Chinese Journal of Network and Information Security ›› 2021, Vol. 7 ›› Issue (4): 175-182.doi: 10.11959/j.issn.2096-109x.2021077

• Papers • Previous Articles     Next Articles

Permission clustering-based attribute value optimization

Wenchao WU1,2, Zhiyu REN1, Xuehui DU1   

  1. 1 Information Engineering University, Zhengzhou 450001, China
    2 31668 Unit PLA, Xining 810000, China
  • Revised:2020-08-07 Online:2021-08-15 Published:2021-08-01
  • Supported by:
    The National Key R&D Program of China(2018YFB0803603);The National Natural Science Foundation of China(61702550)

Abstract:

In new large-scale computing environment, the attributes of entities were massive and they had complex sources and uneven quality, which were great obstacles to the application of ABAC (attribute-based access control).The attributes were also hard to be corrected manually, making it difficult to be applied in access control system straightly.To solve the optimization problem of nominal attributes, a novel algorithm of attribute value optimization based on permission clustering was designed, in which entities were presented by the privilege set related to them.So that the entities were tagged by density-based clustering method with distances of their privilege set presentations.Then the attribute values were reduced and corrected based on rough set theory.Finally, the algorithm was verified on UCI data sets, which proved that after applying it, ABAC policy mining was improved in the evaluation criteria, such as the true positive rate and F1-score.

Key words: attribute valueoptimization, rough set theory, ABAC, access control

CLC Number: 

No Suggested Reading articles found!