Loading...

Access control enforcement on outsourced data ensuring privacy of access control policies

Tourani, P ; Sharif University of Technology | 2011

960 Viewed
  1. Type of Document: Article
  2. DOI: 10.1109/HPCSim.2011.5999865
  3. Publisher: 2011
  4. Abstract:
  5. Nowadays, data outsourcing has become a solution for many organizations especially large scale enterprises due to the high costs of in-house management of the rapidly growing data. Among all security requirements in this context, user access control and its following dynamic changes are of interest. In this paper, we propose an efficient and reliable mechanism to solve this problem in owner-write-users-read applications. A novel solution is introduced to enforce access control on outsourced data using the Chinese Remainder Theorem. The solution allows updating policy changes at a limited cost in terms of both computational power and the number of users' secret keys. Although the server, on which data is stored, is delegated for enforcing access control, access control policies are protected from being revealed to the server or the users. The solution is applicable to data outsourcing scenarios where users are anonymous but the server is still able to enforce the owner access control policies
  6. Keywords:
  7. Access Control Policy ; Privacy ; Access control policies ; Access Control Policy ; Chinese Remainder Theorem ; Computational power ; Data outsourcing ; Dynamic changes ; High costs ; Outsourced Data ; Policy changes ; Secret key ; Security requirements ; User access control ; Computation theory ; Computer software selection and evaluation ; Data privacy ; Outsourcing ; Access control
  8. Source: Proceedings of the 2011 International Conference on High Performance Computing and Simulation, HPCS 2011, 4 July 2011 through 8 July 2011, Istanbul ; 2011 , Pages 491-497 ; 9781612843810 (ISBN)
  9. URL: http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=5999865