Models of data processing and logical access segregation considering the heterogeneity of entities in information systems
DOI:
https://doi.org/10.30837/2522-9818.2024.28.143Keywords:
mathematical model; role-based model; data access segregation; security policies.Abstract
The subject of the research is the process of logical access segregation to data in information systems. The aim of the article is to improve the accuracy and reliability of modeling processes for data processing and logical access segregation considering the heterogeneity of entities in information systems. The tasks to be solved include: conducting a comparative analysis of modern data access distribution models, integrating simpler role-based models, synthesizing hierarchical role-based models, developing enforced typing models based on trust relationships, and presenting the main provisions of the security policy integration process. The methods used are: systems analysis, component design, logical and simulation modeling in the form of role-based access segregation models. The results obtained include: development of data processing models and logical access segregation in information systems that take into account the heterogeneity of entities and the multi-level structure of information systems. The models differ from known ones by considering the heterogeneity of entities and the multi-level structure of information systems. This has increased scalability by up to 35% due to a modular approach to defining security policies. Additionally, the developed model demonstrates 25% higher implementation practicality as it easily integrates with existing access control systems and adapts to various platforms and environments. The proposed models are effective for large information systems and distributed environments due to their modularity and ability to adapt to different operational conditions. This ensures reliable access control in systems with numerous subjects and objects. The implementation of multi-level RBAC models has improved the accuracy and reliability of results.
References
References
"Ming-xin Ma,guo-zhen Shi,ya-qiong Wang,hao-jie Wang,wen-wen Cheng. Multilevel secure access control policy for distributed systems. Chinese Journal of Network and Information Security", 2017, 3(8). Р. 28-3-4. available at: https://www.infocomm-journal.com/cjnis/EN/10.11959/j.issn.2096-109x.2017.00184
Poniszewska-Maranda, A. (2010), "Conception approach of access control in heterogeneous information systems using UML". Telecommun Syst 45, Р. 177–190. DOI: https://doi.org/10.1007/s11235-009-9243-0
Buccafurri, F., Angelis, V., Lazzaro, S, Pugliese, A, (2024), "Enforcing security policies on interacting authentication systems", Computers & Security, Vol. 140, 103771 р. DOI: https://doi.org/10.1016/j.cose.2024.103771
Mythili, K., Haldorai, A. (2013), "Trust management approach for secure and privacy data access in cloud computing". International Conference on Green Computing, Communication and Conservation of Energy (ICGCE), Р. 923–927. 10.1109/ICGCE.2013.6823567
Singh, M., Sural, S., Vaidya, J. et al. (2021), "A Role-Based Administrative Model for Administration of Heterogeneous Access Control Policies and its Security Analysis". Information Systems Frontiers, DOI: https://doi.org/10.1007/s10796-021-10167-z
Manavi, S., Mohammadalian, S., Udzir, N., Abdullah, A. (2012), "Hierarchical Secure Virtualization Model for Cloud". International Conference on Cyber Security, Cyber Warfare and Digital Forensic. DOI: 10.1109/CyberSec.2012.6246117
Aftab, Muhammad Umar, Oluwasanmi, Ariyo, Alharbi, Abdullah, Sohaib, Osama, Nie, Xuyun, Qin, Zhiguang, Son, Ngo (2021). "Secure and dynamic access control for the internet of things (IoT) based traffic system". PeerJ Computer Science. DOI: 7.e471.10.7717/peerj-cs.471
Lewis, G., Paolo, M., Rémi, G., Victor, C., (2023), "Securing distributed systems: A survey on access control techniques for cloud, blockchain, IoT and SDN", Cyber Security and Applications, Volume 1, 100015 р., DOI: https://doi.org/10.1016/j.csa.2023.100015
Semenov, S., Lymarenko, V., Yenhalychev, S., Gavrilenko, S. (2022), "The data dissemination planning tasks process model into account the entities differentity," 12th International Conference on Dependable Systems, Services and Technologies (DESSERT), Athens, Greece, 2022, Р. 1–6, DOI: 10.1109/DESSERT58054.2022.10018695
Ayedh, M, Wahab, А., Idris, M. (2023), "Enhanced adaptable and distributed access control decision making model based on machine learning for policy conflict resolution in BYOD environment". MDPI Journal, 13, 7102 р. DOI: https://doi.org/10.3390/app13127102
Semenov, S., Davydov, V., Gavrilenko, S. "Data protection in computerised control systems. LAP Lambert academic publishing GmbH & Co. KG. Germany", 2014 available at: https://scholar.google.com.ua/citations?view_op=view_citation&hl=ru&user=4Vn1dBkAAAAJ&citation_for_view=4Vn1dBkAAAAJ:0izLItjtcgwC
Beskorovainyi, V., Kolesnyk, L., Dr. Chinwi Mgbere. (2023), "Mathematical models for determining the Pareto front for building technological processes options under the conditions of interval presentation of local criteria", Innovative Technologies and Scientific Solutions for Industries, No. 2 (24), P. 16–26. DOI: https://doi.org/10.30837/ITSSI.2023.24.016
Raskin, L., Sira, O., Sukhomlyn, L., Korsun, R. (2021), "Development of a model for the dynamics of probabilities of states of Semi-Markov systems", Innovative Technologies and Scientific Solutions for Industries, No. 3 (17), P. 62–68. DOI: https://doi.org/10.30837/ITSSI.2021.17.062
Fedorovich, O., Kosenko, V., Lutai, L., Zamirets, I. (2022), "Methods and models of research of investment attractiveness and competitiveness of project-oriented enterprise in the process of creating innovative high-tech", Innovative Technologies and Scientific Solutions for Industries, No. 3 (21), P. 51–59. DOI: https://doi.org/10.30837/ITSSI.2022.21.051
Kosenko, V. (2019), "Models of making decisions to select the techniques for countering innovative project risks". Advanced Information Systems, 3(1), Р. 13–18. DOI: https://doi.org/10.20998/2522-9052.2019.1.03
Downloads
Published
How to Cite
Issue
Section
License
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
Our journal abides by the Creative Commons copyright rights and permissions for open access journals.
Authors who publish with this journal agree to the following terms:
Authors hold the copyright without restrictions and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License (CC BY-NC-SA 4.0) that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
Authors are able to enter into separate, additional contractual arrangements for the non-commercial and non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
Authors are permitted and encouraged to post their published work online (e.g., in institutional repositories or on their website) as it can lead to productive exchanges, as well as earlier and greater citation of published work.