Authorization Recycling in Attribute-Based Access Control

被引:0
|
作者
An Y. [1 ]
Helil N. [1 ]
机构
[1] College of Mathematics and System Science, Xinjiang University, Urumqi
关键词
D O I
10.1155/2023/4644778
中图分类号
学科分类号
摘要
In most access control scenarios, the communication between the PDP (policy decision point) and the PEP (policy enforcement point) can cause high authorization overhead. Authorization recycling enables PEP to use the previous access control decisions fetched from the PDP to handle some upcoming access control requests, reduce authorization costs, and increase the efficiency of access control decision-making. Inspired by the RBAC (role-based access control) authorization recycling mechanism, this article first presents an ABAC (attribute-based access control) model based on Boolean expressions of subject and object attributes. It then proposes an authorization recycling approach for this model. In this approach, we provide construction and update methods for authorization data caches and access control decision-making rules for SDP (secondary decision point) by using the caches. The proposed approach can deduce precise and approximate access control decisions from the cache of authorization data, reducing communication between the PEP and the PDP. Finally, the feasibility of the proposed method is verified by conducting a small-scale test. ABAC, SDP, authorization recycling, and authorization caching. © 2023 Yan An and Nurmamat Helil.
引用
收藏
相关论文
共 50 条
  • [1] Supporting attribute-based access control in authorization and authentication infrastructures with ontologies
    Priebe, Torsten
    Dobmeier, Wolfgang
    Schläger, Christian
    Kamprath, Nora
    Journal of Software, 2007, 2 (01) : 27 - 38
  • [2] Attribute-Based Access Control
    Hu, Vincent C.
    Kuhn, D. Richard
    Ferraiolo, David F.
    COMPUTER, 2015, 48 (02) : 85 - 88
  • [3] Using attribute-based access control to enable attribute-based messaging
    Bobba, Rakesh
    Fatemieh, Omid
    Khan, Fariba
    Gunter, Carl A.
    Khurana, Himanshu
    22ND ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2006, : 403 - +
  • [4] Authorization Management in Multi-Cloud Collaboration using Attribute-based Access Control
    John, John C.
    Sural, Shamik
    Gupta, Arobinda
    2016 15TH INTERNATIONAL SYMPOSIUM ON PARALLEL AND DISTRIBUTED COMPUTING (ISPDC), 2016, : 190 - 195
  • [5] Towards an Attribute-Based Authorization Model with Task-Role-Based Access Control for WfMS
    Liu, Kui
    Zhou, Zhurong
    Chen, Qianguo
    Yang, Xiaoli
    2015 IEEE 16TH INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY (ICCT), 2015, : 361 - 371
  • [6] Attribute-Based Oblivious Access Control
    Han, Jinguang
    Susilo, Willy
    Mu, Yi
    Yan, Jun
    COMPUTER JOURNAL, 2012, 55 (10): : 1202 - 1215
  • [7] SCAuth: Selective Cloud User Authorization for Ciphertext-Policy Attribute-Based Access Control
    Sultan, Nazatul Haque
    Barbhuiya, Ferdous Ahmed
    Sarma, Nityananda
    2017 IEEE INTERNATIONAL CONFERENCE ON CLOUD COMPUTING IN EMERGING MARKETS (CCEM 2017), 2017, : 93 - 98
  • [8] Using Chinese Natural Language to Configure Authorization Policies in Attribute-Based Access Control System
    Shen, Zhuoxiang
    Gao, Neng
    Liu, Zeyi
    Li, Min
    Wang, Chuanyin
    SCIENCE OF CYBER SECURITY, SCISEC 2021, 2021, 13005 : 110 - 125
  • [9] Guaranteeing anonymity in attribute-based authorization
    Lanus, Erin
    Colbourn, Charles J.
    Ahn, Gail-Joon
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2024, 87
  • [10] Attribute-Based Authorization for Grid Computing
    Khider, Husam
    Osman, Taha
    Sherkat, Nasser
    UKSIM-AMSS FIRST INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS, MODELLING AND SIMULATION, 2010, : 71 - 74