Policy Privacy in Cryptographic Access Control

被引:7
作者
Ferrara, Anna Lisa [1 ]
Fuchsbauer, Georg [2 ]
Liu, Bin [3 ]
Warinschi, Bogdan [3 ]
机构
[1] Univ Surrey, Guildford GU2 5XH, Surrey, England
[2] IST Austria, Klosterneuburg, Austria
[3] Univ Bristol, Bristol BS8 1TH, Avon, England
来源
2015 IEEE 28TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM CSF 2015 | 2015年
基金
英国工程与自然科学研究理事会;
关键词
PREDICATE ENCRYPTION; SECURE;
D O I
10.1109/CSF.2015.11
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Cryptographic access control offers selective access to encrypted data via a combination of key management and functionality-rich cryptographic schemes, such as attribute-based encryption. Using this approach, publicly available meta-data may inadvertently leak information on the access policy that is enforced by cryptography, which renders cryptographic access control unusable in settings where this information is highly sensitive. We begin to address this problem by presenting rigorous definitions for policy privacy in cryptographic access control. For concreteness we set our results in the model of Role-Based Access Control (RBAC), where we identify and formalize several different flavors of privacy; however, our framework should serve as inspiration for other models of access control. Based on our insights we propose a new system which significantly improves on the privacy properties of state-of-the-art constructions. Our design is based on a novel type of privacy-preserving attribute-based encryption, which we introduce and show how to instantiate. We present our results in the context of a cryptographic RBAC system by Ferrara et al. (CSF' 13), which uses cryptography to control read access to files, while write access is still delegated to trusted monitors. We give an extension of the construction that permits cryptographic control over write access. Our construction assumes that key management uses out-of-band channels between the policy enforcer and the users but eliminates completely the need for monitoring read/write access to the data.
引用
收藏
页码:46 / 60
页数:15
相关论文
共 41 条
[1]   Security analysis of cryptographically controlled access to XML documents [J].
Abadi, Martin ;
Warinschi, Bogdan .
JOURNAL OF THE ACM, 2008, 55 (02)
[2]   CRYPTOGRAPHIC SOLUTION TO A PROBLEM OF ACCESS-CONTROL IN A HIERARCHY [J].
AKL, SG ;
TAYLOR, PD .
ACM TRANSACTIONS ON COMPUTER SYSTEMS, 1983, 1 (03) :239-248
[3]  
American National Standard Institute (ANSI), 2004, 3592004 ANSI INCITS
[4]  
[Anonymous], 2007, NDSS
[5]  
[Anonymous], P FAST 03 C FIL STOR
[6]   Dynamic and Efficient Key Management for Access Hierarchies [J].
Atallah, Mikhail J. ;
Blanton, Marina ;
Fazio, Nelly ;
Frikken, Keith B. .
ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 2009, 12 (03)
[7]  
Bellare M., 2001, P INT C THEOR APPL C, P566
[8]  
Bellare M, 2014, LECT NOTES COMPUT SC, V8383, P520, DOI 10.1007/978-3-642-54631-0_30
[9]  
Blaze M., Blaze of Light, P9, DOI DOI 10.1145/168588.168590
[10]   Short group signatures [J].
Boneh, D ;
Boyen, X ;
Shacham, H .
ADVANCES IN CRYPTOLOGY - CRYPTO 2004, PROCEEDINGS, 2004, 3152 :41-55