Models of data processing and logical access segregation considering the heterogeneity of entities in information systems

Authors

DOI:

https://doi.org/10.30837/2522-9818.2024.28.143

Keywords:

mathematical model; role-based model; data access segregation; security policies.

Abstract

The subject of the research is the process of logical access segregation to data in information systems. The aim of the article is to improve the accuracy and reliability of modeling processes for data processing and logical access segregation considering the heterogeneity of entities in information systems. The tasks to be solved include: conducting a comparative analysis of modern data access distribution models, integrating simpler role-based models, synthesizing hierarchical role-based models, developing enforced typing models based on trust relationships, and presenting the main provisions of the security policy integration process. The methods used are: systems analysis, component design, logical and simulation modeling in the form of role-based access segregation models. The results obtained include: development of data processing models and logical access segregation in information systems that take into account the heterogeneity of entities and the multi-level structure of information systems. The models differ from known ones by considering the heterogeneity of entities and the multi-level structure of information systems. This has increased scalability by up to 35% due to a modular approach to defining security policies. Additionally, the developed model demonstrates 25% higher implementation practicality as it easily integrates with existing access control systems and adapts to various platforms and environments. The proposed models are effective for large information systems and distributed environments due to their modularity and ability to adapt to different operational conditions. This ensures reliable access control in systems with numerous subjects and objects. The implementation of multi-level RBAC models has improved the accuracy and reliability of results.

Author Biographies

Serhii Semenov, Університет Комісії національної освіти, Краків, Польща

Doctor of Sciences (Engineering), Professor,  University of the National Education Commission, Krakow, Poland

Serhii Yenhalychev, Simon Kuznets Kharkiv National University of Economics

Simon Kuznets Kharkiv National University of Economics, PhD Student

Maxim Pochebut, Private Institution "University of Science, Entrepreneurship and Technology", Kyiv

PhD

Oksana Sitnikova, Private Institution "University of Science, Entrepreneurship and Technology", Kyiv

PhD

References

References

"Ming-xin Ma,guo-zhen Shi,ya-qiong Wang,hao-jie Wang,wen-wen Cheng. Multilevel secure access control policy for distributed systems. Chinese Journal of Network and Information Security", 2017, 3(8). Р. 28-3-4. available at: https://www.infocomm-journal.com/cjnis/EN/10.11959/j.issn.2096-109x.2017.00184

Poniszewska-Maranda, A. (2010), "Conception approach of access control in heterogeneous information systems using UML". Telecommun Syst 45, Р. 177–190. DOI: https://doi.org/10.1007/s11235-009-9243-0

Buccafurri, F., Angelis, V., Lazzaro, S, Pugliese, A, (2024), "Enforcing security policies on interacting authentication systems", Computers & Security, Vol. 140, 103771 р. DOI: https://doi.org/10.1016/j.cose.2024.103771

Mythili, K., Haldorai, A. (2013), "Trust management approach for secure and privacy data access in cloud computing". International Conference on Green Computing, Communication and Conservation of Energy (ICGCE), Р. 923–927. 10.1109/ICGCE.2013.6823567

Singh, M., Sural, S., Vaidya, J. et al. (2021), "A Role-Based Administrative Model for Administration of Heterogeneous Access Control Policies and its Security Analysis". Information Systems Frontiers, DOI: https://doi.org/10.1007/s10796-021-10167-z

Manavi, S., Mohammadalian, S., Udzir, N., Abdullah, A. (2012), "Hierarchical Secure Virtualization Model for Cloud". International Conference on Cyber Security, Cyber Warfare and Digital Forensic. DOI: 10.1109/CyberSec.2012.6246117

Aftab, Muhammad Umar, Oluwasanmi, Ariyo, Alharbi, Abdullah, Sohaib, Osama, Nie, Xuyun, Qin, Zhiguang, Son, Ngo (2021). "Secure and dynamic access control for the internet of things (IoT) based traffic system". PeerJ Computer Science. DOI: 7.e471.10.7717/peerj-cs.471

Lewis, G., Paolo, M., Rémi, G., Victor, C., (2023), "Securing distributed systems: A survey on access control techniques for cloud, blockchain, IoT and SDN", Cyber Security and Applications, Volume 1, 100015 р., DOI: https://doi.org/10.1016/j.csa.2023.100015

Semenov, S., Lymarenko, V., Yenhalychev, S., Gavrilenko, S. (2022), "The data dissemination planning tasks process model into account the entities differentity," 12th International Conference on Dependable Systems, Services and Technologies (DESSERT), Athens, Greece, 2022, Р. 1–6, DOI: 10.1109/DESSERT58054.2022.10018695

Ayedh, M, Wahab, А., Idris, M. (2023), "Enhanced adaptable and distributed access control decision making model based on machine learning for policy conflict resolution in BYOD environment". MDPI Journal, 13, 7102 р. DOI: https://doi.org/10.3390/app13127102

Semenov, S., Davydov, V., Gavrilenko, S. "Data protection in computerised control systems. LAP Lambert academic publishing GmbH & Co. KG. Germany", 2014 available at: https://scholar.google.com.ua/citations?view_op=view_citation&hl=ru&user=4Vn1dBkAAAAJ&citation_for_view=4Vn1dBkAAAAJ:0izLItjtcgwC

Beskorovainyi, V., Kolesnyk, L., Dr. Chinwi Mgbere. (2023), "Mathematical models for determining the Pareto front for building technological processes options under the conditions of interval presentation of local criteria", Innovative Technologies and Scientific Solutions for Industries, No. 2 (24), P. 16–26. DOI: https://doi.org/10.30837/ITSSI.2023.24.016

Raskin, L., Sira, O., Sukhomlyn, L., Korsun, R. (2021), "Development of a model for the dynamics of probabilities of states of Semi-Markov systems", Innovative Technologies and Scientific Solutions for Industries, No. 3 (17), P. 62–68. DOI: https://doi.org/10.30837/ITSSI.2021.17.062

Fedorovich, O., Kosenko, V., Lutai, L., Zamirets, I. (2022), "Methods and models of research of investment attractiveness and competitiveness of project-oriented enterprise in the process of creating innovative high-tech", Innovative Technologies and Scientific Solutions for Industries, No. 3 (21), P. 51–59. DOI: https://doi.org/10.30837/ITSSI.2022.21.051

Kosenko, V. (2019), "Models of making decisions to select the techniques for countering innovative project risks". Advanced Information Systems, 3(1), Р. 13–18. DOI: https://doi.org/10.20998/2522-9052.2019.1.03

Downloads

Published

2024-06-30

How to Cite

Semenov, S., Yenhalychev, S., Pochebut, M., & Sitnikova, O. (2024). Models of data processing and logical access segregation considering the heterogeneity of entities in information systems. INNOVATIVE TECHNOLOGIES AND SCIENTIFIC SOLUTIONS FOR INDUSTRIES, (2(28), 143–152. https://doi.org/10.30837/2522-9818.2024.28.143