Rewriting Graph-DB Queries to Enforce Attribute-Based Access Control

被引:0
|
作者
Hofer, Daniel [1 ,2 ]
Mohamed, Aya [1 ,2 ]
Auer, Dagmar [1 ,2 ]
Nadschlaeger, Stefan [1 ]
Kueng, Josef [1 ,2 ]
机构
[1] Johannes Kepler Univ JKU Linz, Inst Applicat Oriented Knowledge Proc FAW, Linz, Austria
[2] Johannes Kepler Univ JKU Linz, Linz Inst Technol LIT, LIT Secure & Correct Syst Lab, Linz, Austria
来源
DATABASE AND EXPERT SYSTEMS APPLICATIONS, DEXA 2023, PT I | 2023年 / 14146卷
关键词
query rewriting; attribute-based access control (ABAC); graph databases; database security; Cypher;
D O I
10.1007/978-3-031-39847-6_34
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
To provide Attribute-Based Access Control (ABAC) in a data-store, we can either rely on built-in features or, especially if they are not present, implement access control as a service (ACaaS) on top of the database. We address the latter, in particular for graph databases, by rewriting queries which are violating access control conditions. We intercept the insecure queries right before sending them to the database to add additional filters. Thus, the database returns only authorized data and implicitly enforces ABAC beyond its own access control features. Our contributions are an authorization policy model influenced by XACML and a query rewriting algorithm for enforcing the defined authorizations with respect to this model. Our concept is application- and database-independent and operates on simple freely formulated queries, i.e. the queries do not have to follow a predefined structure. A proof-of-concept prototype has been implemented for Neo4j and its query language Cypher.
引用
收藏
页码:431 / 436
页数:6
相关论文
共 50 条
  • [21] Enabling Attribute-Based Access Control in NoSQL Databases
    Gupta, Eeshan
    Sural, Shamik
    Vaidya, Jaideep
    Atluri, Vijayalakshmi
    IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING, 2023, 11 (01) : 208 - 223
  • [22] Anonymity in Attribute-Based Access Control: Framework and Metric
    Zhang, Runnan
    Liu, Gang
    Kang, Hongzhaoning
    Wang, Quan
    Wan, Bo
    Luo, Nan
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2024, 21 (01) : 463 - 475
  • [23] On the Feasibility of Attribute-Based Access Control Policy Mining
    Chakraborty, Shuvra
    Sandhu, Ravi
    Krishnan, Ram
    2019 IEEE 20TH INTERNATIONAL CONFERENCE ON INFORMATION REUSE AND INTEGRATION FOR DATA SCIENCE (IRI 2019), 2019, : 245 - 252
  • [24] A New Attribute-Based Access Control Model for RDBMS
    Al-Saraireh, Jaafer
    Hassan, Majid
    CYBERNETICS AND INFORMATION TECHNOLOGIES, 2022, 22 (04) : 3 - 22
  • [25] Automated trust negotiation in attribute-based access control
    Winsborough, WH
    Jacobs, J
    DARPA INFORMATION SURVIVABILITY CONFERENCE AND EXPOSITION, VOL II, PROCEEDINGS, 2003, : 252 - 257
  • [26] Attribute-based Access Control for ICN Naming Scheme
    Li, Bing
    Verleker, Ashwin Prabhu
    Huang, Dijiang
    Wang, Zhijie
    Zhu, Yan
    2014 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2014, : 391 - 399
  • [27] Attribute-based access control policy specification language
    Ye, Chunxiao
    Zhong, Jiang
    Feng, Yong
    Journal of Southeast University (English Edition), 2008, 24 (03) : 260 - 263
  • [28] A Time and Mutable Attribute-Based Access Control Model
    Yang, Ran
    Lin, Chuang
    Feng, Fujun
    JOURNAL OF COMPUTERS, 2009, 4 (06) : 510 - 518
  • [29] Attribute-Based Access Control for Layered Grid Resources
    Lang, Bo
    Li, Hangyu
    Ni, Wenting
    COMMUNICATION AND NETWORKING, PT II, 2010, 120 : 31 - 40
  • [30] Efficient Attribute-Based Comparable Data Access Control
    Wang, Zhijie
    Huang, Dijiang
    Zhu, Yan
    Li, Bing
    Chung, Chun-Jen
    IEEE TRANSACTIONS ON COMPUTERS, 2015, 64 (12) : 3430 - 3443