Pair-Wise Privilege Control for Cross-Domain Private Data Sharing
نویسندگان
چکیده
Enterprise-scale organizations have large numbers of internal and external users, with different privilege requirements spanning across many resources. The dynamic nature of modern organizations demands that they efficiently and securely provision and deactivate data privileges to reflect rapidly changing user responsibilities. Previous approaches to consolidated user provisioning have focused on constructing and maintaining a formal model of user privileges, in order to predict what role/roles should be assigned to any given user, based on user classification and other user attributes. In realworld deployments, formal models have not scaled well, because many users are unique and consequently there is no leverage to be gained by grouping them into roles. This paper proposes a scheme for dual control of user granular privilege and dynamic granular data access. The framework includes a correlated privilege control model and a label-based dynamic access level process. The method supports user activity control over cross-domain objects with variable data access granularity. It encompasses the advantages of existing role based and label based control, while reducing computation complexity and storage requirements. The proposed method has been formally verified and implemented in JAVA.
منابع مشابه
Security, Privacy and Interoperability in Heterogeneous Systems
Partners in VOs can share large amount of data. Sharing of individual data items is straightforward, but sharing components of complex data structures stored in heterogeneous systems is often a challenge. Sharing is typically governed by rules and policies that need to be translated into access right / privilege control and data granularity control. Simultaneous control of privileges and data g...
متن کاملA Novel Technique for Steganography Method Based on Improved Genetic Algorithm Optimization in Spatial Domain
This paper devotes itself to the study of secret message delivery using cover image and introduces a novel steganographic technique based on genetic algorithm to find a near-optimum structure for the pair-wise least-significant-bit (LSB) matching scheme. A survey of the related literatures shows that the LSB matching method developed by Mielikainen, employs a binary function to reduce the numbe...
متن کاملRole-Based Secure Inter-operation and Resource Usage Management in Mobile Grid Systems
Dynamic inter-domain collaborations and resource sharing comprise two key characteristics of mobile Grid systems. However, interdomain collaborations have proven to be vulnerable to conflicts that can lead to privilege escalation. These conflicts are detectable in interoperation policies, and occur due to cross-domain role relationships. In addition, resource sharing requires to be enhanced wit...
متن کاملPrivacy-Aware Granular Data Access Control For Cross-Domain Data Sharing
In an e-health environment, medical data is shared electronically between different parties. Improper access to such a data can have the possibility of adversely affecting some participants as this data often represents private and sensitive information that should only be accessed by authorised organizations and individuals. Most existing solutions either focus on user access control or object...
متن کاملBehavior-Based Access Control for Distributed Healthcare Systems
Sensitivity of clinical data and strict rules regarding data sharing have caused privacy and security to be critical requirements for using patient profiles in distributed healthcare systems. The amalgamation of new information technology with traditional healthcare workflows for sharing patient profiles has made the whole system vulnerable to privacy and security breaches. Standardization orga...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2010