Achieving Secure Role-Based Access Control on Encrypted Data in Cloud Storage

被引:134
|
作者
Zhou, Lan [1 ]
Varadharajan, Vijay [1 ]
Hitchens, Michael [1 ]
机构
[1] Macquarie Univ, Dept Comp, Adv Cyber Secur Res Ctr, N Ryde, NSW 2109, Australia
关键词
Role-based access control; data storage; role-based encryption; cloud computing; architecture; KEY MANAGEMENT; EFFICIENT;
D O I
10.1109/TIFS.2013.2286456
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
With the rapid developments occurring in cloud computing and services, there has been a growing trend to use the cloud for large-scale data storage. This has raised the important security issue of how to control and prevent unauthorized access to data stored in the cloud. One well known access control model is the role-based access control (RBAC), which provides flexible controls and management by having two mappings, users to roles and roles to privileges on data objects. In this paper, we propose a role-based encryption (RBE) scheme that integrates the cryptographic techniques with RBAC. Our RBE scheme allows RBAC policies to be enforced for the encrypted data stored in public clouds. Based on the proposed scheme, we present a secure RBE-based hybrid cloud storage architecture that allows an organization to store data securely in a public cloud, while maintaining the sensitive information related to the organization's structure in a private cloud. We describe a practical implementation of the proposed RBE-based architecture and discuss the performance results. We demonstrate that users only need to keep a single key for decryption, and system operations are efficient regardless of the complexity of the role hierarchy and user membership in the system.
引用
收藏
页码:1947 / 1960
页数:14
相关论文
共 50 条
  • [41] Secure Data Access and Sharing Scheme for Cloud Storage
    Li, Xiong
    Kumari, Saru
    Shen, Jian
    Wu, Fan
    Chen, Caisen
    Islam, S. K. Hafizul
    WIRELESS PERSONAL COMMUNICATIONS, 2017, 96 (04) : 5295 - 5314
  • [42] Secure Data Access and Sharing Scheme for Cloud Storage
    Xiong Li
    Saru Kumari
    Jian Shen
    Fan Wu
    Caisen Chen
    SK Hafizul Islam
    Wireless Personal Communications, 2017, 96 : 5295 - 5314
  • [43] Role-based proactive scheme in an access control hierarchy
    Chen, Hsing-Chung
    Wang, Shiuh-Jeng
    Wen, Jyh-Horng
    JOURNAL OF STATISTICS & MANAGEMENT SYSTEMS, 2007, 10 (06): : 817 - 835
  • [44] Secure Encrypted Data Deduplication for Cloud Storage against Compromised Key Servers
    Zhang, Yuan
    Xu, Chunxiang
    Cheng, Nan
    Shen, Xuemin
    2019 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2019,
  • [45] dualDup: A secure and reliable cloud storage framework to deduplicate the encrypted data and key
    Chouhan, Vikas
    Peddoju, Sateesh K.
    Buyya, Rajkumar
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2022, 69
  • [46] Secure Inverted Index Based Search over Encrypted Cloud Data with User Access Rights Management
    Fateh Boucenna
    Omar Nouali
    Samir Kechid
    M. Tahar Kechadi
    Journal of Computer Science and Technology, 2019, 34 : 133 - 154
  • [47] Sanitizable Access Control System for Secure Cloud Storage Against Malicious Data Publishers
    Susilo, Willy
    Jiang, Peng
    Lai, Jianchang
    Guo, Fuchun
    Yang, Guomin
    Deng, Robert H.
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 19 (03) : 2138 - 2148
  • [48] Homonymous role in role-based discretionary access control
    Chu, Xiaowen
    Kai Ouyang
    Chen, Hsiao-Hwa
    Liu, Jiangchuan
    Jiang, Yixin
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2009, 9 (09): : 1287 - 1300
  • [49] Design Role-Based Multi-Tenancy Access Control Scheme for Cloud Services
    Yang, Shin-Jer
    Lai, Pei-Ci
    Lin, Jyhjong
    2013 INTERNATIONAL SYMPOSIUM ON BIOMETRICS AND SECURITY TECHNOLOGIES (ISBAST), 2013, : 273 - 279
  • [50] Elements of a language for role-based access control
    Hitchens, M
    Varadharajan, V
    INFORMATION SECURITY FOR GLOBAL INFORMATION INFRASTRUCTURES, 2000, 47 : 371 - 380