Comparison of Access Control Approaches for Graph-Structured Data

Aya Mohamed, Aya Mohamed, Dagmar Auer, Dagmar Auer, Daniel Hofer, Daniel Hofer, Josef Küng, Josef Küng

2024

Abstract

Access control is the enforcement of the authorization policy, which defines subjects, resources, and access rights. Graph-structured data requires advanced, flexible, and fine-grained access control due to its complex structure as sequences of alternating vertices and edges. Several research works focus on protecting property graph-structured data, enforcing fine-grained access control, and proving the feasibility and applicability of their concept. However, they differ conceptually and technically. To gain a profound overview of the current state of research, we study works from our systematic literature review on authorization and access control for different database models in addition to recent ones. Based on defined criteria, we exclude research works which do not protect graph-structured data, have coarse-grained approaches, consider models other than the property graph model, or have no proof-of-concept implementation. The latest version of the remaining works are discussed in detail in terms of their access control approach as well as authorization policy definition and enforcement. Finally, we analyze the strengths and limitations of the selected works and provide a comparison with respect to different aspects, including the base access control model, open/closed policy, negative permission support, and datastore-independent enforcement.

Download


Paper Citation


in Harvard Style

Mohamed A., Auer D., Hofer D. and Küng J. (2024). Comparison of Access Control Approaches for Graph-Structured Data. In Proceedings of the 21st International Conference on Security and Cryptography - Volume 1: SECRYPT; ISBN 978-989-758-709-2, SciTePress, pages 576-583. DOI: 10.5220/0012861500003767


in Bibtex Style

@conference{secrypt24,
author={Aya Mohamed and Dagmar Auer and Daniel Hofer and Josef Küng},
title={Comparison of Access Control Approaches for Graph-Structured Data},
booktitle={Proceedings of the 21st International Conference on Security and Cryptography - Volume 1: SECRYPT},
year={2024},
pages={576-583},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0012861500003767},
isbn={978-989-758-709-2},
}


in EndNote Style

TY - CONF

JO - Proceedings of the 21st International Conference on Security and Cryptography - Volume 1: SECRYPT
TI - Comparison of Access Control Approaches for Graph-Structured Data
SN - 978-989-758-709-2
AU - Mohamed A.
AU - Auer D.
AU - Hofer D.
AU - Küng J.
PY - 2024
SP - 576
EP - 583
DO - 10.5220/0012861500003767
PB - SciTePress