Decentralized Policy Information Points for Multi-Domain Environments

08/19/2021
by   M Ridwanur Rahman, et al.
0

Access control models have been developed to control authorized access to sensitive resources. This control of access is important as there is now a need for collaborative resource sharing between multiple organizations over open environments like the internet. Although there are multiple access control models that are being widely used, these models are providing access control within a closed environment i.e. within the organization using it. These models have restricted capabilities in providing access control in open environments. Attribute-Based Access Control (ABAC) has emerged as a powerful access control model to bring fine-grained authorization to organizations that possess sensitive data and resources and want to collaborate over open environments. In an ABAC system, access to resources that an organization possess can be controlled by applying policies on attributes of the users. These policies are conditions that need to be satisfied by the requester in order to gain access to the resource. In this paper, we provide an introduction to ABAC and by carrying forward the architecture of ABAC, we propose a Decentralized Policy Information Point (PIP) model. Our model proposes the decentralization of PIP, which is an entity of the ABAC model that allows the storage and query of user attributes and enforces fine-grained access control for controlling the access of sensitive resources over multiple domains. Our model makes use of the concept of a cryptographic primitive called Attribute-Based Signature (ABS) to keep the identities of the users involved, private. Our model can be used for collaborative resource sharing over the internet. The evaluation of our model is also discussed to reflect the application of the proposed decentralized PIP model.

READ FULL TEXT
research
01/11/2021

Reachability Analysis for Attributes in ABAC with Group Hierarchy

Attribute-based access control (ABAC) models are widely used to provide ...
research
05/31/2023

An Insider Threat Mitigation Framework Using Attribute Based Access Control

Insider Threat is a significant and potentially dangerous security issue...
research
04/17/2018

A Scalable Permission Management System With Support of Conditional and Customized Attributes

Along with the classical problem of managing multiple identities, action...
research
04/01/2020

Technical Report: Developing a Working Data Hub

Data forms a key component of any enterprise. The need for high quality ...
research
08/31/2023

A Customizable Conflict Resolution and Attribute-Based Access Control Framework for Multi-Robot Systems

As multi-robot systems continue to advance and become integral to variou...
research
06/22/2023

XACML Extension for Graphs: Flexible Authorization Policy Specification and Datastore-independent Enforcement

The increasing use of graph-structured data for business- and privacy-cr...
research
11/13/2021

PAMMELA: Policy Administration Methodology using Machine Learning

In recent years, Attribute-Based Access Control (ABAC) has become quite ...

Please sign up or login with your details

Forgot password? Click here to reset