Role-Based Access Control Model for Cloud Storage Using Identity-Based Cryptosystem

被引:14
作者
Xu, Jian [1 ]
Yu, Yanbo [1 ]
Meng, Qingyu [1 ]
Wu, Qiyu [1 ]
Zhou, Fucai [1 ]
机构
[1] Northeastern Univ, Software Coll, Shenyang 110169, Peoples R China
基金
中国国家自然科学基金;
关键词
Access control; Cloud storage; RBAC; Identity-based cryptosystem;
D O I
10.1007/s11036-019-01484-4
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
As the security of cloud storage cannot be effectively guaranteed, many users are reluctant to upload their key data to the cloud for storage, which seriously hinders the development of cloud storage. Since ensuring the confidentiality of user data and avoiding unauthorized access is the key to solving the security problems of cloud storage, there has been much cryptographic research proposing the use of the combination of cryptography technologies and access control model to guarantee the data security on untrusted cloud providers. However, the vast majority of existing access control schemes for ciphertext in cloud storage do not support the dynamic update of access control policies, and the computational overhead is also very large. This is contrary to the needs of most practical applications, which leverage dynamic data and need low computation cost. To solve this problem, combined with identity-based cryptosystem (IBC) and role-based access control (RBAC) model, we propose an RBAC (In this paper we use RBAC(1)model which is richer access control model)) scheme for ciphertext in cloud storage. We also give the formal definitions of our scheme, a detailed description of four tuple used to represent access control strategy, the hybrid encryption strategy and write-time re-encryption strategy, which are designed for improving the system efficiency. The detailed construction processes of our scheme which. Include system initialization, add and delete users, add and delete permissions, add and delete roles, add and delete role inheritance, assign and remove user, assign and remove permission, read and write file algorithm are also given. Finally, we analyze the scheme and prove that it is correct, access control preserving (AC- preserving) and secure.
引用
收藏
页码:1475 / 1492
页数:18
相关论文
共 25 条
[1]   Ciphertext-policy attribute-based encryption [J].
Bethencourt, John ;
Sahai, Amit ;
Waters, Brent .
2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, :321-+
[2]  
[陈丹伟 Chen Danwei], 2014, [电子学报, Acta Electronica Sinica], V42, P821
[3]  
Chen DW, 2009, LECT NOTES COMPUT SC, V5931, P559, DOI 10.1007/978-3-642-10665-1_52
[4]   Ontology-based access control model for security policy reasoning in cloud computing [J].
Choi, Chang ;
Choi, Junho ;
Kim, Pankoo .
JOURNAL OF SUPERCOMPUTING, 2014, 67 (03) :711-722
[5]  
Ene A, 2008, SACMAT'08: PROCEEDINGS OF THE 13TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES, P1
[6]   dRBAC: Distributed role-based access control for dynamic coalition environments [J].
Freudenthal, E ;
Pesin, T ;
Port, L ;
Keenan, E ;
Karamcheti, V .
22ND INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS, PROCEEDINGS, 2002, :411-420
[7]   On the Practicality of Cryptographically Enforcing Dynamic Access Control Policies in the Cloud [J].
Garrison, William C., III ;
Shull, Adam ;
Myers, Steven ;
Lee, Adam J. .
2016 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2016, :819-838
[8]  
Goyal V., 2006, P 13 ACM C COMP COMM, P89, DOI 10.1145/1180405.1180418
[9]  
Goyal V, 2008, LECT NOTES COMPUT SC, V5126, P579, DOI 10.1007/978-3-540-70583-3_47
[10]   Application-Sensitive Access Control Evaluation using Parameterized Expressiveness [J].
Hinrichs, Timothy L. ;
Martinoia, Diego ;
Garrison, William C., III ;
Lee, Adam J. ;
Panebianco, Alessandro ;
Zuck, Lenore .
2013 IEEE 26TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF), 2013, :145-160