bilistic models can be used to handle unexpected situ-
ations, such as missing attributes, or situations where
the access decision must take into account risk related
situations. Fuzzy set theory based models allow poli-
cies to be defined based on the vague conditions that
exist in the world, enabling a more natural way of ex-
pressing said policies. It also has the benefit of clas-
sifying users and data into each defined fuzzy set as
they come into the system in a predictable and reli-
able way. Cognitive systems employ a great variety
of tools, from machine learning to reasoning, to be
able to generate an access control decision based on
the user and the data requested, however the decision
may change over time.
3 RELATED WORK
In the area of non-deterministic access control mod-
els, the techniques and approaches used to achieve
non-determinism can vary significantly. (Crampton
et al., 2015) argues that in cases where user attributes
may be missing, the access decision may be incon-
clusive and a probabilistic model is used. This would
lead to more than one decision generated by the ac-
cess control system, a possibility also introduced by
the ABAC access control model. When facing this
scenario, the access control decision process can be
quite complex. Instead of building an entire new eval-
uation mechanism based on probabilities, fuzzy set
theory could assume a membership degree of 0% to
the associated conditions. Depending on the condi-
tions used and the importance of the missing attribute,
the user could still be granted access.
Other non-deterministic models exist in the
literature, such as DRAC (Chen et al., 2016),
RAdAC(McGraw, 2009) and other frameworks(dos
Santos et al., 2016). DRAC proposes a model based
on risk evaluation for the cloud which uses a dynamic
threshold for the risk associated with the request. The
associated risk is calculated based on a sliding win-
dow of the subject’s history. However, it does not
differ much the ABAC model, integrating only the
measured risk into the access control decision mak-
ing. When it comes to handling dynamic users and
data, it suffers from the same problem that determinis-
tic models suffer. RAdAC is similar to DRAC, adding
operational need to the decision making process that
can override a too high risk request. In the end, it also
fails to solve the issues presented in this paper.
In regard to existing deterministic models, ex-
tensions can be made to give them more function-
ality or make the applications built for them more
secure(Pereira et al., 2014; Regateiro et al., 2014).
However, the intent of applying fuzzy set theory to
access control is to create a more flexible determinis-
tic model that is not held back by previous models.
In addition, IBM(IBM, 2016) has also argued that
most information regarding security is written in nat-
ural language, i.e. humans can easily understand it but
machines cannot. This also means that a human can-
not know every bit of information about threats and
other security related information that exists. How-
ever, by using cognitive systems it is possible to an-
alyze this type of information and include it so that,
for example, new threats are accounted for when in-
vestigating some issue. This helps an analyst to have
greater knowledge about the latest security threats,
freeing his time to focus on other issues.
Current solutions such as IBM Watson, Microsoft
Cognitive Services, Google Prediction API and Ama-
zon Machine Learning show how important cognitive
systems are becoming. However, most of these ser-
vices are just APIs that allow to build cognitive ser-
vices. One problem with the cognitive systems is that
the algorithms used are a lot of the times opaque to the
people that use them. This means that it is not pos-
sible to know what the behaviour of the system will
be in every situation, specially when the system can
evolve over time, which can result in the lack of trust
in its correctness. Fuzzy set theory, however, follows
membership functions that can be understood and vi-
sualized, allowing more easily to verify its correct-
ness.
Finally, fuzzy set theory is an idea that has been
researched in recent years to tackle use cases where
authorization-related information is vague. It can be
applied in two different levels(Kacprzyk et al., 2015)
when it comes to its application to access to data:
on the databases(Mart
´
ınez-Garc
´
ıa et al., 2011; Prade,
1984; Buckles and Petry, 1982; Ma, 2006) or on the
querying language(Bosc and Pivert, 1995; Bosc and
Pivert, 1992b; Bosc and Pivert, 1992a).
In (Mart
´
ınez-Garc
´
ıa et al., 2011) the authors
present an access control model based on RBAC that
is applied on the database level. The model uses fuzzy
sets to model the relations between subjects, roles and
the permissions. Such a model can handle some un-
certainty when it comes to the degree a subject ac-
tually plays a certain role and what permissions are
actually granted. However, this model is restricted to
using the role associated with each user and does not
handle other attributes directly into the access control
process.
An example of the application of fuzzy set the-
ory on the querying language level is SQLf(Bosc and
Pivert, 1995), an extension made from the SQL lan-
guage, where vague querying is achieved on regu-
SECRYPT 2017 - 14th International Conference on Security and Cryptography
542