Abstract
Due to complex and diverse attributes and dimension information of users, the existing policy system cannot control the multi-dimensional users in fine-grained manner, which results in rigid, coarse-grained management configuration and other issues. Therefore, it is extremely urgent to design a new policy system to meet the requirement for controlling multi-dimensional users. This paper proposes a unified naming mechanism of multidimensional attribute label and designs an efficient policy matching algorithm called Improved Sunday with Map mapping container (ISMM). The ISMM algorithm can deal with repeat pattern string by virtue of the idea of Map container, whose structure is orderly called key-value. ISMM firstly preprocesses and transforms the policies stored in policy server, and then matches the transformed information with the attribution information carried by client. If matching succeeds, we use a policy server to return the matching result as well as value information stored in Map container to client in advance, otherwise policy server would return failure information and submits errors to client. The matching result of ISMM algorithm is 13626 items per second in a given testing environment, comparing to 9764 of Sunday algorithm, 8967 of BM algorithm, 6698 of KMP algorithm, 5880 of BF algorithm, 5933 of regular matching algorithm. The experimental results show that efficiency of ISMM is significantly better than the classic policy matching algorithms (BM, KMP, BF, etc.). Moreover, the designed system can not only solve the problems but also control the multi-dimensional attribute information of user and ensuring the integrity, confidentiality and uniqueness. abstract environment.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Shih, H., Guo, X., Lai, K., Cheng, T.C.E.: Taking promotion and prevention mechanisms matter for information systems security policy in Chinese SMEs. In: 2016 2nd International Conference on Information Management (ICIM), pp. 110–115. IEEE Press (2016)
Tarkhanov, T.: Policy algebra for access control in enterprise document management systems. In: 2015 9th International Conference on Application of Information and Communication Technologies (AICT), pp. 225–228. IEEE Press (2015)
Promyslov, V.G.: Tool for I&C system security policy verification. In: 2015 9th International Conference on Application of Information and Communication Technologies (AICT), pp. 221–224. IEEE Press (2015)
Li, S., Meng, J., Yu, L.: Buffer filter: a Last-level cache management policy for CPU-GPGPU heterogeneous system. In: 2015 IEEE 17th International Conference on Embedded Software and Systems (ICESS), pp. 266–271. IEEE Press (2015)
Huang, Y., Weng, Y., Zhou, M.: Design of traffic safety control systems for emergency vehicle preemption using timed petri nets. IEEE Trans. Intell. Transp. Syst. 16(4), 2113–2120 (2015). IEEE Press
Desnitsky, V., Levshun, D., Chechulin, A., Kotenko, I.V.: Design technique for secure embedded devices: application for creation of integrated cyber-physical security system. J. Wirel. Mob. Netw. Ubiquitous Comput. Dependable Appl. (JoWUA), 7(2), 60–80 (2016). IEEE Press
Baiardi, F., Tonelli, F., Isoni, L.: Application Vulnerabilities in Risk Assessment and Management. J. Wirel. Mob. Netw. Ubiquitous Comput. Dependable Appl. (JoWUA), 7(2), 41–59 (2016). IEEE Press
Debnath, M.K., Samet, S., Vidyasankar, K.: A secure revocable personal health record system with policy-based fine-grained access control. In: 2015 13th Annual Conference on Privacy, Security and Trust (PST), pp. 109–116. IEEE Press (2015)
Amthor P.: A uniform modeling pattern for operating systems access control policies with an application to SELinux. In: 2015 12th International Joint Conference on e-Business and Telecommunications (ICETE), pp. 88–99. IEEE Press (2015)
Lopes, I.M., Oliveira, P.: Evaluation of the adoption of an information systems security policy. In: 2015 10th Iberian Conference on Information Systems and Technologies (CISTI), pp. 1–6. IEEE Press (2015)
Cheminod, M., Durante, L., Seno, L., Valenzano, A.: Analysis of access control policies in networked embedded systems: a case study. In: 2015 10th IEEE International Symposium on Industrial Embedded Systems (SIES), pp. 1–10. IEEE Press (2015)
Enqvist, O., Jiang, F., Kahl, F.: A Brute-Force algorithm for reconstructing a scene from two projections. In: IEEE Conference on Computer Vision and Pattern Recognition (CVPR), pp. 2961–2968. IEEE Press (2011)
An, D., Shao, M., Yuan, Z., Shi, H. Pan, Q.: Speaker recognition method based on CPSO clustering and KMP algorithm. In: Seventh International Symposium on Computational Intelligence and Design (ISCID), pp. 556–559. IEEE Press (2014)
Kurniawan, D.H., Munir, R.: A new string matching algorithm based on logical indexing. In: IEEE 26th International Conference on Data Engineering (ICDE 2010), pp. 394–399. IEEE Press (2010)
Hong, I., Bong, K., Shin, D., Park, S., Lee, K.J., Kim, Y., Yoo, H.J.: A 2.71 nJ/Pixel Gaze-activated object recognition system for low-power mobile Dmart glasses. J. Solid-State Circuits, 51(1), 45–55 (2016)
Ou, Z.: Data structuring and effective retrieval in the mining of web sequential characteristic. In: International Conference on Electronic and Mechanical Engineering and Information Technology (EMEIT), pp. 3551–3554. IEEE Press (2011)
Hou, X., Yan, Y., Lu, X.: Hybrid pattern-matching algorithm based on BM-KMP algorithm. In: 3rd International Conference on Advanced Computer Theory and Engineering (ICACTE), pp. 310–313. IEEE Press (2010)
Zhu, Y.: Two enhanced BM Algorithm in pattern matching. In: Workshop on Digital Media and Digital Content Management (DMDCM), pp. 341–346. IEEE Press (2011)
Qiao, J., Zhang, H.: Improvement of BM algorithm in Intrusion detection system. In: 6th IEEE International Conference on Software Engineering and Service Science (ICSESS), pp. 652–655. IEEE Press (2015)
Sunday, D.M.: A very fast substring search algorithm. Commun. ACM 33(8), 132–142 (1990)
Yin, C.: A deterministic finite automata based on improved BM algorithm. In: International Conference on Computer Design and Applications (ICCDA), pp. 389–391. IEEE Press (2010)
Lu, H., Zheng, K., Liu, B., Zhang, X., Liu, Y.: A memory-efficient parallel string matching architecture for high-speed intrusion detection. IEEE J. Sel. Areas Commun. 24(10), 1793–1804 (2006). IEEE Press
Krishnamurthy, R., Li, Y., Raghavan, S.: SystemT: a system for declarative information extraction. Newsletter 37(4), 7–13 (2008)
Lenka, R.K., Ranjan, P.: A comparative study on DFA-based pattern matching for deep packet inspection. In: Third International Conference on Computer and Communication Technology (ICCCT), pp. 255–260. IEEE Press (2012)
Peng, K., Tang, S., Chen, M., Dong, Q.: Chain-based DFA deflation for fast and scalable regular expression matching using TCAM. In: Seventh ACM/IEEE Symposium on Architectures for Networking and Communications Systems (ANCS), pp. 24–35. IEEE Press (2011)
Wang, X., Xu, Y., Jiang, J., Ormond, O., Liu, B., Wang, X.: StriFA: Stride Finite Automata for high speed regular expression matching in network intrusion detection systems. IEEE J. Sel. Areas Commun. 7(3), 374–384 (2013). IEEE Press
Sun, Y., Valgenti, V.C., Kim, M.S.: NFA-based pattern matching for deep packet inspection. In: Proceedings of 20th International Conference on Computer Communications and Networks (ICCCN), pp. 1–6 (2011)
Jiang, J., Xu, Y., Pan, T., Tang, Y., Liu, B.: Pattern-based DFA for memory-efficient and scalable multiple regular expression matching. In: IEEE International Conference on Communications (ICC), pp. 1–5. IEEE Press (2010)
Acknowledgments
This work was partially supported by the National Basic Research Program of China (973 Program) under Grant No. 2013CB329102, in part by the National Natural Science Foundation of China (NSFC) under Grant No. 61232017, 61372112 and 61003283.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Liu, B., Guan, J., Jiang, Z. (2018). A Policy Management System Based on Multi-dimensional Attribution Label. In: You, I., Leu, FY., Chen, HC., Kotenko, I. (eds) Mobile Internet Security. MobiSec 2016. Communications in Computer and Information Science, vol 797. Springer, Singapore. https://doi.org/10.1007/978-981-10-7850-7_12
Download citation
DOI: https://doi.org/10.1007/978-981-10-7850-7_12
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-7849-1
Online ISBN: 978-981-10-7850-7
eBook Packages: Computer ScienceComputer Science (R0)