Specifying and enforcing the principle of least privilege in role‐based access control

The principle of least privilege in role‐based access control is an important area of research. There are two crucial issues related to it: the specification and the enforcement. We believe that the existing least privilege specification schemes are not comprehensive enough and few of the enforcement methods are likely to scale well. In this paper, we formally define the basic principle of least privilege problem and present different variations, called the delta‐approx principle of least privilege problem and the minimizing‐approx principle of least privilege problem. Since there may be more than one result to enforce the same principle of least privilege, we introduce the notation about weights of permissions and roles to optimize the results. Then we prove that all least privilege problems are NP‐complete. As an important contribution of the paper, we show that the principle of least privilege problem can be reduced to minimal cost set covering (MCSC) problem. We can borrow the existing solutions of MCSC to solve the principle of least privilege problems. Finally, different algorithms are designed to solve the proposed least privilege problems. Experiments on performance study prove the superiority of our algorithms. Copyright © 2011 John Wiley & Sons, Ltd.

[1]  Ruixuan Li,et al.  Request-driven role mapping framework for secure interoperation in multi-domain environments , 2008, Comput. Syst. Sci. Eng..

[2]  Ninghui Li,et al.  On mutually-exclusive roles and separation of duty , 2004, CCS '04.

[3]  S. G. Ponnambalam,et al.  Evolutionary Search Techniques to Solve Set Covering Problems , 2008 .

[4]  K. Al-Sultan,et al.  A Genetic Algorithm for the Set Covering Problem , 1996 .

[5]  D. Richard Kuhn,et al.  Role-Based Access Control ( RBAC ) : Features and Motivations , 2014 .

[6]  Ravi S. Sandhu,et al.  Role-Based Access Control Models , 1996, Computer.

[7]  Fred B. Schneider,et al.  Least Privilege and More , 2003, IEEE Secur. Priv..

[8]  Di Wu,et al.  Security Violation Detection for RBAC Based Interoperation in Distributed Environment , 2008, IEICE Trans. Inf. Syst..

[9]  D. Richard Kuhn,et al.  Mutual exclusion of roles as a means of implementing separation of duty in role-based access control systems , 1997, RBAC '97.

[10]  Christos Faloutsos,et al.  Epidemic thresholds in real networks , 2008, TSEC.

[11]  Ruixuan Li,et al.  Role mining based on weights , 2010, SACMAT '10.

[12]  Jerome H. Saltzer,et al.  The protection of information in computer systems , 1975, Proc. IEEE.

[13]  Ruixuan Li,et al.  Establishing RBAC-Based Secure Interoperability in Decentralized Multi-domain Environments , 2007, ICISC.

[14]  Vijayalakshmi Atluri,et al.  The role mining problem: finding a minimal descriptive set of roles , 2007, SACMAT '07.

[15]  Jason Crampton,et al.  Inter-domain role mapping and least privilege , 2007, SACMAT '07.

[16]  David S. Johnson,et al.  Computers and Intractability: A Guide to the Theory of NP-Completeness , 1978 .

[17]  Pauli Miettinen,et al.  The Discrete Basis Problem , 2008, IEEE Trans. Knowl. Data Eng..