Toward a Usage-Based Security Framework for Collaborative Computing Systems

  • Authors:
  • Xinwen Zhang;Masayuki Nakae;Michael J. Covington;Ravi Sandhu

  • Affiliations:
  • Samsung Information Systems America;NEC Corporation;Intel Corporation;University of Texas at San Antonio and TriCipher Inc.

  • Venue:
  • ACM Transactions on Information and System Security (TISSEC)
  • Year:
  • 2008

Quantified Score

Hi-index 0.00

Visualization

Abstract

Collaborative systems such as Grids provide efficient and scalable access to distributed computing capabilities and enable seamless resource sharing between users and platforms. This heterogeneous distribution of resources and the various modes of collaborations that exist between users, virtual organizations, and resource providers require scalable, flexible, and fine-grained access control to protect both individual and shared computing resources. In this article we propose a usage control (UCON) based security framework for collaborative applications, by following a layered approach with policy, enforcement, and implementation models, called the PEI framework. In the policy model layer, UCON policies are specified with predicates on subject and object attributes, along with system attributes as conditional constraints and user actions as obligations. General attributes include not only persistent attributes such as role and group memberships but also mutable usage attributes of subjects and objects. Conditions in UCON can be used to support context-based authorizations in ad hoc collaborations. In the enforcement model layer, our novel framework uses a hybrid approach for subject attribute acquisition with both push and pull modes. By leveraging attribute propagations between a centralized attribute repository and distributed policy decision points, our architecture supports decision continuity and attribute mutability of the UCON policy model, as well as obligation evaluations during policy enforcement. As a proof-of-concept, we implement a prototype system based on our proposed architecture and conduct experimental studies to demonstrate the feasibility and performance of our approach.