Application of access control model for confidential data

  • Lumin Shan
  • , Huan Zhou*
  • , Daocheng Hong
  • , Qiwen Dong
  • , Ye Wang
  • , Shubing Song
  • *Corresponding author for this work

Research output: Contribution to journalConference articlepeer-review

4 Scopus citations

Abstract

In any field, the security of data is extremely important, and it is even related to national security and personal privacy. Within a mature system framework, the design of data security is the most basic and challenging task, and access control is one of the main strategies for Network security prevention. Log as an indispensable part of a secure system can help us to complete traceability after a data breach and to monitor the operation of the application at any time. However, in the existing confidential data management systems, the existing access control methods are not friendly to confidential data, and there are problems of excessive administrator privileges and no confidentiality restrictions. Considering of the fact that the authority and log Module is not well implemented in most confidential data management system, we propose to design a general access control model application. We propose an access control model based on roles and object domains, combined with a security level. Through this model, we can implement three-layer filtering when users access data, thereby ensuring data security and avoiding data leakage problems. At the same time, by implementing the log module, some deficiencies in the log analysis and monitoring of existing confidential data management system can be solved.

Original languageEnglish
Pages (from-to)3865-3874
Number of pages10
JournalProcedia Computer Science
Volume192
DOIs
StatePublished - 2021
Event25th KES International Conference on Knowledge-Based and Intelligent Information and Engineering Systems, KES 2021 - Szczecin, Poland
Duration: 8 Sep 202110 Sep 2021

Keywords

  • Access control model
  • Confidential data management
  • Information security

Fingerprint

Dive into the research topics of 'Application of access control model for confidential data'. Together they form a unique fingerprint.

Cite this