Visible to the public Identifying Considerable Anomalies and Conflicts in ABAC Security Policies

TitleIdentifying Considerable Anomalies and Conflicts in ABAC Security Policies
Publication TypeConference Paper
Year of Publication2021
AuthorsVijayalakshmi, K., Jayalakshmi, V.
Conference Name2021 5th International Conference on Intelligent Computing and Control Systems (ICICCS)
KeywordsAccess Control, Access control models, Anomalies, attribute based access control model, Big Data, Computational modeling, Computers, conflicts, Intrusion detection, Policy validation, policy-based governance, pubcrawl, reliability, security policies, security policy, social networking (online)
AbstractNowadays security of shared resources and big data is an important and critical issue. With the growth of information technology and social networks, data and resources are shared in the distributed environment such as cloud and fog computing. Various access control models protect the shared resources from unauthorized users or malicious intruders. Despite the attribute-based access control model that meets the complex security requirement of todays' new computing technologies, considerable anomalies and conflicts in ABAC policies affect the efficiency of the security system. One important and toughest task is policy validation thus to detect and eliminate anomalies and conflicts in policies. Though the previous researches identified anomalies, failed to detect and analyze all considerable anomalies that results vulnerable to hacks and attacks. The primary objective of this paper is to study and analyze the possible anomalies and conflicts in ABAC security policies. We have discussed and analyzed considerable conflicts in policies based on previous researches. This paper can provide a detailed review of anomalies and conflicts in security policies.
DOI10.1109/ICICCS51141.2021.9432162
Citation Keyvijayalakshmi_identifying_2021