Suriya U-ruekolan, Manot Rattananen, Jukkrapong Ponharn, Naiyana Sahavechaphan
{"title":"Enforcing data access control and privacy: The graph-driven data regulatory approach","authors":"Suriya U-ruekolan, Manot Rattananen, Jukkrapong Ponharn, Naiyana Sahavechaphan","doi":"10.1016/j.jisa.2025.104163","DOIUrl":null,"url":null,"abstract":"<div><div>Comprehensive data-driven systems require the integration of various access control and privacy patterns to address the diverse needs of subjects. However, existing approaches often struggle to simultaneously support precise access control, privacy preservation, and efficient policy maintenance. This paper presents G2D (Graph to Data), a novel technique that employs a Data Regulatory Graph (DRG) to dynamically generate data authorization statements tailored to specific subjects. G2D unifies access control and privacy by producing authorized SQL queries and specifying necessary data transformations for sensitive fields. Experimental results demonstrate that G2D incurs minimal execution overhead, simplifies policy updates, and effectively balances system performance with data protection, even under high concurrency. These findings highlight G2D’s potential to support scalable, privacy-aware data access in complex environments.</div></div>","PeriodicalId":48638,"journal":{"name":"Journal of Information Security and Applications","volume":"93 ","pages":"Article 104163"},"PeriodicalIF":3.8000,"publicationDate":"2025-07-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Information Security and Applications","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S2214212625002005","RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 0
Abstract
Comprehensive data-driven systems require the integration of various access control and privacy patterns to address the diverse needs of subjects. However, existing approaches often struggle to simultaneously support precise access control, privacy preservation, and efficient policy maintenance. This paper presents G2D (Graph to Data), a novel technique that employs a Data Regulatory Graph (DRG) to dynamically generate data authorization statements tailored to specific subjects. G2D unifies access control and privacy by producing authorized SQL queries and specifying necessary data transformations for sensitive fields. Experimental results demonstrate that G2D incurs minimal execution overhead, simplifies policy updates, and effectively balances system performance with data protection, even under high concurrency. These findings highlight G2D’s potential to support scalable, privacy-aware data access in complex environments.
期刊介绍:
Journal of Information Security and Applications (JISA) focuses on the original research and practice-driven applications with relevance to information security and applications. JISA provides a common linkage between a vibrant scientific and research community and industry professionals by offering a clear view on modern problems and challenges in information security, as well as identifying promising scientific and "best-practice" solutions. JISA issues offer a balance between original research work and innovative industrial approaches by internationally renowned information security experts and researchers.