Rewriting Graph-DB Queries to Enforce Attribute-Based Access Control

被引:0
|
作者
Hofer, Daniel [1 ,2 ]
Mohamed, Aya [1 ,2 ]
Auer, Dagmar [1 ,2 ]
Nadschlaeger, Stefan [1 ]
Kueng, Josef [1 ,2 ]
机构
[1] Johannes Kepler Univ JKU Linz, Inst Applicat Oriented Knowledge Proc FAW, Linz, Austria
[2] Johannes Kepler Univ JKU Linz, Linz Inst Technol LIT, LIT Secure & Correct Syst Lab, Linz, Austria
来源
DATABASE AND EXPERT SYSTEMS APPLICATIONS, DEXA 2023, PT I | 2023年 / 14146卷
关键词
query rewriting; attribute-based access control (ABAC); graph databases; database security; Cypher;
D O I
10.1007/978-3-031-39847-6_34
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
To provide Attribute-Based Access Control (ABAC) in a data-store, we can either rely on built-in features or, especially if they are not present, implement access control as a service (ACaaS) on top of the database. We address the latter, in particular for graph databases, by rewriting queries which are violating access control conditions. We intercept the insecure queries right before sending them to the database to add additional filters. Thus, the database returns only authorized data and implicitly enforces ABAC beyond its own access control features. Our contributions are an authorization policy model influenced by XACML and a query rewriting algorithm for enforcing the defined authorizations with respect to this model. Our concept is application- and database-independent and operates on simple freely formulated queries, i.e. the queries do not have to follow a predefined structure. A proof-of-concept prototype has been implemented for Neo4j and its query language Cypher.
引用
收藏
页码:431 / 436
页数:6
相关论文
共 50 条
  • [31] Attribute-Based Access Control Architectures with the eIDAS Protocols
    Morgner, Frank
    Bastian, Paul
    Fischlin, Marc
    SECURITY STANDARDISATION RESEARCH, SSR 2016, 2016, 10074 : 205 - 226
  • [32] Levelled attribute-based encryption for hierarchical access control
    Le, Huy Quoc
    Le, Phi Thuong
    Trinh, Sy Tuan
    Susilo, Willy
    Trinh, Viet Cuong
    COMPUTER STANDARDS & INTERFACES, 2025, 93
  • [33] Attribute-based access control management for multicloud collaboration
    John, John C.
    Sural, Shamik
    Gupta, Arobinda
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2017, 29 (19):
  • [34] Deconflicting policies in attribute-based access control systems
    Yahiaoui, Mohamed
    Zinedine, Ahmed
    Harti, Mostafa
    2018 IEEE 5TH INTERNATIONAL CONGRESS ON INFORMATION SCIENCE AND TECHNOLOGY (IEEE CIST'18), 2018, : 130 - 136
  • [35] Attribute-based access control policies composition algebra
    Lin, Li
    Huai, Jin-Peng
    Li, Xian-Xian
    Ruan Jian Xue Bao/Journal of Software, 2009, 20 (02): : 403 - 414
  • [36] Towards Integrating Attribute-Based Access Control into Ontologies
    Dundua, Besik
    Rukhaia, Mikheil
    2019 IEEE 2ND UKRAINE CONFERENCE ON ELECTRICAL AND COMPUTER ENGINEERING (UKRCON-2019), 2019, : 1052 - 1056
  • [37] Attribute-based Access Control for ICN Naming Scheme
    Li, Bing
    Huang, Dijiang
    Wang, Zhijie
    Zhu, Yan
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2018, 15 (02) : 194 - 206
  • [38] Attribute-based access control model for cloud computing
    Wang, Jingyu
    Feng, Lixiao
    Zheng, Xuefeng
    Zhongnan Daxue Xuebao (Ziran Kexue Ban)/Journal of Central South University (Science and Technology), 2015, 46 (06): : 2090 - 2097
  • [39] Evolutionary Inference of Attribute-Based Access Control Policies
    Medvet, Eric
    Bartoli, Alberto
    Carminati, Barbara
    Ferrari, Elena
    EVOLUTIONARY MULTI-CRITERION OPTIMIZATION, PT I, 2015, 9018 : 351 - 365
  • [40] An attribute-based access control model for Web services
    Shen Hai-bo
    Hong Fan
    SEVENTH INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED COMPUTING, APPLICATIONS AND TECHNOLOGIES, PROCEEDINGS, 2006, : 74 - +