Secure RDTs: Enforcing Access Control Policies for Offline Available JSON']JSON Data

被引:0
|
作者
Renaux, Thierry [1 ]
Van den Vonder, Sam [1 ]
De Meuter, Wolfgang [1 ]
机构
[1] Vrije Univ Brussel, Brussels, Belgium
来源
关键词
replicated data types; role-based access control; security; conflict-free replicated data types;
D O I
10.1145/3622802
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Replicated Data Types (RDTs) are a type of data structure that can be replicated over a network, where each replica can be kept (eventually) consistent with the other replicas. They are used in applications with intermittent network connectivity, since local (offline) edits can later be merged with the other replicas. Applications that want to use RDTs often have an inherent security component that restricts data access for certain clients. However, access control for RDTs is difficult to enforce for clients that are not running within a secure environment, e.g., web applications where the client-side software can be freely tampered with. In essence, an application cannot prevent a client from reading data which they are not supposed to read, and any malicious changes will also affect well-behaved clients. This paper proposes Secure RDTs (SRDTs), a data type that specifies role-based access control for offline-available JSON data. In brief, a trusted application server specifies a security policy based on roles with read and write privileges for certain fields of an SRDT. The server enforces read privileges by projecting the data and security policy to omit any non-readable fields for the user's given role, and it acts as an intermediary to enforce write privileges. The approach is presented as an operational semantics engineered in PLT Redex, which is validated by formal proofs and randomised testing in Redex to ensure that the formal specification is secure.
引用
收藏
页数:27
相关论文
共 50 条
  • [21] Data Tethers: Preventing Information Leakage by Enforcing Environmental Data Access Policies
    Fleming, Charles
    Peterson, Peter
    Kline, Erik
    Reiher, Peter
    2012 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2012,
  • [22] Managing Data Access on Clouds: A Generic Framework for Enforcing Security Policies
    Basescu, Cristina
    Leordeanu, Catalin
    Costan, Alexandru
    Carpen-Amarie, Alexandra
    Antoniu, Gabriel
    25TH IEEE INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS (AINA 2011), 2011, : 459 - 466
  • [23] Enforcing Agile Access Control Policies in Relational Databases using Views
    Papernot, Nicolas
    McDaniel, Patrick
    Walls, Robert J.
    2015 IEEE MILITARY COMMUNICATIONS CONFERENCE (MILCOM 2015), 2015, : 7 - 12
  • [24] Modeling and enforcing advanced access control policies in healthcare systems with SECTET
    Hafner, Michael
    Memon, Mukhtiar
    Alam, Muhammad
    MODELS IN SOFTWARE ENGINEERING, 2008, 5002 : 132 - 144
  • [25] Tolerant key assignment for enforcing complicated access control policies in a hierarchy
    Chang, Ya-Fen
    Chang, Chin-Chen
    FUNDAMENTA INFORMATICAE, 2007, 76 (1-2) : 13 - 23
  • [26] Cryptographic Protocols for Enforcing Relationship-based Access Control Policies
    Pang, Jun
    Zhang, Yang
    39TH ANNUAL IEEE COMPUTERS, SOFTWARE AND APPLICATIONS CONFERENCE (COMPSAC 2015), VOL 2, 2015, : 484 - 493
  • [27] ACStream: Enforcing Access Control Over Data Streams
    Cao, Jianneng
    Carminati, Barbara
    Ferrari, Elena
    Tan, Kian-Lee
    ICDE: 2009 IEEE 25TH INTERNATIONAL CONFERENCE ON DATA ENGINEERING, VOLS 1-3, 2009, : 1495 - +
  • [28] A new key assignment scheme for enforcing complicated access control policies in hierarchy
    Lin, IC
    Hwang, MS
    Chang, CC
    FUTURE GENERATION COMPUTER SYSTEMS, 2003, 19 (04) : 457 - 462
  • [29] Developing and Enforcing Policies for Access Control, Resource Usage, and Adaptation - A Practical Approach
    Margheri, Andrea
    Masi, Massimiliano
    Pugliese, Rosario
    Tiezzi, Francesco
    WEB SERVICES AND FORMAL METHODS, WS-FM 2013, 2014, 8379 : 85 - 105
  • [30] A security punctuation framework for enforcing access control on streaming data
    Nehme, Rimma V.
    Rundensteiner, Elke A.
    Bertino, Elisa
    2008 IEEE 24TH INTERNATIONAL CONFERENCE ON DATA ENGINEERING, VOLS 1-3, 2008, : 406 - +