Attribute-Based Messaging: Access Control and Confidentiality

被引:15
作者
Bobba, Rakesh [1 ]
Fatemieh, Omid [1 ]
Khan, Fariba [1 ]
Khan, Arindam [1 ]
Gunter, Carl A. [1 ]
Khurana, Himanshu [1 ]
Prabhakaran, Manoj [1 ]
机构
[1] Univ Illinois, Informat Trust Inst, Urbana, IL 61801 USA
基金
美国国家科学基金会;
关键词
Design; Performance; Security; Attributes; messaging; attribute-based encryption; ENCRYPTION;
D O I
10.1145/1880022.1880025
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Attribute-Based Messaging (ABM) enables messages to be addressed using attributes of recipients rather than an explicit list of recipients. Such messaging offers benefits of efficiency, exclusiveness, and intensionality, but faces challenges in access control and confidentiality. In this article we explore an approach to intraenterprise ABM based on providing access control and confidentiality using information from the same attribute database exploited by the addressing scheme. We show how to address three key challenges. First, we demonstrate a manageable access control system based on attributes. Second, we demonstrate use of attribute-based encryption to provide end-to-end confidentiality. Third, we show that such a system can be efficient enough to support ABM for mid-size enterprises. Our implementation can dispatch confidential ABM messages approved by XACML policy review for an enterprise of at least 60,000 users with only seconds of latency.
引用
收藏
页数:35
相关论文
共 42 条
  • [1] AFANDI, 2006, P EUR C WEB SERV ECO, P53
  • [2] [Anonymous], P 15 ANN NETW DISTR
  • [3] [Anonymous], 2003, Proceedings of the 2003 ACM workshop on XML security
  • [4] [Anonymous], 2008290 CRYPT EPRINT
  • [5] Ateniese G., 2007, NDSS 2007
  • [6] Ciphertext-policy attribute-based encryption
    Bethencourt, John
    Sahai, Amit
    Waters, Brent
    [J]. 2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, : 321 - +
  • [7] Bobba R, 2009, LECT NOTES COMPUT SC, V5789, P587, DOI 10.1007/978-3-642-04444-1_36
  • [8] Bobba Rakesh, 2009, P 4 INT S INF COMP C
  • [9] Boldyreva A, 2008, CCS'08: PROCEEDINGS OF THE 15TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P417
  • [10] Bonatti P. A., 2002, Journal of Computer Security, V10, P241