A Practical Framework for Policy Composition and Conflict Resolution

Ousmane Amadou Dia, C. Farkas
{"title":"A Practical Framework for Policy Composition and Conflict Resolution","authors":"Ousmane Amadou Dia, C. Farkas","doi":"10.4018/JSSE.2012100101","DOIUrl":null,"url":null,"abstract":"In collaborative environments where resources must be shared across multiple sites, the access control policies of the participants must be combined in order to define a coherent policy. The relevant challenge in composing access policies is to deal with inconsistencies or modality conflicts. This difficulty exacerbates when the policies to compose are specified independently by different entities with no global power to decide in case of conflicts which entity must take precedence. This paper presents a semi-automated framework called Policy Composition and Conflict Resolution framework (P2CR) to address this issue. They focus on access control policies expressed as XACML statements. The authors propose a three-level conflicts resolution strategy: i) by using metadata added to the policies, ii) by using a defeasible logic theory, and iii) by providing recommendations to the entities owners of the resources. First, they provide a mechanism to add metadata to XACML. Second, they combine the access policies without prioritizing any of the entities involved in the composition. Given the context of the authors’ work, they consider this approach to be more suitable than the current approaches that are mainly negotiation-oriented or assign priorities to the policies. Finally, the resulting composite policy appears flexible and easily adjustable to runtime conflicts. DOI: 10.4018/jsse.2012100101 2 International Journal of Secure Software Engineering, 3(4), 1-26, October-December 2012 Copyright © 2012, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited. as well as cloud service provider, abides by the security, compliance and risk management requirements of the others. Thus, to allow the entities to interact safely, their access policies must necessarily be compared and composed. In this paper, leveraging the community clouds as an illustrative example, we address the policy composition problem in a broader scenario in which different entities are interested in composing their independently stated policies while retaining their autonomy i.e., maintaining the control over their resources. A non-trivial challenge generally faced in this context is the occurrence of conflicts. Two access policies may apply to same objects and yield upon request of the objects contradictory evaluation results. Access control systems governed by such policies cannot deterministically decide whether to grant access to the requested objects or to deny the access. Consequently, they may even allow certain users to access resources they are not authorized for or deny the access to the legitimate ones. Thus, to enable access policies in individual systems to unambiguously evaluate users requests, many conflict resolution strategies have been proposed (Reeder, Bauer, Cranor, Reiter, & Vaniea, 2009; Cuppens, CuppensBoulahia, & Ghorbel, 2007; Dong, Russello, & Dulay, 2008; Jajodia, Samarati, Sapino, & Subramanian, 2001; Moffett & Sloman, 1993; XACML, 2005). However, in situations where several autonomous entities want to integrate their independent access policies, these strategies are limited. Conflicts that occur in this scenario are difficult to eliminate because of the diversity of the policies of the entities, and more importantly because of the conflict resolution strategies that they use. Currently, no effective technique exists for resolving these conflicts while the policies are being integrated (Mohan & Blough, 2010). An intuitive approach could however be to pick the conflict resolution strategy of a random entity and adopt it as the conflict resolution technique of all the policies. Unfortunately, because each entity enforces the strategy it finds more suitable to its needs, such an approach would result in many cases inconclusive. A typical example is two entities, A that applies the Deny-overrides (XACML, 2005) scheme to restrict access to its resources, and B that uses the Permit-overrides (XACML, 2005) method to ensure the availability of its data. In this case, if the strategy that B uses is applied, then resources of A may be accessed by unauthorized users. Conversely, if we opt for the strategy of A, then access to resources of B may be severely restricted. Over the past years, considerable work in composing independently stated access policies has been done (Bertolissi & Fernandez, 2008; Bonatti, Vimercati, & Samarati, 2000; Bruns, Dantas, & Huth, 2007; Lin, Rao, Bertino, & Lobo, 2010; Lupu & Sloman, 1999; Mazzoleni, Bertino, & Crispo, 2008; Ni, Bertino, & Lobo, 2009; Rao, Lin, Bertino, Lui, & Lobo, 2009). The approach common to many of the proposed studies is to combine these policies based on the priorities they are assigned with. Assigning priorities to policies is however difficult, and understanding them even more because the priorities are generally represented as numbers and no semantic is attached to them to reflect their meaning (Agrawal, Giles, Lee, & Lobo, 2007; Lee, Boyer, Olson, & Gunter, 2006). In addition, in many studies, the composite policy resulting from the integration of the policies is enforced in only one point. What this entails is either the party that administers the single point of enforcement is heading all the entities, or it is mandated by them to combine their individual access policies and to manage the resulting policy. However, entities that are interested in combining their policies may be under the authority of different parties or reluctant to part with the administration of their resources. Lastly, in many proposals, conflicts are detected manually (e.g., Agrawal et al., 2007) and their causes usually overlooked (e.g., Mazzoleni et al., 2008), and in order to eliminate the conflicts, access to resources to which conflicting policies apply are denied. However, such an approach is limited. First, without a precise knowledge of what causes a conflict it is difficult to guarantee the effectiveness of the solution that one would adopt to resolve the conflict. Moreover, in a 24 more pages are available in the full version of this document, which may be purchased using the \"Add to Cart\" button on the publisher's webpage: www.igi-global.com/article/practical-framework-policycomposition-conflict/74842","PeriodicalId":89158,"journal":{"name":"International journal of secure software engineering","volume":"15 1","pages":"1-26"},"PeriodicalIF":0.0000,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"International journal of secure software engineering","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.4018/JSSE.2012100101","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 5

Abstract

In collaborative environments where resources must be shared across multiple sites, the access control policies of the participants must be combined in order to define a coherent policy. The relevant challenge in composing access policies is to deal with inconsistencies or modality conflicts. This difficulty exacerbates when the policies to compose are specified independently by different entities with no global power to decide in case of conflicts which entity must take precedence. This paper presents a semi-automated framework called Policy Composition and Conflict Resolution framework (P2CR) to address this issue. They focus on access control policies expressed as XACML statements. The authors propose a three-level conflicts resolution strategy: i) by using metadata added to the policies, ii) by using a defeasible logic theory, and iii) by providing recommendations to the entities owners of the resources. First, they provide a mechanism to add metadata to XACML. Second, they combine the access policies without prioritizing any of the entities involved in the composition. Given the context of the authors’ work, they consider this approach to be more suitable than the current approaches that are mainly negotiation-oriented or assign priorities to the policies. Finally, the resulting composite policy appears flexible and easily adjustable to runtime conflicts. DOI: 10.4018/jsse.2012100101 2 International Journal of Secure Software Engineering, 3(4), 1-26, October-December 2012 Copyright © 2012, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited. as well as cloud service provider, abides by the security, compliance and risk management requirements of the others. Thus, to allow the entities to interact safely, their access policies must necessarily be compared and composed. In this paper, leveraging the community clouds as an illustrative example, we address the policy composition problem in a broader scenario in which different entities are interested in composing their independently stated policies while retaining their autonomy i.e., maintaining the control over their resources. A non-trivial challenge generally faced in this context is the occurrence of conflicts. Two access policies may apply to same objects and yield upon request of the objects contradictory evaluation results. Access control systems governed by such policies cannot deterministically decide whether to grant access to the requested objects or to deny the access. Consequently, they may even allow certain users to access resources they are not authorized for or deny the access to the legitimate ones. Thus, to enable access policies in individual systems to unambiguously evaluate users requests, many conflict resolution strategies have been proposed (Reeder, Bauer, Cranor, Reiter, & Vaniea, 2009; Cuppens, CuppensBoulahia, & Ghorbel, 2007; Dong, Russello, & Dulay, 2008; Jajodia, Samarati, Sapino, & Subramanian, 2001; Moffett & Sloman, 1993; XACML, 2005). However, in situations where several autonomous entities want to integrate their independent access policies, these strategies are limited. Conflicts that occur in this scenario are difficult to eliminate because of the diversity of the policies of the entities, and more importantly because of the conflict resolution strategies that they use. Currently, no effective technique exists for resolving these conflicts while the policies are being integrated (Mohan & Blough, 2010). An intuitive approach could however be to pick the conflict resolution strategy of a random entity and adopt it as the conflict resolution technique of all the policies. Unfortunately, because each entity enforces the strategy it finds more suitable to its needs, such an approach would result in many cases inconclusive. A typical example is two entities, A that applies the Deny-overrides (XACML, 2005) scheme to restrict access to its resources, and B that uses the Permit-overrides (XACML, 2005) method to ensure the availability of its data. In this case, if the strategy that B uses is applied, then resources of A may be accessed by unauthorized users. Conversely, if we opt for the strategy of A, then access to resources of B may be severely restricted. Over the past years, considerable work in composing independently stated access policies has been done (Bertolissi & Fernandez, 2008; Bonatti, Vimercati, & Samarati, 2000; Bruns, Dantas, & Huth, 2007; Lin, Rao, Bertino, & Lobo, 2010; Lupu & Sloman, 1999; Mazzoleni, Bertino, & Crispo, 2008; Ni, Bertino, & Lobo, 2009; Rao, Lin, Bertino, Lui, & Lobo, 2009). The approach common to many of the proposed studies is to combine these policies based on the priorities they are assigned with. Assigning priorities to policies is however difficult, and understanding them even more because the priorities are generally represented as numbers and no semantic is attached to them to reflect their meaning (Agrawal, Giles, Lee, & Lobo, 2007; Lee, Boyer, Olson, & Gunter, 2006). In addition, in many studies, the composite policy resulting from the integration of the policies is enforced in only one point. What this entails is either the party that administers the single point of enforcement is heading all the entities, or it is mandated by them to combine their individual access policies and to manage the resulting policy. However, entities that are interested in combining their policies may be under the authority of different parties or reluctant to part with the administration of their resources. Lastly, in many proposals, conflicts are detected manually (e.g., Agrawal et al., 2007) and their causes usually overlooked (e.g., Mazzoleni et al., 2008), and in order to eliminate the conflicts, access to resources to which conflicting policies apply are denied. However, such an approach is limited. First, without a precise knowledge of what causes a conflict it is difficult to guarantee the effectiveness of the solution that one would adopt to resolve the conflict. Moreover, in a 24 more pages are available in the full version of this document, which may be purchased using the "Add to Cart" button on the publisher's webpage: www.igi-global.com/article/practical-framework-policycomposition-conflict/74842
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
政策构成和冲突解决的实用框架
在必须跨多个站点共享资源的协作环境中,必须将参与者的访问控制策略组合起来,以定义一致的策略。组合访问策略的相关挑战是处理不一致或模态冲突。当要组成的策略由不同的实体独立指定时,这种困难会加剧,而这些实体在发生冲突时没有全局权力来决定哪个实体必须优先考虑。本文提出了一个称为策略组合和冲突解决框架(P2CR)的半自动化框架来解决这个问题。它们侧重于用XACML语句表示的访问控制策略。作者提出了一个三级冲突解决策略:i)通过使用添加到策略中的元数据,ii)通过使用可行的逻辑理论,以及iii)通过向资源的实体所有者提供建议。首先,它们提供了一种向XACML添加元数据的机制。其次,它们组合访问策略而不优先考虑组合中涉及的任何实体。鉴于作者工作的背景,他们认为这种方法比目前主要以谈判为导向或为政策分配优先次序的方法更合适。最后,生成的组合策略看起来很灵活,很容易根据运行时冲突进行调整。DOI: 10.4018 / jsse。2012100101 2国际安全软件工程学报,3(4),1- 26,2012年10 - 12版权所有©2012,IGI Global。未经IGI Global书面许可,禁止以印刷或电子形式复制或分发。以及云服务提供商,遵守其他方的安全、合规和风险管理要求。因此,为了允许实体安全地交互,必须比较和组合它们的访问策略。在本文中,我们利用社区云作为一个说明性的例子,在一个更广泛的场景中解决策略组合问题,在这个场景中,不同的实体对组合它们独立声明的策略感兴趣,同时保持它们的自主性,即保持对其资源的控制。在这种情况下,通常面临的一个重要挑战是冲突的发生。两个访问策略可以应用于相同的对象,并且在对象请求时产生相互矛盾的评估结果。由这种策略控制的访问控制系统不能确定地决定是授予对所请求对象的访问权限还是拒绝访问权限。因此,它们甚至可能允许某些用户访问未授权的资源,或拒绝对合法资源的访问。因此,为了使单个系统中的访问策略能够明确地评估用户请求,已经提出了许多冲突解决策略(Reeder, Bauer, Cranor, Reiter, & Vaniea, 2009;Cuppens, CuppensBoulahia, & Ghorbel, 2007;Dong, Russello, & Dulay, 2008;Jajodia, Samarati, Sapino, & Subramanian, 2001;Moffett & Sloman, 1993;XACML, 2005)。然而,在几个自治实体希望集成其独立访问策略的情况下,这些策略是有限的。由于实体策略的多样性,在此场景中发生的冲突很难消除,更重要的是由于它们使用的冲突解决策略。目前,在整合政策的同时,还没有有效的技术来解决这些冲突(Mohan & Blough, 2010)。然而,一种直观的方法可能是选择一个随机实体的冲突解决策略,并将其作为所有策略的冲突解决技术。不幸的是,由于每个实体都执行它认为更适合其需要的战略,这种做法在许多情况下会导致不确定的结果。一个典型的例子是两个实体,A应用Deny-overrides (XACML, 2005)模式来限制对其资源的访问,B使用Permit-overrides (XACML, 2005)方法来确保其数据的可用性。在这种情况下,如果采用了B使用的策略,那么A的资源可能会被未授权的用户访问。相反,如果我们选择A的策略,那么获得B的资源可能会受到严重限制。在过去的几年里,在编写独立声明的访问策略方面已经做了大量的工作(Bertolissi & Fernandez, 2008;Bonatti, Vimercati, & Samarati, 2000;布伦斯,丹塔斯和胡特,2007;林、饶、伯蒂诺和洛博,2010;Lupu & Sloman, 1999;Mazzoleni, Bertino, & Crispo, 2008;Ni, Bertino, & Lobo, 2009;Rao, Lin, Bertino, Lui, & Lobo, 2009)。许多拟议研究的共同方法是根据分配给它们的优先次序将这些政策结合起来。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Analysis of Existing Software Cognitive Complexity Measures Risk Centric Activities in Secure Software Development in Public Organisations LDAP Vulnerability Detection in Web Applications A Database of Existing Vulnerabilities to Enable Controlled Testing Studies Goal Modelling for Security Problem Matching and Pattern Enforcement
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1