Authors:
Maryem Ait El Hadj
1
;
Meryeme Ayache
1
;
Yahya Benkaouz
2
;
Ahmed Khoumsi
3
and
Mohammed Erradi
1
Affiliations:
1
NDSR Group, ENSIAS and Mohammed V University in Rabat, Morocco
;
2
Conception and Systems Laboratory, FSR and Mohammed V University in Rabat, Morocco
;
3
University of Sherbrooke, Canada
Keyword(s):
ABAC, XACML Policies, Clustering, Similarity Computation, Anomaly Detection.
Related
Ontology
Subjects/Areas/Topics:
Access Control
;
Data Engineering
;
Databases and Data Security
;
Information and Systems Security
;
Internet Technology
;
Security and Privacy Policies
;
Security in Distributed Systems
;
Web Information Systems and Technologies
Abstract:
The development of distributed applications arises multiple security issues such as access control. Attribute-Based Access Control has been proposed as a generic access control model, which provides more flexibility and promotes information and security sharing. eXtensible Access Control Markup Language (XACML) is the most convenient way to express ABAC policies. However, in distributed environments, XACML policies become more complex and hard to manage. In fact, an XACML policy in distributed applications may be aggregated from multiple parties and can be managed by more than one administrator. Therefore, it may contain several anomalies such as conflicts and redundancies, which may affect the performance of the policy execution. In this paper, we propose an anomaly detection method based on the decomposition of a policy into clusters before searching anomalies within each cluster. Our evaluation results demonstrate the efficiency of the suggested approach.