Loading...

Enforcing access control policies over data stored on untrusted server

Soltani, N ; Sharif University of Technology

722 Viewed
  1. Type of Document: Article
  2. DOI: 10.1109/ISCISC.2017.8488365
  3. Abstract:
  4. One of the security issues in data outsourcing scenario is the enforcement of data owner's access control policies. This includes some challenges; namely, the number of keys required to access authorized resources, efficient policy updating, write access control enforcement, user and data owner overhead, and preserving confidentiality of data and policies. Most of the existing solutions address only some of the challenges, while they impose high overhead on both the data owner and users. Though, policy management in the Role-Based Access Control (RBAC) model is easier and more efficient due to the existence of role hierarchical structure and role inheritance; most of the existing solutions address only enforcement of policies in form of access control matrix. In this paper, we propose an approach to enforce RBAC policies on encrypted data outsourced to service provider (SP). We utilize Chinese Remainder Theorem (CRT) for key management and role/permission assignment. Efficient user revocation, support of role hierarchical structure updates, availability of authorized resources for users of newly added roles, and enforcement of write access control policies as well as static separation of duties (SSD), are of the proposed solution advantages. In addition, the ciphertext size is linearly proportional to the plaintext size, regardless of the number of roles and users. © 2017 IEEE
  5. Keywords:
  6. Outsourced data ; Chromium compounds ; Cryptography ; Access control enforcements ; Access control policies ; Chinese remainder theorem ; Hierarchical structures ; Outsourced datum ; Role-based access control ; Role-based access control model ; Static separation of duty ; Access control
  7. Source: 2017 14th International ISC (Iranian Society of Cryptology) Conference on Information Security and Cryptology, ISCISC 2017, 6 September 2017 through 7 September 2017 ; 2018 , Pages 54-57 ; 9781538665602 (ISBN)
  8. URL: https://ieeexplore.ieee.org/document/8488365