Abstract
Among the access control methods for database security, there is Mandatory Access Control (MAC) model in which the security level is set to both the subject and the object to enhance the security control. Legacy MAC models have focused only on one thing, either confidentiality or integrity. Thus, it can cause collisions between security policies in supporting confidentiality and integrity simultaneously. In addition, they do not provide a granular security class policy of subjects and objects in terms of subjects' roles or tasks. In this paper, we present the security policy of Bell_LaPadula Model (BLP) model and Biba model as one complemented policy. In addition, Duties Separation and Data Coloring (DSDC)-MAC model applying new data coloring security method is proposed to enable granular access control from the viewpoint of Segregation of Duty (SoD). The case study demonstrated that the proposed modeling work maintains the practicality through the design of Human Resources management System. The proposed model in this study is suitable for organizations like military forces or intelligence agencies where confidential information should be carefully handled. Furthermore, this model is expected to protect systems against malicious insiders and improve the confidentiality and integrity of data
Highlights
In the Emerging Cyber Threats Report 2015 published by Georgia Tech, the attack of rogue insiders was pointed out as one of emerging cyber threats
(1st-grade/Top Secret) in Task#1 can access data classified as 1st, 2nd and 3rd grades as well as generallevel data within the relevant task category. Such access policies above define all the individual task categories and under task categories, subjects, objects and security keys are linked and defined. It focus the primary characteristics of the access control model, compare the proposed model with the legacy Mandatory Access Control (MAC) models and discuss the characteristics and limitations of the proposed model
This study suggested a Duties Separation and Data Coloring (DSDC)-MAC model and security policies that can improve both the confidentiality and integrity of MAC models such as Bell_LaPadula Model (BLP) and Biba using Segregation of Duty (SoD) and data coloring techniques
Summary
In the Emerging Cyber Threats Report 2015 published by Georgia Tech, the attack of rogue insiders was pointed out as one of emerging cyber threats. Security incidents caused by malicious insiders bring about significant damage to companies, but solutions are not easy at all. To address such evolving threats from insiders, it is necessary to develop stronger access control technologies to detect anomalous behaviors. Due to the dynamics and uncertainty of the current network environment, access control is one of the most important factors in guaranteeing network information security. How to construct a scientific and accurate access control model is a current research focus. In actual access control mechanisms, users with high trust values bring better benefits, but the losses will be greater once cheating access is adopted (Wang et al, 2019)
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.