Secure RDTs: Enforcing Access Control Policies for Offline Available JSON']JSON Data

被引:0
|
作者
Renaux, Thierry [1 ]
Van den Vonder, Sam [1 ]
De Meuter, Wolfgang [1 ]
机构
[1] Vrije Univ Brussel, Brussels, Belgium
来源
关键词
replicated data types; role-based access control; security; conflict-free replicated data types;
D O I
10.1145/3622802
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Replicated Data Types (RDTs) are a type of data structure that can be replicated over a network, where each replica can be kept (eventually) consistent with the other replicas. They are used in applications with intermittent network connectivity, since local (offline) edits can later be merged with the other replicas. Applications that want to use RDTs often have an inherent security component that restricts data access for certain clients. However, access control for RDTs is difficult to enforce for clients that are not running within a secure environment, e.g., web applications where the client-side software can be freely tampered with. In essence, an application cannot prevent a client from reading data which they are not supposed to read, and any malicious changes will also affect well-behaved clients. This paper proposes Secure RDTs (SRDTs), a data type that specifies role-based access control for offline-available JSON data. In brief, a trusted application server specifies a security policy based on roles with read and write privileges for certain fields of an SRDT. The server enforces read privileges by projecting the data and security policy to omit any non-readable fields for the user's given role, and it acts as an intermediary to enforce write privileges. The approach is presented as an operational semantics engineered in PLT Redex, which is validated by formal proofs and randomised testing in Redex to ensure that the formal specification is secure.
引用
收藏
页数:27
相关论文
共 50 条
  • [41] Correction to: Enforcing fine-grained access control for secure collaborative modelling using bidirectional transformations
    Csaba Debreceni
    Gábor Bergmann
    István Ráth
    Dániel Varró
    Software & Systems Modeling, 2019, 18 : 1771 - 1771
  • [42] A logical framework for reasoning on data access control policies
    Bertino, E
    Buccafurri, F
    Ferrari, E
    Rullo, P
    PROCEEDINGS OF THE 12TH IEEE COMPUTER SECURITY FOUNDATIONS WORKSHOP, 1999, : 175 - 189
  • [43] Logical framework for reasoning on data access control policies
    Bertino, Elisa
    Ferrari, Elena
    Buccafurri, Francesco
    Rullo, Pasquale
    Proceedings of the Computer Security Foundations Workshop, 1999, : 175 - 189
  • [44] Seamless secure development of systems: From Modeling to enforcement of access control policies
    Parsa, Saeed
    Damanafshan, Morteza
    2007 IEEE/ACS INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS AND APPLICATIONS, VOLS 1 AND 2, 2007, : 799 - +
  • [45] Enforcing a Risk Assessment Approach in Access Control Policies Management: Analysis, Correlation Study and Model Enhancement
    Evina, Pierrete Annie
    Ayachi, Faten Labbane
    Jaidi, Faouzi
    Bouhoula, Adel
    2019 15TH INTERNATIONAL WIRELESS COMMUNICATIONS & MOBILE COMPUTING CONFERENCE (IWCMC), 2019, : 1866 - 1871
  • [46] SACfe: Secure Access Control in Functional Encryption with Unbounded Data
    Dowerah, Uddipana
    Dutta, Subhranil
    Hartmann, Frank
    Mitrokotsa, Aikaterini
    Mukherjee, Sayantan
    Pal, Tapas
    9TH EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY, EUROS&P 2024, 2024, : 860 - 882
  • [47] Access control based on entity matching for secure data sharing
    Agoun, Juba
    Hacid, Mohand-Said
    SERVICE ORIENTED COMPUTING AND APPLICATIONS, 2022, 16 (01) : 31 - 44
  • [48] Policy Management for Secure Data Access Control in Vehicular Networks
    Dijiang Huang
    Wei-Tek Tsai
    Yi-hsin Tseng
    Journal of Network and Systems Management, 2011, 19 : 448 - 471
  • [49] Provably Secure Data Access Control Protocol for Cloud Computing
    Zhang, Ji
    Chen, Anmin
    Zhang, Ping
    SYMMETRY-BASEL, 2023, 15 (12):
  • [50] Policy Management for Secure Data Access Control in Vehicular Networks
    Huang, Dijiang
    Tsai, Wei-Tek
    Tseng, Yi-hsin
    JOURNAL OF NETWORK AND SYSTEMS MANAGEMENT, 2011, 19 (04) : 448 - 471