Preventing Illegal Information Flow Based on Role-Based Access Control Model

  • Authors:
  • Tomoya Enokido;Makoto Takizawa

  • Affiliations:
  • Rissho University, Japan;Seikei University, Japan

  • Venue:
  • NBiS '08 Proceedings of the 2nd international conference on Network-Based Information Systems
  • Year:
  • 2008

Quantified Score

Hi-index 0.00

Visualization

Abstract

In the role-based access control (RBAC) model, authorized access requests are specified in roles. However, illegal information flow might occur as the well known confinement problem. We first define legal, independent, illegal, and possibly illegal types of information flow relations, R1$\Rightarrow$ R2, R1|| R2, R1$\hookrightarrow$ R2, and R1茂戮驴 R2among role families R1and R2, respectively. Suppose a transaction T1with a role family R1precedes T2with R2in a schedule, i.e. for every pair of conflicting methods op1and op2from T1and T2, respectively, op1is performed prior to op2. Here, if R1$\Rightarrow$ R2or R1|| R2hold, no illegal information flow occur. Otherwise, illegal information flow might occur. Hence, T2cannot be performed. In this paper, we discuss the locking protocol for synchronizing conflicting transactions so that no illegal information flow occur based on the information flow relations. In addition, we discuss when the role-based locks are released.