Several access control models have been developed: discretionary, mandatory, role-based, organisation-based or the recent hierarchical organisation-based. The hierarchical organisation-based model is best suited to counter internal attacks and fraud because it integrates a digital parafer that performs proactive hierarchical control of all activities carried out by the organisation's employees in the system, including those of the super-user. However, because this control is based solely on the type of requests issued by internal employees, this model is vulnerable to Denial of Service attacks in a Big Data environment. The purpose of this article is to optimise the number of requests awaiting hierarchical treatment in the hierarchical organisation-based access control model while maintaining a maximum level of security. For this purpose, we have proposed an additional layer of control of the digital parafer based on suspicious behaviour detection from the entropy measurement. Finally, we carried out a mathematical and experimental comparisons between the two approaches in terms of number of requests awaiting treatment in the system and obtained a satisfactory result.
In order to maintain a competitive edge, companies have adopted the microservices architecture to enable them to quickly add new functionality and application integrations. This is an architectural design pattern that consists of structuring a computer application into different autonomous services, which can be deployed and managed independently of each other. To secure access to the different services, most microservices applications delegate this function to an identity server which ensures authentication and authorization. However, the security offered by identity servers is subject to two essential flaws. The principle of single sign-on (SSO), which consists of authenticating once to access all the system's services, can quickly extend the scope of an identity theft attack to all these services. The access control implemented by these identity servers remains based on the principle of trusting the administrators. And so, any compromise of the administrator account would contribute to putting the system out of control. To overcome these security flaws in microservices we propose an approach based on continuous authentication mechanism called Continuous - Single - Sign - On (CSSO), which allows to authenticate a user throughout his session and not only at the connection time. This work finds its application in microservices and cloud security.CCS CONCEPTS • Security and Privacy• Software and its engineering • Information Systems
Companies' information systems are regularly exposed to internal attacks perpetrated by users who have been granted access to the system. Discretionary, mandatory, role-based and organization-based access control models do not guarantee optimal protection against these attacks because these models trust in users. Therefore, they are unable to protect the system against attacks carried out by authenticated users, especially the super user who can carry out any type of internal attack on information system's data. The objective of this paper is to propose a model that excludes any trust in users. To do so, our model extends the OrBAC (Organization Based Access Control) model by integrating two concepts: the organizational hierarchy and the redundant authentication. The model thus implemented offers a hierarchical and redundant access control to data and processing in an information system based on zero trust in users.
Companies' information systems are regularly exposed to internal attacks perpetrated by users who have been granted access to the system. Discretionary, mandatory, role-based and organization-based access control models do not guarantee optimal protection against these attacks because these models trust in users. Therefore, they are unable to protect the system against attacks carried out by authenticated users, especially the super user who can carry out any type of internal attack on information system's data. The objective of this paper is to propose a model that excludes any trust in users. To do so, our model extends the OrBAC (Organization Based Access Control) model by integrating two concepts: the organizational hierarchy and the redundant authentication. The model thus implemented offers a hierarchical and redundant access control to data and processing in an information system based on zero trust in users.
Companies' information systems are regularly exposed to internal attacks perpetrated by users who have been granted access to the system. Discretionary, mandatory, role-based and organization-based access control models do not guarantee optimal protection against these attacks because these models trust in users. Therefore, they are unable to protect the system against attacks carried out by authenticated users, especially the super user who can carry out any type of internal attack on information system's data. The objective of this paper is to propose a model that excludes any trust in users. To do so, our model extends the OrBAC (Organization Based Access Control) model by integrating two concepts: the organizational hierarchy and the redundant authentication. The model thus implemented offers a hierarchical and redundant access control to data and processing in an information system based on zero trust in users.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
hi@scite.ai
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.