Handling least privilege problem and role mining in RBAC

被引:16
|
作者
Huang, Hejiao [1 ,2 ]
Shang, Feng [1 ,2 ]
Liu, Jinling [1 ,2 ]
Du, Hongwei [1 ,2 ]
机构
[1] Shenzhen Grad Sch, Harbin Inst Technol, Shenzhen, Peoples R China
[2] Shenzhen Key Lab Internet Informat Collaborat, Shenzhen 518055, Peoples R China
基金
中国国家自然科学基金;
关键词
RBAC; Role mining; Greedy algorithm;
D O I
10.1007/s10878-013-9633-9
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
For a given role-based access control (RBAC) configuration, user-role assignment satisfying least privilege principle (specified as LPUAP) is one of the most important problems to be solved in information security. LPUAP has been proved to be NP-hard. This paper gives several efficient greedy algorithms for handling this problem. Experiment results show that the output of our algorithms is almost optimal while the running time is greatly reduced. In another case where a RBAC configuration is to be set up, minimizing the descriptive set of roles (specified as Basic-RMP) and minimizing the administrative assignments for roles (specified as Edge-RMP) can greatly decrease the management costs. Both role mining problems (i.e., Basic-RMP and Edge-RMP) have also been proved to be NP-hard. This paper converts Basic-RMP to set cover problem and Edge-RMP to weighted set cover problem, and two algorithms respectively named algorithm for Basic-RMP and algorithm for Edge-RMP, are designed. Experiment results show that the average similarity rate between role sets produced by algorithm and the original ones used in generating the dataset is above 90 %. However, in the process of converting role mining into Set Cover Problem, the number of candidate role set is very large. In order to reduce the complexity of the algorithm, this paper presents a new polynomial-time algorithm with a performance nearly the same as that of algorithm.
引用
收藏
页码:63 / 86
页数:24
相关论文
共 50 条
  • [1] Handling least privilege problem and role mining in RBAC
    Hejiao Huang
    Feng Shang
    Jinling Liu
    Hongwei Du
    Journal of Combinatorial Optimization, 2015, 30 : 63 - 86
  • [2] The Formalization of Least Privilege Mining in RBAC
    Dong, Lijun
    Kang, Xiaojun
    Song, Jun
    Wang, Maocai
    MATERIALS ENGINEERING FOR ADVANCED TECHNOLOGIES, PTS 1 AND 2, 2011, 480-481 : 1023 - 1027
  • [3] Greedy Algorithm for Least Privilege in RBAC Model
    Liu, Jinling
    Huang, Hejiao
    Du, Hongwei
    COMBINATORIAL OPTIMIZATION AND APPLICATIONS, 2011, 6831 : 537 - 545
  • [4] Mining Least Privilege Roles By Genetic Algorithm
    Dong, Lijun
    Wang, Maocai
    Kang, Xiaojun
    FRONTIERS OF MANUFACTURING AND DESIGN SCIENCE II, PTS 1-6, 2012, 121-126 : 4508 - 4512
  • [5] Using RBAC to Enforce the Principle of Least Privilege in Industrial Remote Maintenance Sessions
    Kern, Alexander
    Anderl, Reiner
    2018 FIFTH INTERNATIONAL CONFERENCE ON INTERNET OF THINGS: SYSTEMS, MANAGEMENT AND SECURITY, 2018, : 107 - 114
  • [6] Research on Role Mining Algorithms in RBAC
    Jiang, Jianguo
    Yuan, Xuebin
    Mao, Rui
    PROCEEDINGS OF THE 2018 2ND HIGH PERFORMANCE COMPUTING AND CLUSTER TECHNOLOGIES CONFERENCE (HPCCT 2018), 2018, : 1 - 5
  • [7] Taming role mining complexity in RBAC
    Colantonio, Alessandro
    Di Pietro, Roberto
    Ocello, Alberto
    Verde, Nino Vincenzo
    COMPUTERS & SECURITY, 2010, 29 (05) : 548 - 564
  • [8] Least Privileges and Role’s Inheritance of RBAC
    Asiedu Baffour Kojo
    WuhanUniversityJournalofNaturalSciences, 2006, (01) : 185 - 187
  • [9] Least privileges and role's inheritance of RBAC
    Han, Lan-Sheng
    Hong, Fan
    Kojo, Asiedu Baffour
    Wuhan University Journal of Natural Sciences, 2006, 11 (01) : 185 - 187
  • [10] Mining Least Privilege Attribute Based Access Control Policies
    Sanders, Matthew W.
    Yue, Chuan
    35TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSA), 2019, : 404 - 416