ENTERPRISE FILE-SHARING SYSTEM WITH LIGHTWEIGHT ATTRIBUTE-BASED ACCESS CONTROL

被引:0
|
作者
Xiong, Zhi [1 ]
Guo, Ting [1 ]
Zhu, Changsheng [2 ]
Cai, Weihong [1 ]
Cai, Lingru [1 ]
机构
[1] Shantou Univ, Dept Comp Sci, Shantou, Guangdong, Peoples R China
[2] Shantou Univ, Res Div, Shantou, Guangdong, Peoples R China
关键词
attribute-based access control; file-sharing; lightweight; access rule;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Attribute-based access control (ABAC) bases on attributes to define access rules and relies on them to make authorization decisions. The existing ABAC schemes have two deficiencies: low efficiency in rule execution and high difficulty in rule writing. We propose a lightweight ABAC scheme. It uses Python logical expression to describe access rule and uses the eval function to execute rule. We also design some mechanisms to simplify rule writing. Test results show that our rule can overcome the above two deficiencies. Based on the ABAC scheme and Samba, we build an enterprise file-sharing system and present its access control effect.
引用
收藏
页码:15 / 26
页数:12
相关论文
共 50 条
  • [21] Base on game theory model to improve trust access control in cloud file-sharing system
    Wong, Wei-Jyun
    Lee, Wei-Tsong
    Wei, Hsin-Wen
    2014 TENTH INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING (IIH-MSP 2014), 2014, : 702 - 705
  • [22] Multiauthority Attribute-Based Access Control for Supply Chain Information Sharing in Blockchain
    Liu, Chenlei
    Xiang, Feng
    Sun, Zhixin
    SECURITY AND COMMUNICATION NETWORKS, 2022, 2022
  • [23] A privacy-enhanced attribute-based access control system
    Kolter, Jan
    Schillinger, Rolf
    Pernul, Guenther
    DATA AND APPLICATIONS SECURITY XXI, PROCEEDINGS, 2007, 4602 : 129 - +
  • [24] Security access model of P2P file-sharing system
    Wang, Jinsong
    Wang, Ning
    Liu, Weiwei
    Wu, GongYi
    DCABES 2007 Proceedings, Vols I and II, 2007, : 544 - 547
  • [25] Mining Attribute-Based Access Control Policies
    Davari, Maryam
    Zulkernine, Mohammad
    INFORMATION SYSTEMS SECURITY, ICISS 2022, 2022, 13784 : 186 - 201
  • [26] Monotonicity and Completeness in Attribute-Based Access Control
    Crampton, Jason
    Morisset, Charles
    SECURITY AND TRUST MANAGEMENT (STM 2014), 2014, 8743 : 33 - 48
  • [27] ABACaaS: Attribute-Based Access Control as a Service
    Meshram, Augustee
    Das, Saptarshi
    Sural, Shamik
    Vaidya, Jaideep
    Atluri, Vijayalakshmi
    PROCEEDINGS OF THE NINTH ACM CONFERENCE ON DATA AND APPLICATION SECURITY AND PRIVACY (CODASPY '19), 2019, : 153 - 155
  • [28] Mining Attribute-Based Access Control Policies
    Xu, Zhongyuan
    Stoller, Scott D.
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2015, 12 (05) : 533 - 545
  • [29] Combining Mandatory and Attribute-based Access Control
    Kerr, Lawrence
    Alves-Foss, Jim
    PROCEEDINGS OF THE 49TH ANNUAL HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES (HICSS 2016), 2016, : 2616 - 2623
  • [30] A contextual attribute-based access control model
    Covington, Michael J.
    Sastry, Manoj R.
    On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops, Pt 2, Proceedings, 2006, 4278 : 1996 - 2006