Lightweight implementation of abac mechanism on database firewall | Applied Discrete Mathematics. Supplement. 2016. № 9.

Lightweight implementation of abac mechanism on database firewall

We propose a lightweight non-invasive method for implementing attribute based access control for RDBMS MySQL on DatabaseFirewall. Implemented access control mechanism consists of two parts. According to NIST ABAC terminology, the first part is Policy Enforcement Point (PEP) and the second one is Policy Decision Point (PDP). PDP and PEP communicate using HTTP protocol. PEP is handling SQL queries from client, parsing it and sending to PDP via HTTP. PDP implements lightweight core of ABAC. The main purpose of this part is taking a decision to permit or deny access based on stored policies. After the decision is made, PDP sends it to PEP. We developed a new role view mechanism to combine RBAC and ABAC. This mechanism is used to translate privileges from RBAC roles to ABAC rules. ABAC rules are configured using a special language named AF Rules and specified in JSON format. These rules are translated to PDP code, which implements access control checks.

Download file
Counter downloads: 259

Keywords

управление доступом, ABAC, RBAC, защитный экран, СУБД, access control, ABAC, RBAC, Database Firewall

Authors

NameOrganizationE-mail
Kolegov D. N.Tomsk State University; "Positive Technologies"d.n.kolegov@gmail.com
Tkachenko N. O.Tomsk State University; "Positive Technologies"n.o.tkachenko@gmail.com
Всего: 2

References

Hu V. C., Ferraiolo D., Kuhn R., et al. Guide to Attribute Based Access Control (ABAC) Definition and Considerations [Электронный ресурс]. http://nvlpubs.nist.gov/nistpubs/ specialpublications/NIST.sp.800-162.pdf
Role Based Access Control. American National Standarts Institute, Inc., 2004. http:// profsandhu.com/journals/tissec/ANSI+INCITS+359-2004.pdf
Колегов Д. Н.,Ткаченко Н. О. Неинвазивная реализация мандатного управления доступом в веб-приложениях на уровне СУБД //Прикладная дискретная математика. Приложение. 2015. №8. С. 89-92.
Колегов Д. Н., Ткаченко Н. О. Неинвазивное устранение уязвимостей логического управления доступом в веб-приложениях [Электронный ресурс]. https://www.youtube.com/ watch?v=SPiY6D3M0yE
Brossard D. Understanding XACML combining algorithms [Электронный ресурс]. https: //www.axiomatics.com/blog/entry/understanding-xacml-combining-algorithms.html
 Lightweight implementation of abac mechanism on database firewall | Applied Discrete Mathematics. Supplement. 2016. № 9.

Lightweight implementation of abac mechanism on database firewall | Applied Discrete Mathematics. Supplement. 2016. № 9.

Download full-text version
Counter downloads: 1385