A provenance-based access control model for dynamic separation of duties

Dynamic Separation of Duties (DSOD) is a well-known and important concept in cyber security, which has been extensively studied in the literature. The published literature mostly assumes that necessary information for enabling DSOD constraints is readily available. As such, there has been little discussion on the tasks of capturing, storing, extracting, and utilizing necessary historical information. Since this information is often in the form of system events history, provenance data is naturally suitable as the source for DSOD-related information. Recently the notion of provenance-based access control (PBAC) has been formulated and a base PBAC model (PBACB) together with an underlying provenance data model has been formally specified [19], [22]. Unlike Role-based Access Control where DSOD is modeled as a constraint, PBACB directly maintains and utilizes the necessary information for DSOD enforcement. In this paper, we propose an enhanced model, PBACc, by extending both the provenance data model and the PBACB model to enforce various DSOD policy classes identified in the literature, and go beyond these to specify novel DSOD policy classes. A proof-of-concept prototype is implemented and evaluated to demonstrate the feasibility of our approach.

[1]  Ravi Sandhu,et al.  Transaction control expressions for separation of duties , 1988, [Proceedings 1988] Fourth Aerospace Computer Security Applications.

[2]  Xin Jin,et al.  A Unified Attribute-Based Access Control Model Covering DAC, MAC and RBAC , 2012, DBSec.

[3]  Paul T. Groth,et al.  Security Issues in a SOA-Based Provenance System , 2006, IPAW.

[4]  David F. Ferraiolo,et al.  On the formal definition of separation-of-duty policies and their composition , 1998, Proceedings. 1998 IEEE Symposium on Security and Privacy (Cat. No.98CB36186).

[5]  J. Carroll,et al.  Jena: implementing the semantic web recommendations , 2004, WWW Alt. '04.

[6]  Jaehong Park,et al.  Integrated provenance data for access control in group-centric collaboration , 2012, 2012 IEEE 13th International Conference on Information Reuse & Integration (IRI).

[7]  Marianne Winslett,et al.  Introducing secure provenance: problems and challenges , 2007, StorageSS '07.

[8]  Thomas Heinis,et al.  Efficient lineage tracking for scientific workflows , 2008, SIGMOD Conference.

[9]  Adriane Chapman,et al.  Efficient provenance storage , 2008, SIGMOD Conference.

[10]  Margo I. Seltzer,et al.  Provenance-Aware Storage Systems , 2006, USENIX ATC, General Track.

[11]  E. Prud hommeaux,et al.  SPARQL query language for RDF , 2011 .

[12]  Bhavani M. Thuraisingham,et al.  A language for provenance access control , 2011, CODASPY '11.

[13]  Jaehong Park,et al.  Dependency Path Patterns as the Foundation of Access Control in Provenance-aware Systems , 2012, TaPP.

[14]  James Cheney,et al.  Provenance management in curated databases , 2006, SIGMOD Conference.

[15]  Jaehong Park,et al.  Engineering access control policies for provenance-aware systems , 2013, CODASPY '13.

[16]  Yogesh L. Simmhan,et al.  The Open Provenance Model core specification (v1.1) , 2011, Future Gener. Comput. Syst..

[17]  Shouhuai Xu,et al.  An Access Control Language for a General Provenance Model , 2009, Secure Data Management.

[18]  Margo I. Seltzer,et al.  Securing Provenance , 2008, HotSec.

[19]  Marianne Winslett,et al.  Preventing history forgery with secure provenance , 2009, TOS.

[20]  Elisa Bertino,et al.  Supporting RBAC with XACML+OWL , 2009, SACMAT '09.

[21]  Adriane Chapman,et al.  PLUS: A provenance manager for integrated information , 2011, 2011 IEEE International Conference on Information Reuse & Integration.

[22]  Ravi S. Sandhu,et al.  Role-Based Access Control Models , 1996, Computer.

[23]  Jaehong Park,et al.  A provenance-based access control model , 2012, 2012 Tenth Annual International Conference on Privacy, Security and Trust.

[24]  Mary Ellen Zurko,et al.  Separation of duty in role-based environments , 1997, Proceedings 10th Computer Security Foundations Workshop.

[25]  Jaehong Park,et al.  The UCONABC usage control model , 2004, TSEC.

[26]  Yolanda Gil,et al.  PROV-DM: The PROV Data Model , 2013 .

[27]  Kevin R. B. Butler,et al.  Towards secure provenance-based access control in cloud environments , 2013, CODASPY.