A Similarity Value Measure of ABAC Security Rules | IEEE Conference Publication | IEEE Xplore

A Similarity Value Measure of ABAC Security Rules

Publisher: IEEE

Abstract:

Today's computing technologies offer and avail shared data and other resources making them available all to every user who needs them. Protecting shared resources in the ...View more

Abstract:

Today's computing technologies offer and avail shared data and other resources making them available all to every user who needs them. Protecting shared resources in the distributed environment gives many critical security issues. Many access control models are used in the intrusion detection system to prevent dangerous attacks and malicious intruders. The attribute-based access control model (ABAC) is a boon to address today's complex security requirements due to the flexibility, efficiency, and granularity of the model. Despite the ABAC is proving well in overcoming the security issues, the errors in the policy sets cause critical security issues that should be resolved. The process of detecting and resolving anomalies, conflicts, or errors in every security rule is a time-consuming task. Hence the rules are clustered based on the similarity value of the rules. Existing approaches use the boolean function or logical-based analysis to measure the similarity value of security rules that do not measure accurately in heterogeneous datasets. The main aim of this paper is to propose an approach to measure the similarity value of pair of ABAC rules accurately. We aim to create databases to store and maintain the ABAC rules, and an individual domain for the name and value of each attribute to tackle the heterogeneous datasets. We proposed a stored function for measuring and returning similarity values. We extend our work by implementing the generated rules to describe the efficiency and performance of our approach. This work may help the researchers in measuring the accurate similarity value of rules.
Date of Conference: 03-05 June 2021
Date Added to IEEE Xplore: 21 June 2021
ISBN Information:
Publisher: IEEE
Conference Location: Tirunelveli, India

I. Introduction

Cloud computing offers several facilities that every computing requirement or resource can be shared with the help of information technology, storage availability, and the internet. The user can avail of the resource on a demand basis [1]. As the term big data implies the complexity of storing and managing big data, the data owners can easily store their outsourced data in the clouds. However all resources are shared including data to make available to everyone, security is an important matter. The cloud service provider should give trust to the owners in preserving the privacy and integrity of the data and other resources [2]. The cloud service providers use many access control models in the intrusion detection and prevention system. Though many access control models are proposed, four access control models are efficient in protecting shared resources in their own way: 1)Discretionary access control model(DAC), 2)Mandatory access control model (MAC), 3) Role-based access control model (RBAC), and Attribute-based access control model(ABAC) [3].

References

References is not available for this document.