Concurrent History-based Usage Control Policies
2017, Proceedings of the 5th International Conference on Model-Driven Engineering and Software Development
https://doi.org/10.5220/0006232506570666Abstract
The sharing of data and resources is one of the cornerstones of our society. However, this comes together with several challenges regarding the increasing need of guaranteeing security and privacy during both the access and the usage of such shared resources. Access control policies first, and usage control policies secondly, have been introduced to overcome issues related to the access and usage of resources. However, the introduction of distributed and cloud systems to share data and resources enables the concurrent and shared access to the same resources. Here we present an enhanced version of History-based Usage Control policies in which we are able to manage concurrent access and usage of resources by several subjects, whose actions may influence one another. Moreover, to ease the understanding of the proposed approach, we present a reference example where a document is shared among a set of people having different roles in a company.
References (15)
- Aktug, I. and Naliuka, K. (2008). ConSpec -A formal lan- guage for policy specification. Science of Computer Programming. Special Issue on Security and Trust, 74(1):2 -12.
- Baiardi, F., Martinelli, F., Mori, P., and Vaccarelli, A. (2004). Improving grid services security with fine grain policies. In On the Move to Meaningful Internet Systems 2004: Confederated International Workshops and Posters, GADA, JTRES, MIOS, WORM, WOSE, PhDS, and INTEROP 2004, Agia Napa, Cyprus, Oc- tober 25-29, 2004. Proceedings, pages 123-134.
- Colombo, M., Lazouski, A., Martinelli, F., and Mori, P. (2010). A proposal on enhancing xacml with continu- ous usage control features. In Grids, P2P and Services Computing, pages 133-146, Boston, MA. Springer US. Kelbert, F. and Pretschner, A. (2014). Decentralized dis- tributed data usage control. In Cryptology and Net- work Security: 13th International Conference, CANS 2014, Heraklion, Crete, Greece, October 22-24, 2014. Proceedings, pages 353-369, Cham. Springer Interna- tional Publishing.
- Kelbert, F. and Pretschner, A. (2015). A fully decentral- ized data usage control enforcement infrastructure. In Applied Cryptography and Network Security: 13th In- ternational Conference, ACNS 2015, New York, NY, USA, June 2-5, 2015, Revised Selected Papers, pages 409-430, Cham. Springer International Publishing.
- Lazouski, A., Martinelli, F., Mori, P., and Saracino, A. (2014). Stateful usage control for android mobile de- vices. In Security and Trust Management -10th In- ternational Workshop, STM 2014, Wroclaw, Poland, September 10-11, 2014. Proceedings, pages 97-112.
- Lazouski, A., Martinelli, F., Mori, P., and Saracino, A. (2016). Stateful data usage control for android mobile devices. International Journal of Information Secu- rity, pages 1-25.
- Martinelli, F., Matteucci, I., Mori, P., and Saracino, A. (2016). Enforcement of U-XACML history-based us- age control policy. In Security and Trust Management -12th International Workshop, STM 2016, Heraklion, Crete, Greece, September 26-27, 2016, Proceedings, volume 9871 of Lecture Notes in Computer Science, pages 64-81. Springer.
- Martinelli, F. and Mori, P. (2007). Enhancing java secu- rity with history based access control. In Foundations of Security Analysis and Design IV, pages 135-159.
- Martinelli, F. and Mori, P. (2010). On usage control for grid systems. Future Generation Computer Systems, 26(7):1032-1042.
- Neisse, R., Pretschner, A., and Di Giacomo, V. (2013). A trustworthy usage control enforcement framework. In- ternational Journal of Mobile Computing and Multi- media, 5(3):34-49.
- OASIS (2013). eXtensible Access Control Markup Lan- guage (XACML) Ver. 3.0.
- Park, J. and Sandhu, R. (2004). The UCON ABC usage con- trol model. ACM Transactions on Information and System Security, 7:128-174.
- Zhang, X., Nakae, M., Covington, M. J., and Sandhu, R. (2008). Toward a usage-based security framework for collaborative computing systems. ACM Transactions on Information and System Security, 11(1):3:1-3:36.
- Zhang, X., Parisi-Presicce, F., Sandhu, R., and Park, J. (2005). Formal model and policy specification of us- age control. ACM Transactions on Information and System Security, 8(4):351-387. Table 5: Usage Control Policy UP SR .
- <?xml version="1.0" encoding="UTF-8"?> <Policy xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:xacml="urn:oasis:names:tc:xacml:3.0:core:schema:wd-17" xsi:schemaLocation="urn:oasis:names:tc:xacml:3.0:core:schema:wd-17 http://docs.oasis-open.org/xacml/3.0/xacml-core-v3-schema-wd-17.xsd" PolicyId="UP_SR" RuleCombiningAlgId="urn:oasis:names:tc:xacml:1.0:rule-combining-algorithm:first-applicable" Version="3.0"> <Target/> <Rule Effect="Permit" RuleId="rule1"> <Target> <AnyOf> <AllOf> <Match MatchId="urn:oasis:names:tc:xacml:1.0:function:string-equal"> <AttributeValue DataType="http://www.w3.org/2001/XMLSchema#string">Validate </AttributeValue> <AttributeDesignator AttributeId="urn:oasis:names:tc:xacml:1.0:action:action-id" Category="urn:oasis:names:tc:xacml:3.0:attribute-category:action" DataType="http://www.w3.org/2001/XMLSchema#string" MustBePresent="true"> </AttributeDesignator> </Match> </AllOf> </AnyOf> </Target> <Condition DecisionTime="pre"> <Apply FunctionId="urn:oasis:names:tc:xacml:1.0:function:and"> <Apply FunctionId="urn:oasis:names:tc:xacml:1.0:function:string-equal"> <Apply FunctionId="urn:oasis:names:tc:xacml:1.0:function:string-one-and-only"> <AttributeDesignator AttributeId="urn:oasis:names:tc:xacml:3.0:subject:role" Category="urn:oasis:names:tc:xacml:1.0:subject-category:access-subject" DataType="http://www.w3.org/2001/XMLSchema#string" MustBePresent="true"> </AttributeDesignator> </Apply> <AttributeValue DataType="http://www.w3.org/2001/XMLSchema#string"> ScientificRepresentative</AttributeValue> </Apply> <Apply FunctionId="urn:oasis:names:tc:xacml:1.0:function:string-equal"> <Apply FunctionId="urn:oasis:names:tc:xacml:1.0:function:string-one-and-only"> <AttributeDesignator AttributeId="urn:oasis:names:tc:xacml:3.0:subject:assigned-proj" Category="urn:oasis:names:tc:xacml:3.0:attribute-category:access-subject" DataType="http://www.w3.org/2001/XMLSchema#string" MustBePresent="true"> </AttributeDesignator> </Apply> <Apply FunctionId="urn:oasis:names:tc:xacml:1.0:function:string-one-and-only"> <AttributeDesignator AttributeId="urn:oasis:names:tc:xacml:3.0:resource:project" Category="urn:oasis:names:tc:xacml:3.0:attribute-category:resource" DataType="http://www.w3.org/2001/XMLSchema#string" MustBePresent="true"> </AttributeDesignator> </Apply> </Apply> </Apply> </Condition> <Condition DecisionTime="on"> <Apply FunctionId="urn:oasis:names:tc:xacml:1.0:function:string-equal"> <Apply FunctionId="urn:oasis:names:tc:xacml:1.0:function:string-one-and-only"> <AttributeDesignator AttributeId="urn:oasis:names:tc:xacml:3.0:subject:assigned-proj" Category="urn:oasis:names:tc:xacml:3.0:attribute-category:access-subject" DataType="http://www.w3.org/2001/XMLSchema#string" MustBePresent="true"> </AttributeDesignator> </Apply> <Apply FunctionId="urn:oasis:names:tc:xacml:1.0:function:string-one-and-only"> <AttributeDesignator AttributeId="urn:oasis:names:tc:xacml:3.0:resource:project" Category="urn:oasis:names:tc:xacml:3.0:attribute-category:resource" DataType="http://www.w3.org/2001/XMLSchema#string" MustBePresent="true">