Appl Intell
DOI 10.1007/s10489-017-1064-3
OrBAC from access control model to access usage model
Khalida Guesmia
1
· Narhimene Boustia
2
© Springer Science+Business Media, LLC 2017
Abstract The purpose based access control model has been
proposed recently to restrict the access to the sensitive data
which are out of control of their owner. This model can be
enforced by ensuring that the user who wants to access the
private data will respect the specific plan of tasks/actions
that leads to achieving the intended objective to use these
data. The Organization Based Access Control (OrBAC)
model is suitable to integrate this principle, but in a dynamic
environment such as the cloud computing, the authoriza-
tion rules should be expressed in flexible way, and they may
include optional tasks which can be skipped in some cases
in order to adapt temporarily to the changes in the con-
text. To meet these requirements, we propose in this paper a
new extension of the OrBAC model using the temporal non-
monotonic description logic (TL − JClassic
+
δǫ
) that allows
to represent formally the policy rules as hierarchical plan-
ning that includes a set of ordered tasks that may admit
exceptions in special cases and when the access request
is made, the access control system depending on the cur-
rent context will infer dynamically the appropriate sequence
of actions that can be performed by subject who demands
access to private data that may be outsourced into the cloud.
Khalida Guesmia
guesmia.khalida@yahoo.fr
Narhimene Boustia
nboustia@gmail.com
1
SIIR/LRDSI, Blida 1 University, Blida, Algeria
2
SIIR/LRDSI(Blida1) & RCR/RIIMA(USTHB), Blida 1
University, Blida, Algeria
Keywords Data privacy · Purpose based access control ·
Organization based access control · Nonmonotonic
reasoning · Temporal description logic
1 Introduction
The cloud computing [27] is an emerging technology
that introduces a new approach to delivering computing
resources as services over the internet, with hiding all the
details of implementation, deployment, maintenance and
administration. It provides several advantages, most notably
it offers ubiquitous services where anyone can access ser-
vices at anytime from any device connected to internet and it
allows businesses and organizations to reduce considerably
their capital expenditure on both hardware and software
aspects, and thus it makes their business more effective.
However, outsourcing data to the cloud providers will
obviously raise serious questions about data security and
privacy. For that, several security properties need to be
addressed properly in order to encourage companies to
adopt the cloud services. Therefore, besides encrypting data
to be transferred in a secure manner to and from the cloud,
there is also a strong need to prevent these data from ille-
gal disclosure and inappropriate usage. In this work, we are
interested in controlling access to the sensitive data that may
be stored in the cloud.
The purpose based access control model (PBAC) [13]
has been proposed recently to ensure the privacy of person-
nel data which are out control of their owner. The principle
of this model is to allow or forbid some access requests in
the system based on the purposes that involved access to
this data. For example, the physician is allowed to access a
patient’s data only for certain purposes, such as treatment,
and is prohibited from accessing the same data for other