论文标题

优化数据库查询的细粒访问控制策略执行。模型驱动的方法

Optimising Fine-Grained Access Control Policy Enforcement for Database Queries. A Model-Driven Approach

论文作者

Phuoc-Bao, Hoang Nguyen, Clavel, Manuel

论文摘要

最近,我们提出了一种模型驱动的方法,用于执行SQL查询时执行细粒度访问控制(FGAC)策略。 More concretely, we have defined a function SecQuery() that, given an FGAC policy S and a SQL select-statement q, generates a SQL stored-procedure SecQuery(S, q), such that: if a user u with role r is authorised, according to S, to execute q based on the current state of the database, then calling SecQuery(S, q)(u, r) returns the same result as when u executes q;否则,如果未授权用户U根据数据库的当前状态执行Q,则调用secquery(s,q)(u,r)信号为错误。毫不奇怪,执行查询Q比调用相应的存储过程(S,Q)所花费的时间少。在这里,我们提出了一种基于模型的方法,用于优化函数secquery()生成的存储过程。这个想法是消除Secquery()生成的存储过程中的授权检查,这是不必要的。根据我们以前从对象约束语言(OCL)到多组的一阶逻辑的映射,我们可以尝试通过使用SMT求解器来证明授权检查是不必要的。我们包括一个案例研究,以说明和显示我们方法的适用性。

Recently, we have proposed a model-driven approach for enforcing fine-grained access control (FGAC) policies when executing SQL queries. More concretely, we have defined a function SecQuery() that, given an FGAC policy S and a SQL select-statement q, generates a SQL stored-procedure SecQuery(S, q), such that: if a user u with role r is authorised, according to S, to execute q based on the current state of the database, then calling SecQuery(S, q)(u, r) returns the same result as when u executes q; otherwise, if the user u is not authorised, according to S, to execute q based on the current state of the database, then calling SecQuery(S, q)(u, r) signals an error. Not surprisingly, executing the query q takes less time than calling the corresponding stored-procedure SecQuery(S, q). Here we propose a model-based methodology for optimising the stored-procedures generated by the function SecQuery(). The idea is to eliminate authorisation checks in the body of the stored-procedures generated by SecQuery(), when they can be proved to be unnecessary. Based on our previous mapping from the Object Constraint Language (OCL) to many-sorted first-order logic, we can attempt to prove that authorisation checks are unnecessary by using SMT solvers. We include a case study to illustrate and show the applicability of our methodology.

扫码加入交流群

加入微信交流群

微信交流群二维码

扫码加入学术交流群,获取更多资源