Handling least privilege problem and role mining in RBAC

被引:16
|
作者
Huang, Hejiao [1 ,2 ]
Shang, Feng [1 ,2 ]
Liu, Jinling [1 ,2 ]
Du, Hongwei [1 ,2 ]
机构
[1] Shenzhen Grad Sch, Harbin Inst Technol, Shenzhen, Peoples R China
[2] Shenzhen Key Lab Internet Informat Collaborat, Shenzhen 518055, Peoples R China
基金
中国国家自然科学基金;
关键词
RBAC; Role mining; Greedy algorithm;
D O I
10.1007/s10878-013-9633-9
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
For a given role-based access control (RBAC) configuration, user-role assignment satisfying least privilege principle (specified as LPUAP) is one of the most important problems to be solved in information security. LPUAP has been proved to be NP-hard. This paper gives several efficient greedy algorithms for handling this problem. Experiment results show that the output of our algorithms is almost optimal while the running time is greatly reduced. In another case where a RBAC configuration is to be set up, minimizing the descriptive set of roles (specified as Basic-RMP) and minimizing the administrative assignments for roles (specified as Edge-RMP) can greatly decrease the management costs. Both role mining problems (i.e., Basic-RMP and Edge-RMP) have also been proved to be NP-hard. This paper converts Basic-RMP to set cover problem and Edge-RMP to weighted set cover problem, and two algorithms respectively named algorithm for Basic-RMP and algorithm for Edge-RMP, are designed. Experiment results show that the average similarity rate between role sets produced by algorithm and the original ones used in generating the dataset is above 90 %. However, in the process of converting role mining into Set Cover Problem, the number of candidate role set is very large. In order to reduce the complexity of the algorithm, this paper presents a new polynomial-time algorithm with a performance nearly the same as that of algorithm.
引用
收藏
页码:63 / 86
页数:24
相关论文
共 50 条
  • [21] Least privilege in separation kernels
    Levin, Timothy E.
    Irvine, Cynthia E.
    Nguyen, Thuy D.
    SECRYPT 2006: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2006, : 355 - +
  • [22] The role of the school in handling the problem of bullying
    Majcherova, Katarina
    Hajduova, Zuzana
    Andrejkovic, Marek
    AGGRESSION AND VIOLENT BEHAVIOR, 2014, 19 (05) : 463 - 465
  • [23] Classification and Distribution of RBAC Privilege Protection Changes in Wordpress Evolution
    Laverdiere, Marc-Andre
    Merlo, Ettore
    2017 15TH ANNUAL CONFERENCE ON PRIVACY, SECURITY AND TRUST (PST), 2017, : 349 - 354
  • [24] Specifying and enforcing the principle of least privilege in role-based access control
    Ma, Xiaopu
    Li, Ruixuan
    Lu, Zhengding
    Lu, Jianfeng
    Dong, Meng
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2011, 23 (12): : 1313 - 1331
  • [25] Manual handling problem identification in mining industry: an Ergonomic perspective
    Nurmianto, Eko
    Ciptomulyono, Udisubakti
    Suparno
    Kromodihardjo, Sudiyono
    INDUSTRIAL ENGINEERING AND SERVICE SCIENCE 2015, IESS 2015, 2015, 4 : 89 - 97
  • [26] Downright: A Framework and Toolchain For Privilege Handling
    Schweizer, Remo
    Neuhaus, Stephan
    2019 IEEE SECURE DEVELOPMENT (SECDEV 2019), 2019, : 76 - 88
  • [27] Research of least privilege for database administrators
    Shen, Mou
    Chen, Mengdong
    Li, Min
    Liu, Lianzhong
    International Journal of Database Theory and Application, 2013, 6 (06): : 39 - 50
  • [28] Game to Dethrone: A Least Privilege CTF
    Wu, Wenjing
    Feng, Wu-chang
    2021 IEEE 6TH INTERNATIONAL CONFERENCE ON SMART CLOUD (SMARTCLOUD 2021), 2021, : 132 - 137
  • [29] Least privilege analysis in software architectures
    Koen Buyens
    Riccardo Scandariato
    Wouter Joosen
    Software & Systems Modeling, 2013, 12 : 331 - 348
  • [30] Least privilege analysis in software architectures
    Buyens, Koen
    Scandariato, Riccardo
    Joosen, Wouter
    SOFTWARE AND SYSTEMS MODELING, 2013, 12 (02): : 331 - 348