A Database Security Access Control Method Based on Identity Authentication
Jiwei Li,Xuewei Ding,Yuchen Jiang,Yongqi Ai,Zhen Jia,Xinyi Zhang
DOI: https://doi.org/10.1145/3661638.3661710
2024-01-01
Abstract:Due to the limited ability to authenticate user access attributes, the control effect of database access is difficult to achieve the desired state. Therefore, an identity based database security access control method is proposed. In the stage of building identity trust relationships in cloud services, a trust transfer model was designed, with a trust chain consisting of guarantee nodes and recommendation nodes, allowing users to establish a direct trust relationship between accessing the database through identity authentication. The cloud service provider (CSP) was used as a trusted third party to establish mutual trust relationships between different domains, and the identity authentication gateway was used as a special identity of the domain trust proxy, Use a gateway token as the information credential for trust transfer, thereby achieving secure transfer of user identity between different domains. In the access control stage, the authentication of cloud service identity is achieved by combining trust relationships, and the permission to request database access is determined. In the test results, the interception rate of designing database access control methods for abnormal access has always been stable at over 98.0%, which can effectively ensure the security of database information, with the shortest response time and the least impact from the scale of concurrent access requests.