An Access Control Model Based on System Security Risk for Dynamic Sensitive Data Storage in the Cloud
Abstract
:1. Introduction
2. Literature Review
3. Risk Assessment-Based Dynamic Access Model
3.1. Request a Risk Assessment
3.1.1. Establishment of Risk Assessment Indicators for Access Requests
3.1.2. Calculation and Standardization of Attribute Evidence
3.1.3. Indicator Weight Calculation
- (1)
- Evidence Layer—Attribute Layer:
- (2)
- Attribute Layer—Target Layer:
- (3)
- Risk calculation:
3.1.4. Risk Assessment Process
3.2. Policy Rule Checking
- Four elements , representing the subject set, the object set, the environment set, and the operation set, respectively.
- Subject attribute , object attribute , resource attribute and operational attribute , where
- The attribute assignment relationship of the corresponding instances V, X, Y, and Z:
- In policy rule ABAC, policy z is specified as , sign indicates authorization (0 or 1). There could be several policies that a request matches. Equation (9) illustrates how the security policy library’s policy rules impact the outcome of the present request .
3.3. Comprehensive Decision-Making
- When the detection result of the policy rule is deny, the request is rejected regardless of the risk assessment result, that is, the comprehensive decision H is deny.
- When the policy rule detection result is allow, the decision is based on the risk assessment result: when the requested risk assessment value is , it indicates that the request risk value is low, the system resources are in a safe state, and the comprehensive decision is allow; When the risk assessment value of the request is greater than , it means that the request risk is very high, and the comprehensive decision is deny; when the risk assessment value of the request is , it means that the request risk value is high and the system resources are in a relatively unsafe state. The configuration determines whether the decision result is deny or allow. For example, if the administrator sets a low-risk tolerance of the system, the comprehensive decision is deny, and if the risk tolerance is high, allow.
3.4. Implementation of The Proposed Model on XACML
- The user makes an access request , where represent the subject, the action, and the resource, respectively;
- The PEP submits the user request to the PIP through the XACML context syntax;
- PIP queries the relevant attribute engine to obtain the context attribute information of the current (IP address, MAC address, time, etc.);
- The attribute engine returns the property value of ;
- PIP adds the context attribute value to the request and passes it to the PEP through the XACML context;
- PEP submits the reconstructed to the policy rule detection module and risk monitoring module of the PDP;
- The policy rule detection module performs static rule judgment on the request according to the policy rule and obtains the judgment result . The risk assessment module adopts the method proposed in Section 3.1 to evaluate the risk of the access request and obtains the risk assessment result ;
- The risk assessment detection result and the policy rule detection result are submitted to the comprehensive assessment module, which performs a comprehensive assessment of the risk assessment result and the rule assessment result, and gives the comprehensive assessment result ;
- The decision module determines whether the decision for the current request is allow or deny according to the value of .
4. Experimental Results
4.1. Experimental Environment
4.2. Experimental Results and Analysis
5. Conclusions
- In risk-based access control, the selection of risk judgment indicators is not perfect, and the judgment of subjects and resources and the experimental part need to be further improved.
- With the advent of the era of big data, how to ensure the storage security of massive data is a direction worth studying.
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
References
- Atlam, H.F.; Alenezi, A.; Walters, R.J.; Wills, G.B. An overview of risk estimation techniques in risk-based access control for the internet of things. In Proceedings of the 2nd International Conference on Internet of Things, Big Data and Security, Porto, Portugal, 24–26 April 2017; pp. 254–260. [Google Scholar] [CrossRef]
- Bezzateev, S.V.; Elina, T.N.; Mylnikov, V.A.; Livshitz, I.I. Risk assessment methodology for information systems, based on the user behavior and it-security incidents analysis. Sci. Tech. J. Inf. Technol. Mech. Opt. 2021, 21, 553–561. [Google Scholar] [CrossRef]
- Santos, D.R.D.; Westphall, C.M.; Westphall, C.B. A dynamic risk-based access control architecture for cloud computing. In Proceedings of the IEEE/IFIP NOMS 2014—IEEE/IFIP Network Operations and Management Symposium: Management in a Software Defined World, Krakow, Poland, 5–9 May 2014. [Google Scholar] [CrossRef]
- Chen, A.; Xing, H.; She, K.; Duan, G. A Dynamic Risk-Based Access Control Model for Cloud Computing. In Proceedings of the 2016 IEEE International Conferences on Big Data and Cloud Computing (BDCloud), Social Computing and Networking (SocialCom), Sustainable Computing and Communications (SustainCom) (BDCloud-SocialCom-SustainCom), Atlanta, GA, USA, 8–10 October 2016; pp. 579–584. [Google Scholar] [CrossRef]
- Bijon, K.Z.; Krishnan, R.; Sandhu, R. A framework for risk-aware role based access control. In Proceedings of the 2013 IEEE Conference on Communications and Network Security, CNS, National Harbor, MD, USA, 14–16 October 2013; pp. 462–469. [Google Scholar] [CrossRef]
- Shaikh, R.A.; Adi, K.; Logrippo, L. Dynamic risk-based decision methods for access control systems. Comput. Secur. 2012, 31, 447–464. [Google Scholar] [CrossRef]
- Younis, Y.A.; Kifayat, K.; Merabti, M. An access control model for cloud computing. J. Inf. Secur. Appl. 2014, 19, 45–60. [Google Scholar] [CrossRef]
- Namasudra, S.; Roy, P. PpBAC: Popularity based access control model for cloud computing. J. Organ. End User Comput. 2018, 30, 14–31. [Google Scholar] [CrossRef]
- Sabzmakan, A.; Mirtaheri, S.L. An Improved Distributed Access Control Model in Cloud Computing by Blockchain. In Proceedings of the 26th International Computer Conference, Computer Society of Iran, CSICC, Tehran, Iran, 3–4 March 2021. [Google Scholar] [CrossRef]
- Yang, C.; Tan, L.; Shi, N.; Xu, B.; Cao, Y.; Yu, K. AuthPrivacyChain: A Blockchain-Based Access Control Framework with Privacy Protection in Cloud. IEEE Access 2020, 8, 70604–70615. [Google Scholar] [CrossRef]
- Lin, G.; Wang, D.; Bie, Y.; Lei, M. MTBAC: A mutual trust based access control model in Cloud computing. China Commun. 2014, 11, 154–162. [Google Scholar] [CrossRef]
- Chunge, L.; Mingji, M.; Bingxu, L.; Shuxin, C. Design and Implementation of Trust-based Access Control Model for Cloud Computing. In Proceedings of the IEEE Advanced Information Technology, Electronic and Automation Control Conference (IAEAC), Chongqing, China, 12–14 March 2021; pp. 1934–1938. [Google Scholar] [CrossRef]
- Wu, Y.; Liu, P. Research on Trust-Role Access Control Model in Cloud Computing. Int. J. Adv. Netw. Monit. Control. 2019, 4, 75–80. [Google Scholar] [CrossRef] [Green Version]
- Satoh, I. Context-aware access control model for services provided from cloud computing. Stud. Comput. Intell. 2017, 737, 285–295. [Google Scholar] [CrossRef]
- Ni, Q.; Bertino, E.; Lobo, J. Risk-based access control systems built on fuzzy inferences. In Proceedings of the 5th International Symposium on Information, Computer and Communications Security, ASIACCS 2010, New York, NY, USA, 13 April 2010; pp. 250–260. [Google Scholar] [CrossRef]
- Cheng, P.C.; Rohatgi, P.; Keser, C.; Karger, P.A.; Wagner, G.M.; Reninger, A.S. Fuzzy Multi-Level Security: An experiment on quantified risk-adaptive access control. In Proceedings of the IEEE Symposium on Security and Privacy, Berkeley, CA, USA, 20–23 May 2007; pp. 222–227. [Google Scholar] [CrossRef]
- Li, J.; Bai, Y.; Zaman, N. A fuzzy modeling approach for risk-based access control in eHealth cloud. In Proceedings of the 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, Melbourne, VIC, Australia, 16–18 July 2013; pp. 17–23. [Google Scholar] [CrossRef]
- Badar, N.; Vaidya, J.; Atluri, V.; Shafiq, B. Risk Based Access Control Using Classification. In Automated Security Management; Al-Shaer, E., Ou, X., Xie, G., Eds.; Springer International Publishing: Cham, Switzeland, 2013; pp. 79–95. [Google Scholar] [CrossRef]
- Atlam, H.F.; Azad, M.A.; Fadhel, N.F. Efficient NFS Model for Risk Estimation in a Risk-Based Access Control Model. Sensors 2022, 22, 2005. [Google Scholar] [CrossRef] [PubMed]
- Atlam, H.F.; Azad, M.A.; Alassafi, M.O.; Alshdadi, A.A.; Alenezi, A. Risk-based access control model: A systematic literature review. Future Internet 2020, 12, 103. [Google Scholar] [CrossRef]
- Khan, A.J.; Mehfuz, S. Secure access control model for cloud computing environment with fuzzy max interval trust values. Int. J. Adv. Comput. Sci. Appl. 2020, 11, 536–542. [Google Scholar] [CrossRef]
- Kesarwani, A.; Khilar, P.M. Development of trust based access control models using fuzzy logic in cloud computing. J. King Saud Univ. - Comput. Inf. Sci. 2022, 34, 1958–1967. [Google Scholar] [CrossRef]
- Beraka, M.; Al-Muhtadi, J. Critical comparison of access control models for cloud computing. J. Internet Technol. 2015, 16, 431–442. [Google Scholar] [CrossRef]
- Almutairi, S.; Alghanmi, N.; Monowar, M.M. Survey of Centralized and Decentralized Access Control Models in Cloud Computing. Int. J. Adv. Comput. Sci. Appl. 2021, 12, 339–346. [Google Scholar] [CrossRef]
- Shan, T.L.; Ismail, S.A.; Azizan, A. Access Control Models for Cloud Computing: A Review. In Proceedings of the 2018 2nd International Conference on Telematics and Future Generation Networks, TAFGEN, Kuching, Malaysia, 24–26 July 2018; pp. 155–158. [Google Scholar] [CrossRef]
- Cai, F.; Zhu, N.; He, J.; Mu, P.; Li, W.; Yu, Y. Survey of access control models and technologies for cloud computing. Clust. Comput. 2019, 22, 6111–6122. [Google Scholar] [CrossRef]
- Aftab, M.U.; Hamza, A.; Oluwasanmi, A.; Nie, X.; Sarfraz, M.S.; Shehzad, D.; Qin, Z.; Rafiq, A. Traditional and Hybrid Access Control Models: A Detailed Survey. Secur. Commun. Netw. 2022, 2022. [Google Scholar] [CrossRef]
- Aluvalu, R.K.; Muddana, L. A survey on access control models in cloud computing. Adv. Intell. Syst. Comput. 2015, 337, 653–664. [Google Scholar] [CrossRef]
- Liu, Z.; Gu, W.; Xia, J. Review of access control model. Comput. Mater. Contin. 2020, 61, 43–50. [Google Scholar] [CrossRef]
- Saaty, T.L. The analytic hierarchy and analytic network measurement processes: Applications to decisions under Risk. Eur. J. Pure Appl. Math. 2007, 1, 122–196. [Google Scholar] [CrossRef]
- Saaty, T.L. What is the analytic hierarchy process? In Mathematical Models for Decision Support; Springer: Berlin/Heidelberg, Germany, 1988; pp. 109–121. [Google Scholar]
1 | Read | 0.2 |
2 | Copy | 0.4 |
3 | Write | 0.6 |
4 | Execute | 0.8 |
Scale | Meaning |
---|---|
1 | The former is extremely less important than the latter |
3 | The former is slightly less important than the latter |
5 | Two factors are of equal importance compared to each other |
7 | The former is significantly more crucial than the latter |
9 | The former is far more crucial than the latter. |
2, 4, 6, 8 | indicate the midpoints between the aforementioned neighboring judgments. |
Level | Risk Description |
---|---|
Extreme risk level, data resources are very insecure | |
High-risk level, data resources are very insecure | |
At risk, data resources are very insecure | |
The risk level is lower, data resources are more secure | |
Low risk level, safe data resources |
Risk | ||||
---|---|---|---|---|
0.5 | 0.7 | 0.8 | 2 | |
0.3 | 0.5 | 0.6 | 1.4 | |
0.2 | 0.4 | 0.5 | 1.1 |
0.5 | 0.4 | 0.5 | 0.3 | 0.6 | |
0.6 | 0.5 | 0.6 | 0.4 | 0.7 | |
0.5 | 0.4 | 0.5 | 0.3 | 0.6 | |
0.7 | 0.6 | 0.7 | 0.5 | 0.9 | |
0.4 | 0.3 | 0.7 | 0.1 | 0.5 |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Alharbe, N.; Aljohani, A.; Rakrouki, M.A.; Khayyat, M. An Access Control Model Based on System Security Risk for Dynamic Sensitive Data Storage in the Cloud. Appl. Sci. 2023, 13, 3187. https://doi.org/10.3390/app13053187
Alharbe N, Aljohani A, Rakrouki MA, Khayyat M. An Access Control Model Based on System Security Risk for Dynamic Sensitive Data Storage in the Cloud. Applied Sciences. 2023; 13(5):3187. https://doi.org/10.3390/app13053187
Chicago/Turabian StyleAlharbe, Nawaf, Abeer Aljohani, Mohamed Ali Rakrouki, and Mashael Khayyat. 2023. "An Access Control Model Based on System Security Risk for Dynamic Sensitive Data Storage in the Cloud" Applied Sciences 13, no. 5: 3187. https://doi.org/10.3390/app13053187
APA StyleAlharbe, N., Aljohani, A., Rakrouki, M. A., & Khayyat, M. (2023). An Access Control Model Based on System Security Risk for Dynamic Sensitive Data Storage in the Cloud. Applied Sciences, 13(5), 3187. https://doi.org/10.3390/app13053187