Handling least privilege problem and role mining in RBAC

被引:16
|
作者
Huang, Hejiao [1 ,2 ]
Shang, Feng [1 ,2 ]
Liu, Jinling [1 ,2 ]
Du, Hongwei [1 ,2 ]
机构
[1] Shenzhen Grad Sch, Harbin Inst Technol, Shenzhen, Peoples R China
[2] Shenzhen Key Lab Internet Informat Collaborat, Shenzhen 518055, Peoples R China
基金
中国国家自然科学基金;
关键词
RBAC; Role mining; Greedy algorithm;
D O I
10.1007/s10878-013-9633-9
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
For a given role-based access control (RBAC) configuration, user-role assignment satisfying least privilege principle (specified as LPUAP) is one of the most important problems to be solved in information security. LPUAP has been proved to be NP-hard. This paper gives several efficient greedy algorithms for handling this problem. Experiment results show that the output of our algorithms is almost optimal while the running time is greatly reduced. In another case where a RBAC configuration is to be set up, minimizing the descriptive set of roles (specified as Basic-RMP) and minimizing the administrative assignments for roles (specified as Edge-RMP) can greatly decrease the management costs. Both role mining problems (i.e., Basic-RMP and Edge-RMP) have also been proved to be NP-hard. This paper converts Basic-RMP to set cover problem and Edge-RMP to weighted set cover problem, and two algorithms respectively named algorithm for Basic-RMP and algorithm for Edge-RMP, are designed. Experiment results show that the average similarity rate between role sets produced by algorithm and the original ones used in generating the dataset is above 90 %. However, in the process of converting role mining into Set Cover Problem, the number of candidate role set is very large. In order to reduce the complexity of the algorithm, this paper presents a new polynomial-time algorithm with a performance nearly the same as that of algorithm.
引用
收藏
页码:63 / 86
页数:24
相关论文
共 50 条
  • [31] The ET-RBAC based Privilege Management Infrastructure for wireless networks
    Park, DG
    Lee, YR
    E-COMMERCE AND WEB TECHNOLOGIES, PROCEEDINGS, 2003, 2738 : 84 - 93
  • [32] Least Privilege Learning for Attribute Obfuscation
    Brown, Glen
    Martinez-del-Rincon, Jesus
    Miller, Paul
    PATTERN RECOGNITION, ACPR 2021, PT II, 2022, 13189 : 142 - 156
  • [33] Stateful Least Privilege Authorization for the Cloud
    Cao, Leo
    Meng, Luoxi
    Stefan, Deian
    Fernandes, Earlence
    PROCEEDINGS OF THE 33RD USENIX SECURITY SYMPOSIUM, SECURITY 2024, 2024, : 3477 - 3494
  • [34] Informed Privilege-Complexity Trade-Offs in RBAC Configuration
    Currey, Jon
    McKinstry, Robbie
    Dadgar, Armon
    Gritter, Mark
    SACMAT'20: PROCEEDINGS OF THE 25TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES, 2020, : 119 - 130
  • [35] The role of market discipline in handling problem banks
    Llewellyn, DT
    Mayes, DG
    MARKET DISCIPLINE IN BANKING: THEORY AND EVIDENCE, 2003, 15 : 183 - 210
  • [36] RBAC policies in XML for X.509 based privilege management
    Chadwick, DW
    Otenko, A
    SECURITY IN THE INFORMATION SOCIETY: VISIONS AND PERSPECTIVES, 2002, 86 : 39 - 53
  • [37] Task-constrained RBAC model and its Privilege Redundancy Analysis
    Zhou, Yanjie
    Ma, Li
    Wen, Min
    2015 2ND INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE AND CONTROL ENGINEERING ICISCE 2015, 2015, : 489 - 492
  • [38] Role recommender-RBAC: Optimizing user-role assignments in RBAC
    Rao, K. Rajesh
    Nayak, Ashalatha
    Ray, Indranil Ghosh
    Rahulamathavan, Yogachandran
    Rajarajan, Muttukrishnan
    COMPUTER COMMUNICATIONS, 2021, 166 : 140 - 153
  • [39] LEAST HANDLING FOR PARCELS
    SCOTT, A
    ENGINEERING, 1969, 208 (5396): : 343 - &
  • [40] The Role Mining Problem: A Formal Perspective
    Vaidya, Jaideep
    Atluri, Vijayalakshmi
    Guo, Qi
    ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 2010, 13 (03)