ENTERPRISE FILE-SHARING SYSTEM WITH LIGHTWEIGHT ATTRIBUTE-BASED ACCESS CONTROL

被引:0
|
作者
Xiong, Zhi [1 ]
Guo, Ting [1 ]
Zhu, Changsheng [2 ]
Cai, Weihong [1 ]
Cai, Lingru [1 ]
机构
[1] Shantou Univ, Dept Comp Sci, Shantou, Guangdong, Peoples R China
[2] Shantou Univ, Res Div, Shantou, Guangdong, Peoples R China
关键词
attribute-based access control; file-sharing; lightweight; access rule;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Attribute-based access control (ABAC) bases on attributes to define access rules and relies on them to make authorization decisions. The existing ABAC schemes have two deficiencies: low efficiency in rule execution and high difficulty in rule writing. We propose a lightweight ABAC scheme. It uses Python logical expression to describe access rule and uses the eval function to execute rule. We also design some mechanisms to simplify rule writing. Test results show that our rule can overcome the above two deficiencies. Based on the ABAC scheme and Samba, we build an enterprise file-sharing system and present its access control effect.
引用
收藏
页码:15 / 26
页数:12
相关论文
共 50 条
  • [31] Immediate attribute revocation in decentralized attribute-based access control
    Imine, Youcef
    Lounis, Ahmed
    Bouabdallah, Abdelmadjid
    2017 16TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS / 11TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING / 14TH IEEE INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS, 2017, : 33 - 40
  • [32] ATTRIBUTE-BASED MULTI-DIMENSION SCALABLE ACCESS CONTROL FOR SOCIAL MEDIA SHARING
    Ma, Changsha
    Yan, Zhisheng
    Chen, Chang Wen
    2016 IEEE INTERNATIONAL CONFERENCE ON MULTIMEDIA & EXPO (ICME), 2016,
  • [33] Attribute-Based Messaging: Access Control and Confidentiality
    Bobba, Rakesh
    Fatemieh, Omid
    Khan, Fariba
    Khan, Arindam
    Gunter, Carl A.
    Khurana, Himanshu
    Prabhakaran, Manoj
    ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 2010, 13 (04)
  • [34] Attribute-Based Access Control in Service Mesh
    Ponomarev, Kirill Yu.
    2019 DYNAMICS OF SYSTEMS, MECHANISMS AND MACHINES (DYNAMICS), 2019,
  • [35] Authorization Recycling in Attribute-Based Access Control
    An Y.
    Helil N.
    Wireless Communications and Mobile Computing, 2023, 2023
  • [36] Monotonicity and completeness in attribute-based access control
    Crampton, Jason
    Morisset, Charles
    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2014, 8743 : 33 - 48
  • [37] Supporting attribute-based access control with ontologies
    Priebe, Torsten
    Dobmeier, Wolfgang
    Kamprath, Nora
    FIRST INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, PROCEEDINGS, 2006, : 465 - +
  • [38] Attribute-Based Access Control in Web Applications
    Kauser, Sadia
    Rahman, Ayesha
    Khan, Asad Mohammed
    Ahmad, Tameem
    APPLICATIONS OF ARTIFICIAL INTELLIGENCE TECHNIQUES IN ENGINEERING, SIGMA 2018, VOL 1, 2019, 698 : 385 - 393
  • [39] Attribute-Based Access Control for NoSQL Databases
    Gupta, Eeshan
    Sural, Shamik
    Vaidya, Jaideep
    Atluri, Vijayalakshmi
    PROCEEDINGS OF THE ELEVENTH ACM CONFERENCE ON DATA AND APPLICATION SECURITY AND PRIVACY (CODASPY '21), 2021, : 317 - 319
  • [40] ANALYSIS OF THE METHODS FOR ATTRIBUTE-BASED ACCESS CONTROL
    Kalimoldayev, M. N.
    Biyashev, R. G.
    Rog, O. A.
    PRIKLADNAYA DISKRETNAYA MATEMATIKA, 2019, (44): : 43 - 57