Previous [ 1] [ 2] [ 3] [ 4] [ 5] [ 6] [ 7] [ 8] [ 9] [ 10] [ 11] [ 12] [ 13] [ 14] [ 15] [ 16]


Journal of Information Science and Engineering, Vol. 32 No. 6, pp. 1455-1470 (November 2016)


Secret Sharing Scheme Based Approach for Access Control Constraint Against Similar Users' Collusive Attack


NURMAMAT HELIL1,2,* AND KAYSAR RAHMAN1
1College of Mathematics and System Science
Xinjiang University
Urumqi, 830046 P.R. China
E-mail: {nur924@sina.com; kaysar2001@sina.com}
2Xinjiang Key Laboratory of Multilingual Information Technology
Urumqi, 830046 P.R. China

Constraint is the core problem of high-level access control. Traditional access control constraints, such as Separation of Duty (SOD) constraints of Role-Based Access Control (RBAC) and Chinese wall policy, lack the consideration of user similarity and sensitive combination of permissions or objects. Secret sharing scheme is used to share important data or complete a sensitive task. This paper proposes secret sharing scheme based approach for access control constraints which are against similar user clusters and sensitive combination of permissions. The proposed approach not only flexibly enforces traditional access control constraints but also effectively prevents similar users collusive attack. The feasibility and effectiveness of the proposed approach is shown by test results.

Keywords: role-based access control, separation of duty, Chinese wall policy, secret sharing scheme, overlapping clustering

Full Text () Retrieve PDF document (201611_03.pdf)

Received November 5, 2015; revised January 6, 2016; accepted February 18, 2016.
Communicated by Hahn-Ming Lee.
* Corresponding author.