期刊文献+

一种基于元模型的访问控制策略描述语言 被引量:5

Access Control Policy Specification Language Based on Metamodel
下载PDF
导出
摘要 为了保护云资源的安全,防止数据泄露和非授权访问,必须对云平台的资源访问实施访问控制.然而,目前主流云平台通常采用自己的安全策略语言和访问控制机制,从而造成两个问题:(1)云用户若要使用多个云平台,则需要学习不同的策略语言,分别编写安全策略;(2)云服务提供商需要自行设计符合自己平台的安全策略语言及访问控制机制,开发成本较高.对此,提出一种基于元模型的访问控制策略描述语言PML及其实施机制PML-EM.PML支持表达BLP、RBAC、ABAC等访问控制模型.PML-EM实现了3个性质:策略语言无关性、访问控制模型无关性和程序设计语言无关性,从而降低了用户编写策略的成本与云服务提供商开发访问控制机制的成本.在OpenStack云平台上实现了PML-EM机制.实验结果表明,PML策略支持从其他策略进行自动转换,在表达云中多租户场景时具有优势.性能方面,与OpenStack原有策略相比,PML策略的评估开销为4.8%.PML-EM机制的侵入性较小,与云平台原有代码相比增加约0.42%. In order to protect the cloud resources,access control mechanisms have to be established in the cloud.However,cloud platforms have tendency to design their own security policy languages and authorization mechanisms.It leads to two issues:(i)a cloud user has to learn different policy languages to customize the permissions for each cloud,and(ii)a cloud service provider has to design and implement the authorization mechanism from the beginning,which is a high development cost.In this work,a new access control policy specification language called PML is proposed to support expressing multiple access control models like BLP,RBAC,ABAC and important features like multi-tenants.An authorization framework called PML-EM is implemented on OpenStack to centralize the authorization.PML-EM is irrelative to policy languages,access control models and programming languages that implement the authorization module.Other policies like XACML policy and OpenStack policy can be automatically translated into PML,which facilitates the migration between the clouds that both support PML-EM.The experimental results indicate PML-EM has improved the?exibility of policy management from a tenant’s perspective.And the performance overhead for policy evaluation is 4.8%,and the invasiveness is about 0.42%.
作者 罗杨 沈晴霓 吴中海 LUO Yang;SHEN Qing-Ni;WU Zhong-Hai(School of Software and Microelectronics,Peking University,Beijing 102600,China;National Engineering Research Center for Software Engineering(Peking University),Beijing 100871,China)
出处 《软件学报》 EI CSCD 北大核心 2020年第2期439-454,共16页 Journal of Software
基金 国家自然科学基金(61232005,61672062) 国家高技术研究发展计划(863)(2015AA016009).
关键词 访问控制模型 策略语言 策略转换 解释器 抽象语法树 access control model policy language policy translation interpreter abstract syntax tree
  • 相关文献

参考文献3

二级参考文献104

  • 1周傲英,施伯乐.带否定的DATALOG的语义的不动点特性[J].软件学报,1995,6(5):257-264. 被引量:1
  • 2林闯,汪洋,李泉林.网络安全的随机模型方法与评价技术[J].计算机学报,2005,28(12):1943-1956. 被引量:92
  • 3樊亚军,刘久文.TPM安全芯片设计与实现[J].信息安全与通信保密,2007,29(6):136-137. 被引量:5
  • 4罗武庭.DJ—2可变矩形电子束曝光机的DMA驱动程序[J].LSI制造与测试,1989,10(4):20-26. 被引量:373
  • 5张旻晋 桂文明 苏递生 等.从终端到网络的可信计算技术.信息技术快报,2006,4(2):21-34.
  • 6Organization for the Advancement of Structured Information Standards (OASIS) http://www.oasis-open.org/.
  • 7Distributed Management Task Force (DMTF) http://www.dmtf.org/home.
  • 8Cloud Security Alliance http://www.cloudsecurityalliance.org.
  • 9Crampton J, Martin K, Wild P. On key assignment for hierarchical access control. In: Guttan J, ed, Proc. of the 19th IEEE Computer Security Foundations Workshop--CSFW 2006. Venice: IEEE Computer Society Press, 2006. 5-7.
  • 10Damiani E, De S, Vimercati C, Foresti S, Jajodia S, Paraboschi S, Samarati P. An experimental evaluation of multi-key strategies for data outsourcing. In: Venter HS, Eloff MM, Labuschagne L, Eloff JHP, Solms RV, eds. New Approaches for Security, Privacy and Trust in Complex Environments, Proc. of the IFIP TC-11 22nd Int'l Information Security Conf. Sandton: Springer-Verlag, 2007. 395-396.

共引文献1341

同被引文献20

引证文献5

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部