Secure RDTs: Enforcing Access Control Policies for Offline Available JSON']JSON Data

被引:0
|
作者
Renaux, Thierry [1 ]
Van den Vonder, Sam [1 ]
De Meuter, Wolfgang [1 ]
机构
[1] Vrije Univ Brussel, Brussels, Belgium
来源
关键词
replicated data types; role-based access control; security; conflict-free replicated data types;
D O I
10.1145/3622802
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Replicated Data Types (RDTs) are a type of data structure that can be replicated over a network, where each replica can be kept (eventually) consistent with the other replicas. They are used in applications with intermittent network connectivity, since local (offline) edits can later be merged with the other replicas. Applications that want to use RDTs often have an inherent security component that restricts data access for certain clients. However, access control for RDTs is difficult to enforce for clients that are not running within a secure environment, e.g., web applications where the client-side software can be freely tampered with. In essence, an application cannot prevent a client from reading data which they are not supposed to read, and any malicious changes will also affect well-behaved clients. This paper proposes Secure RDTs (SRDTs), a data type that specifies role-based access control for offline-available JSON data. In brief, a trusted application server specifies a security policy based on roles with read and write privileges for certain fields of an SRDT. The server enforces read privileges by projecting the data and security policy to omit any non-readable fields for the user's given role, and it acts as an intermediary to enforce write privileges. The approach is presented as an operational semantics engineered in PLT Redex, which is validated by formal proofs and randomised testing in Redex to ensure that the formal specification is secure.
引用
收藏
页数:27
相关论文
共 50 条
  • [31] A secure mediator for integrating multiple level access control policies
    Cruz, Isabel F.
    Gjomemo, Rigel
    Orsini, Mirko
    KNOWLEDGE-BASED INTELLIGENT INFORMATION AND ENGINEERING SYSTEMS, PT 2, PROCEEDINGS, 2008, 5178 : 354 - 362
  • [32] Secure data access control with perception reasoning
    Rauf, Abdul
    Abdullah, Abdul Hanan
    Mateen, Abdul
    Ashraf, Mahmood
    ADCAIJ-ADVANCES IN DISTRIBUTED COMPUTING AND ARTIFICIAL INTELLIGENCE JOURNAL, 2018, 7 (01): : 13 - 28
  • [33] Enforcing Role-Based Access Control Policies in Web Services with UML and OCL
    Sohr, Karsten
    Mustafa, Tanveer
    Bao, Xinyu
    Ahn, Gail-Joon
    24TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2008, : 257 - +
  • [34] Pairing Human and Artificial Intelligence: Enforcing Access Control Policies with LLMs and Formal Specifications
    Rubio-Medrano, Carlos E.
    Kotak, Akash
    Wang, Wenlu
    Sohr, Karsten
    PROCEEDINGS OF THE 29TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES, SACMAT 2024, 2024, : 105 - 116
  • [35] Data Sharing in Presence of Access Control Policies
    Agoun, Juba
    Hacid, Mohand-Said
    ON THE MOVE TO MEANINGFUL INTERNET SYSTEMS: OTM 2019 CONFERENCES, 2019, 11877 : 301 - 309
  • [36] Specifying access control policies on data streams
    Carminati, Barbara
    Ferraris, Elena
    Tang, Kian Lee
    ADVANCES IN DATABASES: CONCEPTS, SYSTEMS AND APPLICATIONS, 2007, 4443 : 410 - +
  • [37] Automated Generation, Verification, and Ranking of Secure SoC Access Control Policies
    Meza, Andres
    Kastner, Ryan
    2023 CYBER-PHYSICAL SYSTEMS AND INTERNET-OF-THINGS WEEK, CPS-IOT WEEK WORKSHOPS, 2023, : 198 - 202
  • [38] Secure authorization, access control and data integrity in Bluetooth
    Nguyen, L
    Safavi-Naini, R
    Susilo, W
    Wysocki, T
    10TH IEEE INTERNATIONAL CONFERENCE ON NETWORKS (ICON 2002), PROCEEDINGS, 2002, : 428 - 433
  • [39] Secure access control to hidden data by biometric features
    Cancellaro, J.
    Carli, M.
    Egiazarian, K.
    Neri, A.
    MOBILE MULTIMEDIA/IMAGE PROCESSING FOR MILITARY AND SECURITY APPLICATIONS 2007, 2007, 6579
  • [40] Data Querying and Access Control for Secure Multiparty Computation
    von Maltitz, Marcel
    Bitzer, Dominik
    Carle, Georg
    2019 IFIP/IEEE SYMPOSIUM ON INTEGRATED NETWORK AND SERVICE MANAGEMENT (IM), 2019, : 171 - 179