (2016), 50:1--50:37.
[18]
Decebal C. Mocanu, Faith Turkmen, and Antonio Liotta. 2015. Towards ABAC policy mining from logs with deep learning. In Proc. 18th International Information Society Multiconference (IS 2015), Intelligent Systems. Institut Jozef Stefan, Ljubljana, Slovenia.
[19]
Ian Molloy, Hong Chen, Tiancheng Li, Qihua Wang, Ninghui Li, Elisa Bertino,Seraphin B. Calo, and Jorge Lobo. 2010. Mining Roles with Multiple Objectives. ACM Trans. Inf. Syst. Secur.13, 4, Article 36 (2010), 36:1--36:35 pages.
[20]
Masoud Narouei, Hamed Khanpour, and Hassan Takabi. 2017. Identification of Access Control Policy Sentences from Natural Language Policy Documents. In Proc. 31st Annual IFIP WG 11.3 Conference on Data and Applications Security and Privacy (DBSec) (Lecture Notes in Computer Science), Vol. 10359. Springer, 82--100.
[21]
Ramprasaath R Selvaraju, Michael Cogswell, Abhishek Das, Ramakrishna Vedantam, Devi Parikh, and Dhruv Batra. 2017. Grad-cam: Visual explanations from deep networks via gradient-based localization. In 2017 IEEE International Conference on Computer Vision (ICCV). IEEE, 618--626.
[22]
Zhongyuan Xu and Scott D. Stoller. 2014. Mining Attribute-Based Access Control Policies from Logs. In Proc. 28th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (DBSec). Springer. Extended version available at http://arxiv.org/abs/1403.5715.
[23]
Zhongyuan Xu and Scott D. Stoller. 2015. Mining Attribute-based Access Control Policies. IEEE Transactions on Dependable and Secure Computing 12, 5 (Sep.-Oct.2015), 533--545.
[24]
Matthew D. Zeiler. 2012. ADADELTA: An Adaptive Learning Rate Method. CoRRabs/1212.5701 (2012). arXiv:1212.5701 http://arxiv.org/abs/1212.5701

Cited By

View all
  • (2023)Mining Roles Based on User Dynamic Operation LogsRecent Advances in Computer Science and Communications10.2174/266625581666623090114531016:9Online publication date: Nov-2023
  • (2023)FLAP - A Federated Learning Framework for Attribute-based Access Control PoliciesProceedings of the Thirteenth ACM Conference on Data and Application Security and Privacy10.1145/3577923.3583641(263-272)Online publication date: 24-Apr-2023
  • (2023)System for Cross-Domain Identity Management (SCIM): Survey and Enhancement With RBACIEEE Access10.1109/ACCESS.2023.330427011(86872-86894)Online publication date: 2023
  • Show More Cited By

Index Terms

  1. Efficient and Extensible Policy Mining for Relationship-Based Access Control

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    SACMAT '19: Proceedings of the 24th ACM Symposium on Access Control Models and Technologies
    May 2019
    243 pages
    ISBN:9781450367530
    DOI:10.1145/3322431
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 28 May 2019

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. attribute-based access control
    2. feature selection
    3. relationship-based access control
    4. security policy mining

    Qualifiers

    • Research-article

    Funding Sources

    Conference

    SACMAT '19
    Sponsor:

    Acceptance Rates

    SACMAT '19 Paper Acceptance Rate 12 of 52 submissions, 23%;
    Overall Acceptance Rate 177 of 597 submissions, 30%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)109
    • Downloads (Last 6 weeks)21
    Reflects downloads up to 23 Nov 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2023)Mining Roles Based on User Dynamic Operation LogsRecent Advances in Computer Science and Communications10.2174/266625581666623090114531016:9Online publication date: Nov-2023
    • (2023)FLAP - A Federated Learning Framework for Attribute-based Access Control PoliciesProceedings of the Thirteenth ACM Conference on Data and Application Security and Privacy10.1145/3577923.3583641(263-272)Online publication date: 24-Apr-2023
    • (2023)System for Cross-Domain Identity Management (SCIM): Survey and Enhancement With RBACIEEE Access10.1109/ACCESS.2023.330427011(86872-86894)Online publication date: 2023
    • (2022)Effective Evaluation of Relationship-Based Access Control Policy MiningProceedings of the 27th ACM on Symposium on Access Control Models and Technologies10.1145/3532105.3535022(127-138)Online publication date: 7-Jun-2022
    • (2022)Learning Relationship-Based Access Control Policies from Black-Box SystemsACM Transactions on Privacy and Security10.1145/351712125:3(1-36)Online publication date: 19-May-2022
    • (2022)Mining Attribute-Based Access Control PoliciesInformation Systems Security10.1007/978-3-031-23690-7_11(186-201)Online publication date: 11-Dec-2022
    • (2021)Formal Analysis of ReBAC Policy Mining FeasibilityProceedings of the Eleventh ACM Conference on Data and Application Security and Privacy10.1145/3422337.3447828(197-207)Online publication date: 26-Apr-2021
    • (2021)Automating Audit with Policy Inference2021 IEEE 34th Computer Security Foundations Symposium (CSF)10.1109/CSF51468.2021.00001(1-16)Online publication date: Jun-2021
    • (2020)A Decision Tree Learning Approach for Mining Relationship-Based Access Control PoliciesProceedings of the 25th ACM Symposium on Access Control Models and Technologies10.1145/3381991.3395619(167-178)Online publication date: 10-Jun-2020
    • (2020)Active Learning of Relationship-Based Access Control PoliciesProceedings of the 25th ACM Symposium on Access Control Models and Technologies10.1145/3381991.3395614(155-166)Online publication date: 10-Jun-2020
    • Show More Cited By

    View Options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Login options

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media