Achieving Secure Role-Based Access Control on Encrypted Data in Cloud Storage

被引:134
|
作者
Zhou, Lan [1 ]
Varadharajan, Vijay [1 ]
Hitchens, Michael [1 ]
机构
[1] Macquarie Univ, Dept Comp, Adv Cyber Secur Res Ctr, N Ryde, NSW 2109, Australia
关键词
Role-based access control; data storage; role-based encryption; cloud computing; architecture; KEY MANAGEMENT; EFFICIENT;
D O I
10.1109/TIFS.2013.2286456
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
With the rapid developments occurring in cloud computing and services, there has been a growing trend to use the cloud for large-scale data storage. This has raised the important security issue of how to control and prevent unauthorized access to data stored in the cloud. One well known access control model is the role-based access control (RBAC), which provides flexible controls and management by having two mappings, users to roles and roles to privileges on data objects. In this paper, we propose a role-based encryption (RBE) scheme that integrates the cryptographic techniques with RBAC. Our RBE scheme allows RBAC policies to be enforced for the encrypted data stored in public clouds. Based on the proposed scheme, we present a secure RBE-based hybrid cloud storage architecture that allows an organization to store data securely in a public cloud, while maintaining the sensitive information related to the organization's structure in a private cloud. We describe a practical implementation of the proposed RBE-based architecture and discuss the performance results. We demonstrate that users only need to keep a single key for decryption, and system operations are efficient regardless of the complexity of the role hierarchy and user membership in the system.
引用
收藏
页码:1947 / 1960
页数:14
相关论文
共 50 条
  • [21] Efficient and Flexible Role-Based Access Control (EF-RBAC) Mechanism for Cloud
    Harnal, Shilpi
    Chauhan, R. K.
    EAI ENDORSED TRANSACTIONS ON SCALABLE INFORMATION SYSTEMS, 2020, 7 (26) : 1 - 10
  • [22] Cloud-based secure data storage and access control for internet of medical things using federated learning
    Bhansali, Priyanka Kumari
    Hiran, Dilendra
    Kothari, Hemant
    Gulati, Kamal
    INTERNATIONAL JOURNAL OF PERVASIVE COMPUTING AND COMMUNICATIONS, 2024, 20 (02) : 228 - 239
  • [23] Index Generation and Secure Multi-User Access Control over an Encrypted Cloud Data
    Raghavendra, S.
    Meghana, K.
    Doddabasappa, P. A.
    Geeta, C. M.
    Buyya, Rajkumar
    Venugopal, K. R.
    Iyengar, S. S.
    Patnaik, L. M.
    TWELFTH INTERNATIONAL CONFERENCE ON COMMUNICATION NETWORKS, ICCN 2016 / TWELFTH INTERNATIONAL CONFERENCE ON DATA MINING AND WAREHOUSING, ICDMW 2016 / TWELFTH INTERNATIONAL CONFERENCE ON IMAGE AND SIGNAL PROCESSING, ICISP 2016, 2016, 89 : 293 - 300
  • [24] Combining Data Owner- Side and Cloud-Side Access Control for Encrypted Cloud Storage
    Manimegalai, M.
    Sebasthirani, K.
    Balasundar, V
    Anderson, Zeus Kevin S.
    Dinesh, S.
    INTERNATIONAL JOURNAL OF EARLY CHILDHOOD SPECIAL EDUCATION, 2022, 14 (04) : 749 - 763
  • [25] Intelligent Temporal Role Based Access Control for Data Storage in Cloud Database
    Muthurajkumar, S.
    Vijayalakshmi, M.
    Kannan, A.
    2014 SIXTH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING, 2014, : 184 - 188
  • [26] Achieving fine-grained access control for secure data sharing on cloud servers
    Wang, Guojun
    Liu, Qin
    Wu, Jie
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2011, 23 (12): : 1443 - 1464
  • [27] Implement of Agent with Role-based Hierarchy Access Control for Secure Grouping IoTs
    Chen, Hsing-Chung
    Chang, Chia-Hui
    Leu, Fang-Yie
    2017 14TH IEEE ANNUAL CONSUMER COMMUNICATIONS & NETWORKING CONFERENCE (CCNC), 2017, : 120 - 125
  • [28] Achieving Scalable Access Control Over Encrypted Data for Edge Computing Networks
    Cui, Hui
    Yi, Xun
    Nepal, Surya
    IEEE ACCESS, 2018, 6 : 30049 - 30059
  • [29] An Improvement on "CryptCloud+: Secure and Expressive Data Access Control for Cloud Storage"
    Cheng, Leixiao
    Meng, Fei
    IEEE TRANSACTIONS ON SERVICES COMPUTING, 2023, 16 (03) : 1662 - 1663
  • [30] Practical Role-Based Access Control
    Galante, Victoria
    INFORMATION SECURITY JOURNAL, 2009, 18 (02): : 64 - 73