skip to main content
10.1145/3176258.3176323acmconferencesArticle/Chapter ViewAbstractPublication PagescodaspyConference Proceedingsconference-collections
research-article

Security Analysis of Relationship-Based Access Control Policies

Published:13 March 2018Publication History

ABSTRACT

Relationship-based access control (ReBAC) policies can express intricate protection requirements in terms of relationships among users and resources (which can be modeled as a graph). Such policies are useful in domains beyond online social networks. However, given the updating graph of user and resources in a system and expressive conditions in access control policy rules, it can be very challenging for security administrators to envision what can (or cannot) happen as the protection system evolves.

In this paper, we introduce the security analysis problem for this class of policies, where we seek to answer security queries about future states of the system graph and authorizations that are decided accordingly. Towards achieving this goal, we propose a state-transition model of a ReBAC protection system, called RePM. We discuss about formulation of security analysis queries in RePM and present our initial results for a limited version of this model.

References

  1. T. Ahmed, R. Sandhu, and J. Park. Classifying and Comparing Attribute-Based and Relationship-Based Access Control. In Proceedings of the Seventh ACM on Conference on Data and Application Security and Privacy, CODASPY '17, pages 59--70, New York, NY, USA. ACM, 2017. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. G. Bruns, P. Fong, I. Siahaan, and M. Huth. Relationship- based Access Control: Its Expression and Enforcement Through Hybrid Logic. In Proceedings of the Second ACM Conference on Data and Application Security and Privacy, CODASPY '12, pages 117--124, New York, NY, USA. ACM, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. B. Carminati, E. Ferrari, R. Heatherly, M. Kantarcioglu, and B. Thuraisingham. A semantic web based framework for social network access control. In Proc. 14th ACM Symposium on Access Control Models and Technologies, pages 177--186. ACM, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. B. Carminati, E. Ferrari, and A. Perego. Enforcing access control in Web-based social networks. ACM Trans. Inf. Syst. Secur., 13(1):1--38, Nov. 2009. issn: 1094--9224. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. B. Carminati, E. Ferrari, and A. Perego. Rule-Based Access Control for Social Networks. In R. Meersman, Z. Tari, and P. Herrero, editors, Proc. OTM 2006 Workshops (On the Move to Meaningful Internet Systems), volume 4278 of LNCS, pages 1734--1744. Springer, Oct. 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Y. Cheng, J. Park, and R. Sandhu. Relationship-Based Access Control for Online Social Networks: Beyond User-to-User Relationships. In Proc. 2012 International Conference on Privacy, Security, Risk and Trust and 2012 International Confernece on Social Computing, pages 646--655, Sept. 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. M. Cramer, J. Pang, and Y. Zhang. A Logical Approach to Restricting Access in Online Social Networks. In Pro- ceedings of the 20th ACM Symposium on Access Control Models and Technologies, SACMAT '15, pages 75--86, New York, NY, USA. ACM, 2015. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. J. Crampton and J. Sellwood. ARPPM: Administra- tion in the RPPM Model. In Proceedings of the Sixth ACM Conference on Data and Application Security and Privacy, CODASPY '16, pages 219--230, New York, NY, USA. ACM, 2016. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. J. Crampton and J. Sellwood. Path Conditions and Principal Matching: A New Approach to Access Con- trol. In Proceedings of the 19th ACM Symposium on Access Control Models and Technologies, SACMAT '14, pages 187--198, New York, NY, USA. ACM, 2014. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. J. Crampton and J. Sellwood. Relationships, Paths and Principal Matching: A New Approach to Access Control. arXiv:1505.07945 {cs}, May 29, 2015. arXiv: 1505.07945;.Google ScholarGoogle Scholar
  11. eXtensible Access Control Markup Language (XACML) Version 3.0, OASIS, 2013.Google ScholarGoogle Scholar
  12. P. W. Fong. Relationship-based access control: protection model and policy language. In Proc. CODASPY '11, pages 191--202, San Antonio, TX, USA. ACM, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. P. W. Fong and I. Siahaan. Relationship-based access control policies and their policy languages. In Proc. 16th ACM Symposium on Access Control Models and Technologies, SACMAT '11, pages 51--60, Innsbruck, Austria. ACM, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. M. A. Harrison, W. L. Ruzzo, and J. D. Ullman. Protection in operating systems. Commun. ACM, 19(8):461-- 471, Aug. 1976. issn: 0001-0782. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. H. Hu, G. J. Ahn, and K. Kulkarni. Discovery and Resolution of Anomalies in Web Access Control Poli- cies. IEEE Transactions on Dependable and Secure Computing, 10(6):341--354, Nov. 2013. issn: 1545--5971. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. H. Hu and G.-j. Ahn. Multiparty Authorization Frame- work for Data Sharing in Online Social Networks. In Y. Li, editor, Proceedings of the 25th Annual IFIP WG 11.3 Conference on Data and Applications Security and Privacy, volume 6818 of Lecture Notes in Computer Science, pages 29--43. Springer Berlin / Heidelberg, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. S. R. Kruk. FOAF-Realm: control your friends access to the resource. In Workshop on Friend of a Friend, Social Networking and the Semantic Web, 2004.Google ScholarGoogle Scholar
  18. N. Li and M. V. Tripunitara. Security Analysis in Role- based Access Control. In Proceedings of the Ninth ACM Symposium on Access Control Models and Technologies, SACMAT '04, pages 126--135, New York, NY, USA. ACM, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. N. Li and W. H. Winsborough. Beyond proof-of-compliance: safety and availability analysis in trust management. In Proceedings of the 2003 Symposium on Security and Privacy, pages 123--139, May 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. N. Li, W. H. Winsborough, and J. C. Mitchell. Dis- tributed credential chain discovery in trust manage- ment. Journal of Computer Security, 11(1):35--86, Jan. 1, 2003. issn: 0926--227X. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. D. Lin, P. Rao, E. Bertino, N. Li, and J. Lobo. EXAM: a comprehensive environment for the analysis of access control policies. International Journal of Information Security, 9(4):253--273, Aug. 2010. issn: 1615--5262. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. A. Masoumzadeh and J. Joshi. OSNAC: An Ontology- based Access Control Model for Social Networking Systems. In Proc. 2nd IEEE Int'l Conference on Information Privacy, Security, Risk and Trust (PASSAT 2010), pages 751--759, Minneapolis, MN, USA, Aug. 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. T. Nelson, D. J. Dougherty, C. Barratt, and K. Fisler. The Margrave Tool for Firewall Analysis. In Proceedings of the 24th USENIX Large Installation System Administration Conference (LISA 2010), 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. E. Pasarella and J. Lobo. A Datalog Framework for Modeling Relationship-based Access Control Policies. In Proceedings of the 22Nd ACM on Symposium on Access Control Models and Technologies, pages 91--102, New York, NY, USA. ACM, 2017. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. S. Z. R. Rizvi, P. W. Fong, J. Crampton, and J. Sellwood. Relationship-Based Access Control for an Open- Source Medical Records System. In Proceedings of the 20th ACM Symposium on Access Control Models and Technologies, SACMAT '15, pages 113--124, New York, NY, USA. ACM, 2015. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. R. S. Sandhu. The typed access matrix model. In Proceedings 1992 IEEE Computer Society Symposium on Research in Security and Privacy, pages 122--136, May 1992. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. R. S. Sandhu, V. Bhamidipati, and Q. Munawer. The ARBAC97 Model for Role-Based Administration of Roles. ACM Transactions on Information and Systems Security, 2(1):105--135, 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. R. S. Sandhu. The Schematic Protection Model: Its Definition and Analysis for Acyclic Attenuating Schemes. J. ACM, 35(2):404--432, Apr. 1988. issn: 0004--5411. Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. A. Sasturkar, P. Yang, S. D. Stoller, and C. R. Ramakrishnan. Policy analysis for administrative role based access control. In Proceedings of the 19th IEEE Computer Security Foundations Workshop (CSFW'06), 13 pp.--138, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. S. D. Stoller. An Administrative Model for Relationship- Based Access Control. In SpringerLink. IFIP Annual Conference on Data and Applications Security and Privacy, pages 53--68. Springer, Cham, July 13, 2015.Google ScholarGoogle Scholar

Index Terms

  1. Security Analysis of Relationship-Based Access Control Policies

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        CODASPY '18: Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy
        March 2018
        401 pages
        ISBN:9781450356329
        DOI:10.1145/3176258

        Copyright © 2018 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 13 March 2018

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article

        Acceptance Rates

        CODASPY '18 Paper Acceptance Rate23of110submissions,21%Overall Acceptance Rate149of789submissions,19%

        Upcoming Conference

        CODASPY '24

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader