CFP last date
22 April 2024
Call for Paper
May Edition
IJCA solicits high quality original research papers for the upcoming May edition of the journal. The last date of research paper submission is 22 April 2024

Submit your paper
Know more
Reseach Article

Dynamic Trust Emergency Role-based Access Control (DTE-RBAC)

by Amar Arora, Anjana Gosain
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 175 - Number 24
Year of Publication: 2020
Authors: Amar Arora, Anjana Gosain
10.5120/ijca2020920773

Amar Arora, Anjana Gosain . Dynamic Trust Emergency Role-based Access Control (DTE-RBAC). International Journal of Computer Applications. 175, 24 ( Oct 2020), 20-24. DOI=10.5120/ijca2020920773

@article{ 10.5120/ijca2020920773,
author = { Amar Arora, Anjana Gosain },
title = { Dynamic Trust Emergency Role-based Access Control (DTE-RBAC) },
journal = { International Journal of Computer Applications },
issue_date = { Oct 2020 },
volume = { 175 },
number = { 24 },
month = { Oct },
year = { 2020 },
issn = { 0975-8887 },
pages = { 20-24 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume175/number24/31599-2020920773/ },
doi = { 10.5120/ijca2020920773 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:26:00.417992+05:30
%A Amar Arora
%A Anjana Gosain
%T Dynamic Trust Emergency Role-based Access Control (DTE-RBAC)
%J International Journal of Computer Applications
%@ 0975-8887
%V 175
%N 24
%P 20-24
%D 2020
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Data Warehouse (DW) security has always been a critical challenge for DW designers because of its global reachability via public networks. In order to maintain trade-off among security and accessibility, Role-Based Access Control (RBAC) has been considered a balanced approach over time. However, RBAC being inflexible, makes way for a flexible approach like break-the-glass (BTG) for emergencies. It allows overriding of all access control policies during an emergency like a fire, etc. To prevent any misuse of emergencies in BTG, Emergency RBAC (E-RBAC) proposed a combination of flexibility of BTG and separation of duty (SOD) constraints. Here, SOD constraints help in limiting user access to a certain level. In order to prevent any misuse, E-RBAC only allows users with high trust levels to initiate emergencies. The trust levels of users are calculated based on predefined parameters like experience, training hours, and user skill attributes, and thus remain fixed for a user. Here, in this paper, a dynamic trust analysis of the user based on the actions taken by them during the acquired emergencies has been proposed. The trust of the user can be dynamically modified to a lower level in case the action of the user leads to a breach of trust. The dynamic trust level of users prevents the system from any further damage in case of attempted misuse of emergencies. This paper also proposes the DTE-RBAC model, which provides a complete security solution to deal with the situation of breach of trust by highly trusted users in an automated fashion.

References
  1. Inmon WH. 1991. Building the Data Warehouse. Wiley and Sons
  2. Sandhu R. 1995. Issues in RBAC. In: RBAC ’95. ACM, New York, Gaithersburg, Maryland, USA, p 6
  3. Vela FLG, Montes JLI, Rodríguez PP, et al. 2007. An architecture for access control management in collaborative enterprise systems based on organization models. Sci Comput Program 66, 44–59. https://doi.org/10.1016/j.scico.2006.10.005
  4. Nazerian F, Motameni H, Nematzadeh H. 2019. Emergency role-based access control (E-RBAC) and analysis of model specifications with alloy. J Inf Secur Appl 45, 131–142. https://doi.org/10.1016/j.jisa.2019.01.008
  5. Ferreira A, Chadwick D, Farinha P, et al. 2009. How to Securely Break into RBAC: The BTG-RBAC Model. In Proceedings of the 2009 Annual Computer Security Applications Conference. IEEE, pp 23–31
  6. Rissanen E, Firozabadi BS, Sergot M. 2004. Towards a Mechanism for Discretionary Overriding of Access Control. In Proceedings of the Christianson B, Crispo B, Malcolm JA, Roe M (eds) Security Protocols. Springer Berlin Heidelberg, Berlin, Heidelberg. pp 312–319
  7. Sandhu RS, Coyne EJ, Feinstein HL, Youman CE. 1996. Role-based access control models. Computer 29, 38–47. https://doi.org/10.1109/2.485845
  8. Fernández-Medina E, Trujillo J, Villarroel R, Piattini M. 2006. Access control and audit model for the multidimensional modeling of data warehouses. Decis Support Syst 42, 1270–1289. https://doi.org/10.1016/j.dss.2005.10.008
  9. Thuraisingham B, Iyer S. 2007. Extended RBAC - Based Design and Implementation for a Secure Data Warehouse. In Proceedings of the ARES’07. IEEE, Vienna, Austria. pp 367–382
  10. Zou D, He L, Jin H, Chen X. 2009. CRBAC: Imposing multi-grained constraints on the RBAC model in the multi-application environment. J Netw Comput Appl 32, 402–411. https://doi.org/10.1016/j.jnca.2008.02.015
  11. Uzun E, Atluri V, Vaidya J, et al. 2014. Security analysis for temporal role based access control. J Comput Secur 22, 961–996. https://doi.org/10.3233/JCS-140510
  12. Longstaff J, Noble J. 2016. Attribute Based Access Control for Big Data Applications by Query Modification. In Proceedings of the 2016 IEEE Second International Conference on Big Data Computing Service and Applications (BigDataService). pp 58–65
  13. Jabbar S, Khan M, Silva BN, Han K. 2018. A REST-based industrial web of things’ framework for smart warehousing. J Supercomput 74, 4419–4433. https://doi.org/10.1007/s11227-016-1937-y
  14. Santos RJ, Bernardino J, Vieira M. 2011. A survey on data security in data warehousing: Issues, challenges and opportunities. In Proceedings of the 2011 IEEE EUROCON - International Conference on Computer as a Tool. pp 1–4
  15. Gosain A, Arora A. 2015. Security Issues in Data Warehouse: A Systematic Review. In Proceedings of the International Conference on Computer, Communication and Convergence (ICCC 2015). Procedia Computer Science. Elsevier. pp 149–157
  16. Osborn S, Sandhu R, Munawer Q. 2000. Configuring role-based access control to enforce mandatory and discretionary access control policies. ACM Trans Inf Syst Secur TISSEC 3, 85–106. https://doi.org/10.1145/354876.354878
  17. Pietraszek T. 2004. Using Adaptive Alert Classification to Reduce False Positives in Intrusion Detection. In Proceedings of the International Workshop on Recent Advances in Intrusion Detection. Springer, Berlin, Heidelberg. pp 102–124
  18. Santos RJ, Bernardino J, Vieira M. 2012. Evaluating the Feasibility Issues of Data Confidentiality Solutions from a Data Warehousing Perspective. In Proceedings of the International Conference on Data Warehousing and Knowledge Discovery. Springer, Vienna, Austria. pp 404–416
  19. Kadhem H, Amagasa T, Kitagawa H. 2013. Optimization Techniques for Range Queries in the Multivalued-partial Order Preserving Encryption Scheme. In Proceedings of the Fred A, Dietz JLG, Liu K, Filipe J (eds) Knowledge Discovery, Knowledge Engineering and Knowledge Management. Springer Berlin Heidelberg, Berlin, Heidelberg, pp 338–353
  20. Lopes CC, Times VC, Matwin S, et al. 2014. Processing OLAP Queries over an Encrypted Data Warehouse Stored in the Cloud. In Proceedings of the Bellatreche L., Mohania M.K. (eds) Data Warehousing and Knowledge Discovery. Springer. pp 195–207
  21. Park J, Sandhu R. 2004. The UCON ABC usage control model. ACM Trans Inf Syst Secur TISSEC 7, 128–174. https://doi.org/10.1145/984334.984339
  22. Joshi JBD, Bertino E, Latif U, Ghafoor A. 2005. A generalized temporal role-based access control model. IEEE Trans Knowl Data Eng 17, 4–23. https://doi.org/10.1109/TKDE.2005.1
  23. Gupta A, Kirkpatrick MS, Bertino E. 2014. A formal proximity model for RBAC systems. Comput Secur 41, 52–67. https://doi.org/10.1016/j.cose.2013.08.012
  24. Ray I, Toahchoodee M. 2007. A Spatio-temporal Role-Based Access Control Model. In Proceedings of the Barker S, Ahn G-J (eds) Data and Applications Security XXI. Springer Berlin Heidelberg, Berlin, Heidelberg. pp 211–226
  25. Wang S, Yang Y, Xia T, Zhang W. 2018. A Role and Node Based Access Control Model for Industrial Control Network. In Proceedings of the 2nd International Conference on Cryptography, Security and Privacy. Association for Computing Machinery, New York, NY, USA. pp 89–94
  26. Cruz JP, Kaji Y, Yanai N. 2018. RBAC-SC: Role-Based Access Control Using Smart Contract. IEEE Access 6, 12240–12251
  27. Osborn SL, Wang H. 2013. A Survey of Delegation from an RBAC Perspective. J Softw 8, 266–275
  28. Schefer-Wenzl S, Bukvova H, Strembeck M. 2014. A Review of Delegation and Break-Glass Models for Flexible Access Control Management. In Proceedings of the Abramowicz W, Kokkinaki A (eds) Business Information Systems Workshops. Springer International Publishing, Cham. pp 93–104
  29. Brucker AD, Petritsch H. 2009. Extending Access Control Models with Break-Glass. In Proceedings of the 14th ACM Symposium on Access Control Models and Technologies. Association for Computing Machinery, New York, NY, USA. pp 197–206
  30. Alqatawna J, Rissanen E, Sadighi B. 2007. Overriding of Access Control in XACML. In Proceedings of the Eighth IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY’07). IEEE. pp 87–95.
  31. Liu G, Zhang R, Song H, et al. 2016. Ts-RBAC: A RBAC model with transformation. Comput Secur 60, 52–61.https://doi.org/10.1016/j.cose.2016.03.006
Index Terms

Computer Science
Information Sciences

Keywords

Data Warehouse Security Role-Based Access Control Emergency RBAC.