Provenance-based access control models

dc.contributor.advisorSandhu, Ravi
dc.contributor.advisorPark, Jaehong
dc.contributor.authorNguyen, Dang
dc.contributor.committeeMemberWhite, Gregory
dc.contributor.committeeMemberRobbins, Kay
dc.contributor.committeeMemberZhang, Weining
dc.date.accessioned2024-02-12T18:28:23Z
dc.date.available2024-02-12T18:28:23Z
dc.date.issued2014
dc.descriptionThis item is available only to currently enrolled UTSA students, faculty or staff. To download, navigate to Log In in the top right-hand corner of this screen, then select Log in with my UTSA ID.
dc.description.abstractProvenance data of a system resource provides historical information including the pedigree of and past activities on the resource. This information is useful and has been demonstrated to be effectively usable in various computing systems in different scientific as well as business application domains. Incorporating provenance-awareness into systems has garnered considerable recent attention and been the focus of academic and industrial communities. One of the concerns is the question of how cyber security can be achieved and enhanced in systems that are provenance aware. Security tasks include how to utilize information and knowledge of provenance data to enhance existing issues of insider threat detection, malicious data dissemination, et cetera. In scenarios where provenance data is more critical than the associated system data, it is also essential to secure the provenance data. This dissertation primarily investigates the security of provenance-aware systems from access control point of view. In provenance-aware systems, the information can be utilized for secure access control of the regular system resources as well as the associated provenance data of such resources. The two approaches can be termed provenance-based access control (PBAC) and provenance access control (PAC). A provenance data model, which is built on causality dependencies of provenance entities capturing system events, provides a foundation for achieving desirable access control goals. Built on the data model, the focus of this dissertation is on provenance-based access control models that enable efficient and expressive access control features. PBAC models can be applied in single, distributed, and multi-tenant cloud systems. This dissertation demonstrates the application of PBAC in a single system through extending the standard XACML framework and evaluate a proof-of-concept implementation in the context of an online homework grading system. The dissertation also demonstrates the possibility of incorporating PBAC mechanisms into cloud computing systems through developing and evaluating a proof-of-concept PBAC extension to several service components of the open-source OpenStack cloud management software. The study on a variety of deployment architecture approaches further consolidates the insights and knowledge of the process. Experimental results from these case studies demonstrate the feasibility of the approach and promise enhanced and secure access control foundation for future computing systems.
dc.description.departmentComputer Science
dc.format.extent143 pages
dc.format.mimetypeapplication/pdf
dc.identifier.isbn9781321194852
dc.identifier.urihttps://hdl.handle.net/20.500.12588/4703
dc.languageen
dc.subjectAccess Control
dc.subjectCloud Computing
dc.subjectOpenStack
dc.subjectProvenance
dc.subjectXACML
dc.subject.classificationComputer science
dc.subject.lcshCloud computing -- Access control
dc.subject.lcshComputer security
dc.titleProvenance-based access control models
dc.typeThesis
dc.type.dcmiText
dcterms.accessRightspq_closed
thesis.degree.departmentComputer Science
thesis.degree.grantorUniversity of Texas at San Antonio
thesis.degree.levelDoctoral
thesis.degree.nameDoctor of Philosophy

Files

Original bundle

Now showing 1 - 1 of 1
No Thumbnail Available
Name:
Nguyen_utsa_1283D_11428.pdf
Size:
2.03 MB
Format:
Adobe Portable Document Format