Secure RDTs: Enforcing Access Control Policies for Offline Available JSON']JSON Data

被引:0
|
作者
Renaux, Thierry [1 ]
Van den Vonder, Sam [1 ]
De Meuter, Wolfgang [1 ]
机构
[1] Vrije Univ Brussel, Brussels, Belgium
来源
关键词
replicated data types; role-based access control; security; conflict-free replicated data types;
D O I
10.1145/3622802
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Replicated Data Types (RDTs) are a type of data structure that can be replicated over a network, where each replica can be kept (eventually) consistent with the other replicas. They are used in applications with intermittent network connectivity, since local (offline) edits can later be merged with the other replicas. Applications that want to use RDTs often have an inherent security component that restricts data access for certain clients. However, access control for RDTs is difficult to enforce for clients that are not running within a secure environment, e.g., web applications where the client-side software can be freely tampered with. In essence, an application cannot prevent a client from reading data which they are not supposed to read, and any malicious changes will also affect well-behaved clients. This paper proposes Secure RDTs (SRDTs), a data type that specifies role-based access control for offline-available JSON data. In brief, a trusted application server specifies a security policy based on roles with read and write privileges for certain fields of an SRDT. The server enforces read privileges by projecting the data and security policy to omit any non-readable fields for the user's given role, and it acts as an intermediary to enforce write privileges. The approach is presented as an operational semantics engineered in PLT Redex, which is validated by formal proofs and randomised testing in Redex to ensure that the formal specification is secure.
引用
收藏
页数:27
相关论文
共 50 条
  • [1] Efficient and Secure Encryption Adjustment for JSON']JSON Data
    Almarwani, Maryam
    Konev, Boris
    Lisitsa, Alexei
    PROCEEDINGS OF THE 8TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY (ICISSP), 2021, : 307 - 313
  • [2] Design and Implementation of Uniform Data Access Platform based on JSON']JSON
    Ding Chen-lu
    Wang Fang-xiao
    Wang Jun
    PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON MECHANICAL ENGINEERING AND CONTROL SYSTEMS (MECS2015), 2016, : 229 - 231
  • [3] Performance evaluation for signing JSON']JSON tokens in access control for the cloud of things
    Martins, Welington da Silva
    Estrella, Julio Cezar
    Bruschi, Sarita Mazzini
    de Melo de Azevedo, Leonildo Jose
    Andreazi, Gabriel Tomiatti
    2020 IEEE CLOUD SUMMIT, 2020, : 72 - 78
  • [4] Server for SQLite Database: Multithreaded HTTP Server with Synchronized Database Access and JSON']JSON Data-Interchange
    Noprianto
    Soewito, Benfano
    Isa, Sani Muhamad
    Iskandar, Karto
    Gaol, Ford Lumban
    Kosala, Raymond
    2017 19TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATIONS TECHNOLOGY (ICACT) - OPENING NEW ERA OF SMART SOCIETY, 2017, : 786 - 790
  • [5] JSON']JSON-based control model for SQL and NoSQL data conversion in hybrid cloud database
    Zhang, Lei
    Pang, Ke
    Xu, Jiangtao
    Niu, Bingxin
    JOURNAL OF CLOUD COMPUTING-ADVANCES SYSTEMS AND APPLICATIONS, 2022, 11 (01):
  • [6] FAD.js']js: Fast JSON']JSON Data Access Using JIT-based Speculative Optimizations
    Bonetta, Daniele
    Brantner, Matthias
    PROCEEDINGS OF THE VLDB ENDOWMENT, 2017, 10 (12): : 1778 - 1789
  • [7] Enforcing Access Control Policies over Data Stored on Untrusted Server
    Soltani, Naeimeh
    Jalili, Rasool
    2017 14TH INTERNATIONAL ISC (IRANIAN SOCIETY OF CRYPTOLOGY) CONFERENCE ON INFORMATION SECURITY AND CRYPTOLOGY (ISCISC), 2017, : 119 - 124
  • [8] Field access analysis for enforcing access control policies
    Lehmann, Kathrin
    Thiemann, Peter
    EMERGING TRENDS IN INFORMATION AND COMMUNICATION SECURITY, PROCEEDINGS, 2006, 3995 : 337 - 351
  • [9] Enforcing Role-Based Access Control for Secure Data Storage in the Cloud
    Zhou, Lan
    Varadharajan, Vijay
    Hitchens, Michael
    COMPUTER JOURNAL, 2011, 54 (10): : 1675 - 1687
  • [10] Modeling and Enforcing Access Control Policies for Smart Contracts
    Toberg, Jan-Philipp
    Schiffl, Jonas
    Reiche, Frederik
    Beckert, Bernhard
    Heinrich, Robert
    Reussner, Ralf
    2022 FOURTH IEEE INTERNATIONAL CONFERENCE ON DECENTRALIZED APPLICATIONS AND INFRASTRUCTURES (DAPPS 2022), 2022, : 38 - 47