A secure and efficient role-based access policy towards cryptographic cloud storage

作者: Cheng Hong , Zhiquan lv , Min Zhang , Dengguo Feng

DOI: 10.1007/978-3-642-23535-1_24

关键词:

摘要: Cloud Storage, which provides cost-efficient and scalable storage services, has emerged as a hot paradigm today. As promising it is, Storage also brings forth security challenges. Sensitive data may be outsourced for sharing on cloud servers, are not within the same trusted domain owner (DO). To keep confidential against unauthorized parties, cryptographic access control must applied. Existing methods usually require policies fully managed by DO, could lead to DO-side bottleneck. This paper addressed issue implementing Role-Based Access Control via CP-ABE. The divided into two parts: Permission Assignments (PAs) Role (RAs), we develop an approach called propagation allow RAs handled effectively users besides DO. Since most of dynamic in triggered RAs, bottleneck successfully avoided.

参考文章(18)
David Ferraiolo, Nickilyn Lynch, Dennis Gilbert, An Examination of Federal and Commercial Access Control Policy Needs 16th National Computer Security Conference; September 20-23, 1993; Baltimore, Maryland, United States. pp. 107- 116 ,(1993)
Dan Boneh, Hovav Shacham, Nagendra Modadugu, Eu-Jin Goh, SiRiUS: Securing Remote Untrusted Storage. network and distributed system security symposium. ,(2003)
Stefano Paraboschi, Sara Foresti, Sabrina De Capitani di Vimercati, Sushil Jajodia, Pierangela Samarati, Over-encryption: management of access control evolution on outsourced data very large data bases. pp. 123- 134 ,(2007)
Kevin Fu, Ram Swaminathan, Erik Riedel, Qian Wang, Mahesh Kallahalla, Plutus: Scalable Secure File Sharing on Untrusted Storage file and storage technologies. pp. 3- 3 ,(2003)
Shucheng Yu, Cong Wang, Kui Ren, Wenjing Lou, Attribute based data sharing with attribute revocation computer and communications security. pp. 261- 270 ,(2010) , 10.1145/1755688.1755720
Christian Cachin, Idit Keidar, Alexander Shraer, None, Trusting the cloud ACM SIGACT News. ,vol. 40, pp. 81- 86 ,(2009) , 10.1145/1556154.1556173
Rafail Ostrovsky, Amit Sahai, Brent Waters, Attribute-based encryption with non-monotonic access structures computer and communications security. ,vol. 2007, pp. 195- 203 ,(2007) , 10.1145/1315245.1315270
Hema Andal Jayaprakash Narayanan, Mehmet Hadi Gunes, Ensuring access control in cloud provisioned healthcare systems 2011 IEEE Consumer Communications and Networking Conference (CCNC). pp. 247- 251 ,(2011) , 10.1109/CCNC.2011.5766466
John Bethencourt, Amit Sahai, Brent Waters, Ciphertext-Policy Attribute-Based Encryption ieee symposium on security and privacy. pp. 321- 334 ,(2007) , 10.1109/SP.2007.11
Behzad Malek, Ali Miri, Combining Attribute-Based and Access Systems computational science and engineering. ,vol. 3, pp. 305- 312 ,(2009) , 10.1109/CSE.2009.157