The 6th International Workshop on Trusted Collaboration

Research Article

Ontology-based Policy Anomaly Management for Autonomic Computing

Download735 downloads
  • @INPROCEEDINGS{10.4108/icst.collaboratecom.2011.247119,
        author={Hongxin Hu and Gail-Joon Ahn and Ketan Kulkarni},
        title={Ontology-based Policy Anomaly Management for Autonomic Computing},
        proceedings={The 6th International Workshop on Trusted Collaboration},
        publisher={IEEE},
        proceedings_a={TRUSTCOL},
        year={2012},
        month={4},
        keywords={ontology policy anomaly analysis autonomic computing},
        doi={10.4108/icst.collaboratecom.2011.247119}
    }
    
  • Hongxin Hu
    Gail-Joon Ahn
    Ketan Kulkarni
    Year: 2012
    Ontology-based Policy Anomaly Management for Autonomic Computing
    TRUSTCOL
    ICST
    DOI: 10.4108/icst.collaboratecom.2011.247119
Hongxin Hu1,*, Gail-Joon Ahn1, Ketan Kulkarni2
  • 1: Arizona State University
  • 2: Intel Corporation
*Contact email: hxhu@asu.edu

Abstract

The advent of emerging computing technologies such as service-oriented architecture and cloud computing has enabled us to perform business services more efficiently and effectively. However, we still suffer from unintended security leakages by unauthorized actions in business services. Moreover, designing and managing different types of policies collaboratively in such a computing environment are critical but often error prone due to the complex nature of policies as well as the lack of effective analysis mechanisms and corresponding tools. In particular, existing mechanisms and tools for policy management adopt different approaches for different types of policies. In this work, we propose a unified framework to facilitate collaborative policy analysis and management for different types of policies, focusing on policy anomaly detection and resolution. Our generic approach captures the common semantics and structure of different types of access control policies with the notion of policy ontology. We also discuss a proof-of-concept implementation of our proposed framework and demonstrate how efficiently our approach can discover and resolve anomalies for different types of policies.