skip to main content
10.1145/3198458.3198463acmconferencesArticle/Chapter ViewAbstractPublication Pagesasia-ccsConference Proceedingsconference-collections
research-article

Too Long, did not Enforce: A Qualitative Hierarchical Risk-Aware Data Usage Control Model for Complex Policies in Distributed Environments

Published: 22 May 2018 Publication History

Abstract

Distributed environments such as Internet of Things, have an increasing need of introducing access and usage control mechanisms, to manage the rights to perform specific operations and regulate the access to the plethora of information daily generated by these devices. Defining policies which are specific to these distributed environments could be a challenging and tedious task, mainly due to the large set of attributes that should be considered, hence the upcoming of unforeseen conflicts or unconsidered conditions. In this paper we propose a qualitative risk-based usage control model, aimed at enabling a framework where is possible to define and enforce policies at different levels of granularity. In particular, the proposed framework exploits the Analytic Hierarchy Process (AHP) to coalesce the risk value assigned to different attributes in relation to a specific operation, in a single risk value, to be used as unique attribute of usage control policies. Two sets of experiments that show the benefits both in policy definition and in performance, validate the proposed model, demonstrating the equivalence of enforcement among standard policies and the derived single-attributed policies.

References

[1]
Benjamin Aziz, Simon N. Foley, John Herbert, and Garret Swart. 2006. Reconfiguring Role Based Access Control Policies Using Risk Semantics. J. High Speed Netw. 15, 3 (July 2006), 261--273. http://dl.acm.org/citation.cfm?id=2692141.2692146
[2]
Enrico Carniani, Davide D'Arenzo, Aliaksandr Lazouski, Fabio Martinelli, and Paolo Mori. 2016. Usage Control on Cloud systems. Future Generation Comp. Syst. 63 (2016), 37--55.
[3]
Pau-Chen Cheng, Pankaj Rohatgi, Claudia Keser, Paul A Karger, Grant M Wagner, and Angela Schuett Reninger. 2007. Fuzzy multi-level security: An experiment on quantified risk-adaptive access control. In Proceedings of the IEEE Symposium on Security and Privacy, 2007. SP'07. IEEE, 222--230.
[4]
Department of Defense Standard CSC-STD-001--83. 1985. Department of Defense Trusted Computer System Evaluation Criteria. DoD Computer Security Center. (Dec. 1985).
[5]
Gianluca Dini, Fabio Martinelli, Ilaria Matteucci, Marinella Petrocchi, Andrea Saracino, and Daniele Sgandurra. 2016. Risk analysis of Android applications: A user-centric solution. Future Generation Computer Systems (2016).
[6]
V. C. Hu, D. Ferraiolo, R. Kuhn, A. Schnitzer, K. Sandlin, R. Miller, and K. Scarfone. 2013. Guide to attribute based access control (ABAC) definition and considerations. NIST Special Publication, vol. 800, pp. 162,. (2013).
[7]
Wenbo Jiang and Huaqi Chai. 2015. A risk management methodology for R&D Project risk based on AHP and fuzzy comprehensive evaluation method. In Proceedings of IEEE International Conference on Industrial Engineering and Engineering Management (IEEM). IEEE, 320--324.
[8]
L. Jiawei. 2011. Risk assessment of accounting information system based on AHP and fuzzy comprehensive evaluation method. In Proceedings of the 6th International Conference on Computer Sciences and Convergence Information Technology (ICCIT). 905--908.
[9]
Leanid Krautsevich, Aliaksandr Lazouski, Fabio Martinelli, Paolo Mori, and Artsiom Yautsiukhin. 2010. Usage control, risk and trust. In Proceedings of the International Conference on Trust, Privacy and Security in Digital Business. Springer, 1--12.
[10]
L. Krautsevich, A. Lazouski, F. Martinelli, and A. Yautsiukhin. 2010. Risk-Aware Usage Decision Making in Highly Dynamic Systems. In Proceedings of the 5th International Conference on Internet Monitoring and Protection. 29--34.
[11]
L. Krautsevich, A. Lazouski, F. Martinelli, and A. Yautsiukhin. 2010. Risk-Based Usage Control for Service Oriented Architecture. In Proceedings of the 18th Euromicro Conference on Parallel, Distributed and Network-based Processing. 641--648.
[12]
L. Krautsevich, A. Lazouski, F. Martinelli, and A. Yautsiukhin. 2011. Cost-effective enforcement of UCONA policies. In Proceedings of the 6th International Conference on Risks and Security of Internet and Systems (CRiSIS). 1--8.
[13]
A. Lazouski, G. Mancini, F. Martinelli, and P. Mori. 2012. Usage control in cloud systems. In The 7th International Conference for Internet Technology And Secured Transactions,(ICITST-2012). 202--207.
[14]
A. L. Marra, F. Martinelli, P. Mori, and A. Saracino. 2017. Implementing Usage Control in Internet of Things: A Smart Home Use Case. In 2017 IEEE Trustcom/BigDataSE/ICESS. 1056--1063.
[15]
Jaehong Park and Ravi Sandhu. 2002. Towards Usage Control Models: Beyond Traditional Access Control. In Proceedings of the Seventh ACM Symposium on Access Control Models and Technologies (SACMAT '02). ACM, New York, NY, USA, 57--64.
[16]
J. Park and R. Sandhu. 2004. The U CO N ABC usage control model. ACM Transactions on Information and System Security 7, 1 (2004), 128--174.
[17]
J. Park, X. Zhang, and R. Sandhu. 2004. Attribute Mutability in Usage Control. In Research Directions in Data and Applications Security XVIII, IFIP TC11/WG 11.3 Eighteenth Annual Conference on Data and Applications Security. 15--29.
[18]
A. Pretschner, M. Hilty, and D.A. Basin. 2006. Distributed usage control. Commun. ACM 49, 9 (2006), 39--44.
[19]
R.W. Saaty. 1987. The analytic hierarchy process - what it is and how it is used. Mathematical Modelling 9, 3 (1987), 161 -- 176.
[20]
Ravi S Sandhu, Edward J Coyne, Hal L Feinstein, and Charles E Youman. 1996. Role-based access control models. Computer 29, 2 (1996), 38-- 47. https://www.dropbox.com/s/cjcf96zo863e4qc/1.Role-Based%20Access%20Control%20Models.pdf?dl=0
[21]
Riaz Ahmed Shaikh, Kamel Adi, and Luigi Logrippo. 2012. Dynamic risk-based decision methods for access control systems. computers &security 31, 4 (2012), 447--464.
[22]
Qihua Wang and Hongxia Jin. 2011. Quantified Risk-adaptive Access Control for Patient Privacy Protection in Health Information Systems. In Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security (ASIACCS '11). ACM, New York, NY, USA, 406--410.
[23]
Lei Zhang, Alexander Brodsky, and Sushil Jajodia. 2006. Toward information sharing: Benefit and risk access control (barac). In Proceedings of the 7th IEEE International Workshop on Policies for Distributed Systems and Networks, 2006. Policy 2006. IEEE, 9--pp.
[24]
Xinwen Zhang, Francesco Parisi-Presicce, Ravi Sandhu, and Jaehong Park. 2005. Formal Model and Policy Specification of Usage Control. ACM Transactions on Information and System Security 8, 4 (2005), 351--387.

Cited By

View all

Index Terms

  1. Too Long, did not Enforce: A Qualitative Hierarchical Risk-Aware Data Usage Control Model for Complex Policies in Distributed Environments

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    CPSS '18: Proceedings of the 4th ACM Workshop on Cyber-Physical System Security
    May 2018
    79 pages
    ISBN:9781450357555
    DOI:10.1145/3198458
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 22 May 2018

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. analytic hierarchy process
    2. risk analysis
    3. usage control

    Qualifiers

    • Research-article

    Funding Sources

    Conference

    ASIA CCS '18
    Sponsor:

    Acceptance Rates

    CPSS '18 Paper Acceptance Rate 6 of 24 submissions, 25%;
    Overall Acceptance Rate 43 of 135 submissions, 32%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)10
    • Downloads (Last 6 weeks)1
    Reflects downloads up to 14 Sep 2024

    Other Metrics

    Citations

    Cited By

    View all

    View Options

    Get Access

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media