Handling least privilege problem and role mining in RBAC

被引:16
|
作者
Huang, Hejiao [1 ,2 ]
Shang, Feng [1 ,2 ]
Liu, Jinling [1 ,2 ]
Du, Hongwei [1 ,2 ]
机构
[1] Shenzhen Grad Sch, Harbin Inst Technol, Shenzhen, Peoples R China
[2] Shenzhen Key Lab Internet Informat Collaborat, Shenzhen 518055, Peoples R China
基金
中国国家自然科学基金;
关键词
RBAC; Role mining; Greedy algorithm;
D O I
10.1007/s10878-013-9633-9
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
For a given role-based access control (RBAC) configuration, user-role assignment satisfying least privilege principle (specified as LPUAP) is one of the most important problems to be solved in information security. LPUAP has been proved to be NP-hard. This paper gives several efficient greedy algorithms for handling this problem. Experiment results show that the output of our algorithms is almost optimal while the running time is greatly reduced. In another case where a RBAC configuration is to be set up, minimizing the descriptive set of roles (specified as Basic-RMP) and minimizing the administrative assignments for roles (specified as Edge-RMP) can greatly decrease the management costs. Both role mining problems (i.e., Basic-RMP and Edge-RMP) have also been proved to be NP-hard. This paper converts Basic-RMP to set cover problem and Edge-RMP to weighted set cover problem, and two algorithms respectively named algorithm for Basic-RMP and algorithm for Edge-RMP, are designed. Experiment results show that the average similarity rate between role sets produced by algorithm and the original ones used in generating the dataset is above 90 %. However, in the process of converting role mining into Set Cover Problem, the number of candidate role set is very large. In order to reduce the complexity of the algorithm, this paper presents a new polynomial-time algorithm with a performance nearly the same as that of algorithm.
引用
收藏
页码:63 / 86
页数:24
相关论文
共 50 条
  • [11] On the complexity of role updating feasibility problem in RBAC
    Lu, Jianfeng
    Xu, Dewu
    Jin, Lei
    Han, Jianmin
    Peng, Hao
    INFORMATION PROCESSING LETTERS, 2014, 114 (11) : 597 - 602
  • [12] Inter-domain Role Mapping and Least Privilege
    Chen, Liang
    Crampton, Jason
    SACMAT'07: PROCEEDINGS OF THE 12TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES, 2007, : 157 - 162
  • [13] Least privilege and more
    Schneider, FB
    COMPUTER SYSTEMS: THEORY, TECHNOLOGY AND APPLICATIONS: A TRIBUTE TO ROGER NEEDHAM, 2004, : 253 - 258
  • [14] Least privilege and more
    Cornell University
    不详
    不详
    IEEE Security and Privacy, 2003, 1 (05): : 55 - 59
  • [15] The RBAC based privilege management for authorization of wireless networks
    Park, DG
    Lee, YR
    ADVANCES IN WEB-AGE INFORMATION MANAGEMENT, PROCEEDINGS, 2003, 2762 : 314 - 326
  • [16] Mining Stable Roles in RBAC
    Colantonio, Alessandro
    Di Pietro, Roberto
    Ocello, Alberto
    Verde, Nino Vincenzo
    EMERGING CHALLENGES FOR SECURITY, PRIVACY AND TRUST: 24TH IFIP TC 11 INTERNATIONAL INFORMATION SECURITY CONFERENCE, SEC 2009, PROCEEDINGS, 2009, 297 : 259 - 269
  • [17] Analysis of Privilege Escalation Based on Hierarchical RBAC Model
    Ma, Li
    Yan, Yongjie
    Jiang, Huowen
    Zhou, Yanjie
    5TH ANNUAL INTERNATIONAL CONFERENCE ON INFORMATION SYSTEM AND ARTIFICIAL INTELLIGENCE (ISAI2020), 2020, 1575
  • [18] Design and Implementation of Privilege Management System Based on RBAC
    Lu Pengyu
    Song Hui
    He Liangjun
    EBM 2010: INTERNATIONAL CONFERENCE ON ENGINEERING AND BUSINESS MANAGEMENT, VOLS 1-8, 2010, : 5078 - 5081
  • [19] Enterprise privilege management based on T-RBAC
    Jin, Qiongcheng
    Yang, Shutang
    Jiang, Xinghao
    Li, Jianhua
    Jisuanji Gongcheng/Computer Engineering, 2004, 30 (19):
  • [20] Least Privilege in Separation Kernels
    Levin, Timothy E.
    Irvine, Cynthia E.
    Nguyen, Thuy D.
    E-BUSINESS AND TELECOMMUNICATION NETWORKS, 2008, 9 : 146 - 157