A Formal Study of Collaborative Access Control in Distributed Datalog

We formalize and study a declaratively specified collaborative access control mechanism for data dissemination in a distributed environment. Data dissemination is specified using distributed datalog. Access control is also defined by datalog-style rules, at the relation level for extensional relations, and at the tuple level for intensional ones, based on the derivation of tuples. The model also includes a mechanism for " declassifying " data, that allows circumventing overly restrictive access control. We consider the complexity of determining whether a peer is allowed to access a given fact, and address the problem of achieving the goal of disseminating certain information under some access control policy. We also investigate the problem of information leakage, which occurs when a peer is able to infer facts to which the peer is not allowed access by the policy. Finally, we consider access control extended to facts equipped with provenance information, motivated by the many applications where such information is required. We provide semantics for access control with provenance, and establish the complexity of determining whether a peer may access a given fact together with its provenance. This work is motivated by the access control of the Webdamlog system, whose core features it formalizes.

[1]  Martín Abadi,et al.  A calculus for access control in distributed systems , 1991, TOPL.

[2]  S. Sudarshan,et al.  Fine Grained Authorization Through Predicated Grants , 2007, 2007 IEEE 23rd International Conference on Data Engineering.

[3]  Patricia G. Selinger,et al.  Access path selection in a relational database management system , 1979, SIGMOD '79.

[4]  Val Tannen,et al.  Provenance semirings , 2007, PODS.

[5]  Patrick Valduriez,et al.  Principles of Distributed Database Systems, Third Edition , 2011 .

[6]  Prashant Malik,et al.  Cassandra: a decentralized structured storage system , 2010, OPSR.

[7]  S. Sudarshan,et al.  Extending query rewriting techniques for fine-grained access control , 2004, SIGMOD '04.

[8]  BertinoElisa,et al.  Database Security-Concepts, Approaches, and Challenges , 2005 .

[9]  Bhavani M. Thuraisingham,et al.  A semantic web based framework for social network access control , 2009, SACMAT '09.

[10]  Daniel Deutch,et al.  Provenance for aggregate queries , 2011, PODS.

[11]  Serge Abiteboul,et al.  Foundations of Databases , 1994 .

[12]  Wolfgang Nejdl,et al.  Evaluating Recursive Queries in Distributed Databases , 1993, IEEE Trans. Knowl. Data Eng..

[13]  Dan Suciu,et al.  Automatic Enforcement of Data Use Policies with DataLawyer , 2015, SIGMOD Conference.

[14]  Ioana Manolescu,et al.  Web Data Management , 2011 .

[15]  Jaehong Park,et al.  A provenance-based access control model , 2012, 2012 Tenth Annual International Conference on Privacy, Security and Trust.

[16]  Patrick Valduriez,et al.  Principles of Distributed Database Systems , 1990 .

[17]  Serge Abiteboul,et al.  Collaborative Access Control in WebdamLog , 2015, SIGMOD Conference.

[18]  Jorge Lobo,et al.  On the Correctness Criteria of Fine-Grained Access Control in Relational Databases , 2007, VLDB.

[19]  Michael Sipser,et al.  Introduction to the Theory of Computation , 1996, SIGA.

[20]  Serge Abiteboul,et al.  A rule-based language for web data management , 2011, PODS.

[21]  David J. DeWitt,et al.  Limiting Disclosure in Hippocratic Databases , 2004, VLDB.

[22]  Elena Ferrari,et al.  Access Control in Data Management Systems , 2010, Access Control in Data Management Systems.

[23]  Serge Abiteboul,et al.  Rule-based application development using Webdamlog , 2013, SIGMOD '13.

[24]  Guy Hulin,et al.  Parallel Processing of Recursive Queries in Distributed Architectures , 1989, VLDB.

[25]  Serge Abiteboul,et al.  Complexity of answering queries using materialized views , 1998, PODS.

[26]  Balder ten Cate,et al.  Queries with Guarded Negation , 2012, Proc. VLDB Endow..

[27]  Hong Zhu,et al.  Controlling Information Leakage of Fine-Grained Access Model in DBMSs , 2008, 2008 The Ninth International Conference on Web-Age Information Management.

[28]  Anand Rajaraman,et al.  Answering queries using templates with binding patterns (extended abstract) , 1995, PODS.

[29]  Surajit Chaudhuri,et al.  On the Equivalence of Recursive and Nonrecursive Datalog Programs , 1997, J. Comput. Syst. Sci..

[30]  Anthony J. Bonner,et al.  Transaction datalog: A compositional language for transaction programming , 1997 .

[31]  Michael Stonebraker,et al.  The design and implementation of INGRES , 1976, TODS.

[32]  Serge Abiteboul,et al.  Web information management with access control , 2011, WebDB.

[33]  Carl A. Gunter,et al.  A formal framework for reflective database access control policies , 2008, CCS.

[34]  Elisa Bertino,et al.  Database security - concepts, approaches, and challenges , 2005, IEEE Transactions on Dependable and Secure Computing.