Rewriting Graph-DB Queries to Enforce Attribute-Based Access Control

被引:0
|
作者
Hofer, Daniel [1 ,2 ]
Mohamed, Aya [1 ,2 ]
Auer, Dagmar [1 ,2 ]
Nadschlaeger, Stefan [1 ]
Kueng, Josef [1 ,2 ]
机构
[1] Johannes Kepler Univ JKU Linz, Inst Applicat Oriented Knowledge Proc FAW, Linz, Austria
[2] Johannes Kepler Univ JKU Linz, Linz Inst Technol LIT, LIT Secure & Correct Syst Lab, Linz, Austria
来源
DATABASE AND EXPERT SYSTEMS APPLICATIONS, DEXA 2023, PT I | 2023年 / 14146卷
关键词
query rewriting; attribute-based access control (ABAC); graph databases; database security; Cypher;
D O I
10.1007/978-3-031-39847-6_34
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
To provide Attribute-Based Access Control (ABAC) in a data-store, we can either rely on built-in features or, especially if they are not present, implement access control as a service (ACaaS) on top of the database. We address the latter, in particular for graph databases, by rewriting queries which are violating access control conditions. We intercept the insecure queries right before sending them to the database to add additional filters. Thus, the database returns only authorized data and implicitly enforces ABAC beyond its own access control features. Our contributions are an authorization policy model influenced by XACML and a query rewriting algorithm for enforcing the defined authorizations with respect to this model. Our concept is application- and database-independent and operates on simple freely formulated queries, i.e. the queries do not have to follow a predefined structure. A proof-of-concept prototype has been implemented for Neo4j and its query language Cypher.
引用
收藏
页码:431 / 436
页数:6
相关论文
共 50 条
  • [41] Attribute-Based Access Control of Collaborative design systems
    Fan, Tongrang
    Guo, Hongyong
    Li, Yanjing
    MANUFACTURING SYSTEMS AND INDUSTRY APPLICATIONS, 2011, 267 : 80 - 85
  • [42] On the Feasibility of Attribute-Based Encryption for WLAN Access Control
    Pisa, Claudio
    Dargahi, Tooska
    Caponi, Alberto
    Bianchi, Giuseppe
    Blefari-Melazzi, Nicola
    2017 IEEE 13TH INTERNATIONAL CONFERENCE ON WIRELESS AND MOBILE COMPUTING, NETWORKING AND COMMUNICATIONS (WIMOB), 2017, : 783 - 790
  • [43] Firewall for Attribute-Based Access Control in Smart Grids
    Ruland, Christoph
    Sassmannshausen, Jochen
    2018 THE 6TH IEEE INTERNATIONAL CONFERENCE ON SMART ENERGY GRID ENGINEERING (SEGE 2018), 2018, : 336 - 341
  • [44] Attribute-Based Access Control in an Adaptive Hypermedia System
    Ballesteros, Pedro
    Donoso, Yezid
    2009 FOURTH INTERNATIONAL CONFERENCE ON SYSTEMS (ICONS), 2009, : 114 - 119
  • [45] Integration of Attribute-based Access Control into Automotive Architectures
    Rumez, Marcel
    Duda, Alexander
    Gruender, Patrick
    Kriesten, Reiner
    Sax, Eric
    2019 30TH IEEE INTELLIGENT VEHICLES SYMPOSIUM (IV19), 2019, : 1916 - 1922
  • [46] Attribute-based lightweight reconfigurable access control policy
    Xie R.
    Li H.
    Shi G.
    Guo Y.
    Tongxin Xuebao/Journal on Communications, 2020, 41 (02): : 112 - 122
  • [47] Attribute-Based Hierarchical Access Control With Extendable Policy
    Xiao, Meiyan
    Li, Hongbo
    Huang, Qiong
    Yu, Shui
    Susilo, Willy
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2022, 17 : 1868 - 1883
  • [48] The research on attribute-based access control model for web
    Zhang, Hongqi
    Zhou, Jing
    Chen, Hongwu
    2007 INTERNATIONAL SYMPOSIUM ON COMPUTER SCIENCE & TECHNOLOGY, PROCEEDINGS, 2007, : 1126 - 1128
  • [49] Efficiently Supporting Attribute-Based Access Control in Linux
    Varshith, H. O. Sai
    Sural, Shamik
    Vaidya, Jaideep
    Atluri, Vijayalakshmi
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2024, 21 (04) : 2012 - 2026
  • [50] Oblivious Transfer with Complex Attribute-Based Access Control
    Xu, Lingling
    Zhang, Fangguo
    INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2010, 2011, 6829 : 370 - 395