How PML Unifies Multi‑Cloud Access Control with Minimal Overhead
This article introduces PML, a meta‑model based access control policy language and its enforcement mechanism PML‑EM, which abstracts away cloud‑specific policy syntaxes, supports BLP, RBAC, ABAC, and demonstrates low performance and code overhead when implemented on OpenStack.
To protect cloud resources and prevent data leaks, cloud platforms traditionally require each provider to design its own security policy language and access control mechanism, forcing users to learn multiple syntaxes and increasing development costs for providers.
The paper proposes a meta‑model based policy language called PML and an enforcement module PML‑EM . PML can express major models such as BLP, RBAC, and ABAC, while PML‑EM is independent of specific policy languages, access‑control models, and programming languages, thereby reducing both user and provider effort.
PML‑EM was implemented on the OpenStack cloud platform. Experiments show that evaluating a PML policy adds only 4.8% overhead compared to native OpenStack policies, and the code intrusion is about 0.42% of the existing codebase.
Model
r = sub, obj, act
p = sub, obj, act
g = _, _
e = some(where (p.eft == allow))
m = g(r.sub, p.sub) && keyMatch2(r.obj, p.obj) && regexMatch(r.act, p.act)Policy
p, role:user, user, add
p, role:user, user, update
p, role:user, user, delete
p, role:admin, user, add
p, role:admin, user, update
p, role:admin, user, delete
p, role:admin, book, add
p, role:admin, book, update
p, role:admin, book, delete
g, user001, role:admin
g, user002, role:userRequest
user001, user, add
user001, user, update
user001, user, delete
user001, book, add
user001, book, update
user001, book, delete
user002, user, add
user002, user, update
user002, user, delete
user002, book, add
user002, book, update
user002, book, deleteEnforcement Result
true
true
true
true
true
true
true
true
true
false
false
falseThe accompanying screenshot illustrates the policy enforcement interface, and references include the Casbin policy editor and a related journal article.
Signed-in readers can open the original source through BestHub's protected redirect.
This article has been distilled and summarized from source material, then republished for learning and reference. If you believe it infringes your rights, please contactand we will review it promptly.
Open Source Tech Hub
Sharing cutting-edge internet technologies and practical AI resources.
How this landed with the community
Was this worth your time?
0 Comments
Thoughtful readers leave field notes, pushback, and hard-won operational detail here.
