CN114048508A - Tag-based information asset mandatory access control method - Google Patents

Tag-based information asset mandatory access control method Download PDF

Info

Publication number
CN114048508A
CN114048508A CN202111391992.1A CN202111391992A CN114048508A CN 114048508 A CN114048508 A CN 114048508A CN 202111391992 A CN202111391992 A CN 202111391992A CN 114048508 A CN114048508 A CN 114048508A
Authority
CN
China
Prior art keywords
label
tag
access
tags
main body
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202111391992.1A
Other languages
Chinese (zh)
Inventor
蒋旭
吴国勇
李涛
谭炜波
柴力伟
李晓雪
王超
王传铭
王德鑫
丁岩
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Shenzhou Aerospace Software Technology Co ltd
Original Assignee
Beijing Shenzhou Aerospace Software Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Shenzhou Aerospace Software Technology Co ltd filed Critical Beijing Shenzhou Aerospace Software Technology Co ltd
Priority to CN202111391992.1A priority Critical patent/CN114048508A/en
Publication of CN114048508A publication Critical patent/CN114048508A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6227Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database where protection concerns the structure of data, e.g. records, types, queries
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices

Abstract

The invention provides a label-based information asset mandatory access control method, which comprises the following steps: self-defining a tag management system, and determining tag types, definitions and tag levels; marking the information assets, and endowing the information assets with labels meeting the service; endowing a label for a main body, determining an access main body, and marking the access main body; constructing an access strategy for the tags, and setting filtering rules for different types of tags; constructing an information asset access filter, matching the tag carried by the subject with the tag carried by the object according to the filtering rule of the tags, and allowing access if the tags are within the authority range; otherwise, access is denied. Based on a mandatory access control mechanism, a label access control strategy is introduced, fine-grained access control on information assets is realized through label-based access control, object-level and row-level authority control can be realized, and stronger guarantee is provided for the safety of the data assets.

Description

Tag-based information asset mandatory access control method
Technical Field
The invention relates to the field of computer software databases, in particular to a label-based information asset mandatory access control method.
Background
The system determines whether a subject can access an object by comparing access tags of the subject and the object. The user's program cannot change its own security label, as well as any other objects, and only the administrator can determine the access rights of the user and group.
The mandatory access control is more applied to the security field, and is more oriented to the access of information of different levels, the system determines the access right of a subject to an object according to the degree of trust of the subject and the confidentiality or sensitivity degree of the information contained in the object, and the control is realized by endowing a security label to the subject and the object. This access control approach is limited and does not provide support for other scenarios, such as when access to a particular type of information asset is required.
The autonomous access control has certain limitation on the active authorization of the data assets, when the data assets in different data tables need to be authorized, more authorization information is often required to be recorded to mark the authority, and the method is very complex under the condition that the number of applicants and applications is large.
Disclosure of Invention
In view of the above, the present invention has been made to provide a tag-based information asset mandatory access control method that overcomes or at least partially solves the above problems.
According to an aspect of the present invention, there is provided a tag-based information asset mandatory access control method using mandatory access control policy control using a tag matching rule between a subject and an object, the control method including:
self-defining a tag management system, and determining tag types, definitions and tag levels;
marking the information assets, and endowing the information assets with labels meeting the service;
endowing a label for a main body, determining an access main body, and marking the access main body;
constructing an access strategy for the tags, and setting filtering rules for different types of tags;
constructing an information asset access filter, matching the tag carried by the subject with the tag carried by the object according to the filtering rule of the tags, and allowing access if the tags are within the authority range; otherwise, access is denied.
Optionally, the tag types specifically include:
enumerated labels are a label set, the labels in the label set belong to a service set, and the labels in the set are not related to each other;
the value range type labels are labels with different levels and different value ranges;
the hierarchical label is a label classified according to a hierarchical level.
Optionally, the constructing an access policy for the tag, and setting a filtering rule for different types of tags specifically includes:
the filtering strategy set by the enumeration type label is direct matching, and data can be returned when the labels of the subject and the object are correspondingly matched;
the filtering strategy set by the value range type label is level matching, and if the label of the subject is higher than that of the object, data is returned; otherwise, not returning data;
and the filtering strategy set by the hierarchical label is that a parent label accesses a child label, otherwise, data is not returned.
Optionally, the constructing an information asset access filter matches the tag carried by the subject with the tag carried by the object according to the filtering rule of the tags, and if the matching is within the scope of the authority, the constructing the information asset access filter specifically includes:
accessing information assets by an executing program subject, the executing program subject in a standard computer language;
acquiring a label carried on the executive program main body to obtain a main body label;
determining a corresponding filtering strategy according to the type of the main body label;
adopting a compiler to analyze the grammar and the lexical method of the sentences of the computer language to form a grammar tree;
acquiring nodes for converting the label conversion information into a syntax tree, and reconstructing an abstract syntax tree;
converting the abstract syntax tree into a RelNode tree and converting the RelNode tree into a physical execution plan;
connecting a data source, performing operation processing according to the query plan, and converting the physical execution plan into a program which can be executed on a specific platform;
and after the execution is finished, acquiring the information assets after the execution is finished, and returning the result.
The invention provides a label-based information asset mandatory access control method, which utilizes mandatory access control strategy control and utilizes a label matching rule between a subject and an object, and the control method comprises the following steps: self-defining a tag management system, and determining tag types, definitions and tag levels; marking the information assets, and endowing the information assets with labels meeting the service; endowing a label for a main body, determining an access main body, and marking the access main body; constructing an access strategy for the tags, and setting filtering rules for different types of tags; constructing an information asset access filter, matching the tag carried by the subject with the tag carried by the object according to the filtering rule of the tags, and allowing access if the tags are within the authority range; otherwise, access is denied. Based on a mandatory access control mechanism, a label access control strategy is introduced, fine-grained access control on information assets is realized through label-based access control, object-level and row-level authority control can be realized, and stronger guarantee is provided for the safety of the data assets.
The foregoing description is only an overview of the technical solutions of the present invention, and the embodiments of the present invention are described below in order to make the technical means of the present invention more clearly understood and to make the above and other objects, features, and advantages of the present invention more clearly understandable.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings needed to be used in the description of the embodiments are briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without creative efforts.
Fig. 1 is a flowchart of a tag-based mandatory access control method for information assets according to an embodiment of the present invention.
Detailed Description
Exemplary embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. While exemplary embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embodied in various forms and should not be limited to the embodiments set forth herein. Rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the scope of the disclosure to those skilled in the art.
The terms "comprises" and "comprising," and any variations thereof, in the present description and claims and drawings are intended to cover a non-exclusive inclusion, such as a list of steps or elements.
The technical solution of the present invention is further described in detail with reference to the accompanying drawings and embodiments.
As shown in fig. 1, a tag-based information asset mandatory access control method, using mandatory access control policy control, using a tag matching rule between a subject and an object, includes:
and self-defining a tag management system, and determining the type, definition and level of the tag.
The tag types specifically include: enumerated labels are a label set, the labels in the label set belong to a service set, and the labels in the set are not related to each other, such as gender labels; value range type labels, which are labels with different levels and different value ranges, such as security class labels; the hierarchical label is a label classified according to a hierarchical level, such as an organization-class label and a region-class label.
Marking the information assets, and endowing the information assets with labels meeting the service;
giving a label to the main body, determining an access main body, and marking the access main body;
constructing an access strategy for the tags, and setting filtering rules for different types of tags;
the filtering strategy set by the enumeration type label is direct matching, and data can be returned when the labels of the subject and the object are correspondingly matched; the filtering strategy set by the value range type label is level matching, and if the label of the subject is higher than that of the object, data is returned; otherwise, not returning data; and the filtering strategy set by the hierarchical type tag is that the parent-level tag accesses the child-level tag, otherwise, the data is not returned.
Constructing an information asset access filter, matching the tag carried by the subject with the tag carried by the object according to the filtering rule of the tags, and allowing access if the tags are within the authority range; otherwise, access is denied.
The main body of the executive program accesses the information assets and passes through a standard computer language;
acquiring a label carried on an execution program main body to obtain a main body label;
determining a corresponding filtering strategy according to the type of the main body label; determining an execution main body, acquiring a label carried on the main body, and finding out a corresponding filtering strategy according to the type of the main body label: enumerating, value range type and hierarchy type, and generating filter conditions according to corresponding strategies. For an enumeration type label filtering strategy, the filtering condition is only required to directly carry the label; filtering the value range type tags according to the level of the value range, wherein a filtering range is generated by defining the tags, and the filtering range is in which interval; for hierarchical tags, a principal, if carrying a parent tag, needs to carry all subordinate child tags of the parent tag in a filter condition.
Adopting a compiler to analyze the grammar and the lexical method of the sentences of the computer language to form a grammar tree; acquiring nodes for converting the label conversion information into a syntax tree, and reconstructing an abstract syntax tree; converting the abstract syntax tree into a RelNode tree and converting the RelNode tree into a physical execution plan; connecting a data source, performing operation processing according to the query plan, and converting the physical execution plan into a program which can be executed on a specific platform; the method mainly converts a physical execution plan into a program which can be executed in a specific platform, such as full-table scanning of information assets, filtering according to filtering conditions and data aggregation. And after the execution is finished, acquiring the information assets after the execution is finished, and returning the result.
Has the advantages that:
the invention introduces a label access control strategy on the basis of a mandatory access control mechanism, realizes fine-grained access control on information assets through the access control based on labels, can realize object-level and row-level authority control, and provides stronger guarantee for the safety of data assets;
the access control is carried out based on the tag strategy, and the tag strategy can be configured in a user-defined way, so that the authority control of the information assets is more flexible, and the authorization modes of different modes of the assets under multiple scenes are met;
the query implementation mode of the information assets supports various types of data sources, and the authority filtering of the information assets in the various types of data sources is realized.
The above embodiments are provided to further explain the objects, technical solutions and advantages of the present invention in detail, it should be understood that the above embodiments are merely exemplary embodiments of the present invention and are not intended to limit the scope of the present invention, and any modifications, equivalents, improvements and the like made within the spirit and principle of the present invention should be included in the scope of the present invention.

Claims (4)

1. A tag-based information asset mandatory access control method is characterized in that mandatory access control policy control is utilized, and a tag matching rule between a subject and an object is utilized, wherein the control method comprises the following steps:
self-defining a tag management system, and determining tag types, definitions and tag levels;
marking the information assets, and endowing the information assets with labels meeting the service;
endowing a label for a main body, determining an access main body, and marking the access main body;
constructing an access strategy for the tags, and setting filtering rules for different types of tags;
constructing an information asset access filter, matching the tag carried by the subject with the tag carried by the object according to the filtering rule of the tags, and allowing access if the tags are within the authority range; otherwise, access is denied.
2. The tag-based information asset mandatory access control method according to claim 1, wherein the tag type specifically includes:
enumerated labels are a label set, the labels in the label set belong to a service set, and the labels in the set are not related to each other;
the value range type labels are labels with different levels and different value ranges;
the hierarchical label is a label classified according to a hierarchical level.
3. The tag-based information asset mandatory access control method according to claim 2, wherein the constructing an access policy for the tag and setting filtering rules for different types of tags specifically comprises:
the filtering strategy set by the enumeration type label is direct matching, and data can be returned when the labels of the subject and the object are correspondingly matched;
the filtering strategy set by the value range type label is level matching, and if the label of the subject is higher than that of the object, data is returned; otherwise, not returning data;
and the filtering strategy set by the hierarchical label is that a parent label accesses a child label, otherwise, data is not returned.
4. The method as claimed in claim 1, wherein the constructing of the information asset access filter matches the tag carried by the subject with the tag carried by the object according to the filtering rule of the tags, and if the matching is within the scope of authority, the method comprises:
accessing information assets by an executing program subject, the executing program subject in a standard computer language;
acquiring a label carried on the executive program main body to obtain a main body label;
determining a corresponding filtering strategy according to the type of the main body label;
adopting a compiler to analyze the grammar and the lexical method of the sentences of the computer language to form a grammar tree;
acquiring nodes for converting the label conversion information into a syntax tree, and reconstructing an abstract syntax tree;
converting the abstract syntax tree into a RelNode tree and converting the RelNode tree into a physical execution plan;
connecting a data source, performing operation processing according to the query plan, and converting the physical execution plan into a program which can be executed on a specific platform;
and after the execution is finished, acquiring the information assets after the execution is finished, and returning the result.
CN202111391992.1A 2021-11-23 2021-11-23 Tag-based information asset mandatory access control method Pending CN114048508A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111391992.1A CN114048508A (en) 2021-11-23 2021-11-23 Tag-based information asset mandatory access control method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111391992.1A CN114048508A (en) 2021-11-23 2021-11-23 Tag-based information asset mandatory access control method

Publications (1)

Publication Number Publication Date
CN114048508A true CN114048508A (en) 2022-02-15

Family

ID=80210897

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111391992.1A Pending CN114048508A (en) 2021-11-23 2021-11-23 Tag-based information asset mandatory access control method

Country Status (1)

Country Link
CN (1) CN114048508A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115065529A (en) * 2022-06-13 2022-09-16 北京寰宇天穹信息技术有限公司 Access control method based on credible label fusing host and object key information
CN116089987A (en) * 2023-04-07 2023-05-09 北京元数智联技术有限公司 Data leakage protection method, device and equipment
CN116662373A (en) * 2023-07-27 2023-08-29 天津神舟通用数据技术有限公司 Data access control method, device, equipment and medium

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115065529A (en) * 2022-06-13 2022-09-16 北京寰宇天穹信息技术有限公司 Access control method based on credible label fusing host and object key information
CN115065529B (en) * 2022-06-13 2023-11-03 北京寰宇天穹信息技术有限公司 Access control method based on trusted tag fusing key information of host and guest
CN116089987A (en) * 2023-04-07 2023-05-09 北京元数智联技术有限公司 Data leakage protection method, device and equipment
CN116662373A (en) * 2023-07-27 2023-08-29 天津神舟通用数据技术有限公司 Data access control method, device, equipment and medium

Similar Documents

Publication Publication Date Title
CN114048508A (en) Tag-based information asset mandatory access control method
Ashley et al. E-P3P privacy policies and privacy authorization
Siponen An analysis of the recent IS security development approaches: descriptive and prescriptive implications
US20060277594A1 (en) Policy implementation delegation
Seifermann et al. Detecting violations of access control and information flow policies in data flow diagrams
KR20030096310A (en) Method, system, and program product for permission to access software
KR20120117018A (en) Controlling resource access based on resource properties
KR20060088013A (en) Integration of a non-relational query language with a relational data store
Villarroel et al. Secure information systems development–a survey and comparison
Cheney et al. An analytical survey of provenance sanitization
Kim et al. A feature-based approach for modeling role-based access control systems
US8190673B2 (en) Enforcement of object permissions in enterprise resource planning software
Ghani et al. A Pursuit of Sustainable Privacy Protection in Big Data Environment by an Optimized Clustered-Purpose Based Algorithm.
El Hadj et al. Formal approach to detect and resolve anomalies while clustering ABAC policies
Abd-Ali et al. A Metamodel for Hybrid Access Control Policies.
CN106020923A (en) SELinux strategy compiling method and system
CN116032579A (en) Access control system and method based on ABAC model
Sladić et al. Flexible access control framework for MARC records
KR101220014B1 (en) Security critical data containers
El Ouazzani et al. Dynamic management of data warehouse security levels based on user profiles
US7624374B2 (en) Readers and scanner design pattern
Belokosztolszki Role-based access control policy administration
Pechenkin et al. Application of deep neural networks for security analysis of digital infrastructure components
Abdelgawad et al. Synthesizing and Analyzing Attribute-Based Access Control Model Generated from Natural Language Policy Statements
US9507929B1 (en) Decentralized information flow securing method and system for multilevel security and privacy domains

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination