Cryptographic Enforcement of Access Control Policies in the Cloud: Implementation and Experimental Assessment

被引:0
作者
Berlato, Stefano [1 ,2 ]
Carbone, Roberto [2 ]
Ranise, Silvio [2 ,3 ]
机构
[1] Univ Genoa, DIBRIS, Genoa, Italy
[2] Fdn Bruno Kessler, Secur & Trust Res Unit, Trento, Italy
[3] Univ Trento, Dept Math, Trento, Italy
来源
SECRYPT 2021: PROCEEDINGS OF THE 18TH INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY | 2021年
基金
欧盟地平线“2020”;
关键词
Cryptographic Access Control; Experimental Assessment; Honest but Curious Cloud Service Provider; STORAGE;
D O I
10.5220/0010608003700381
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
While organisations move their infrastructure to the cloud, honest but curious Cloud Service Providers (CSPs) threaten the confidentiality of cloud-hosted data. In this context, many researchers proposed Cryptographic Access Control (CAC) schemes to support data sharing among users while preventing CSPs from accessing sensitive data. However, the majority of these schemes focuses on high-level features only and cannot adapt to the multiple requirements arising in different scenarios. Moreover, (almost) no CAC scheme implementation is available for enforcement of authorisation policies in the cloud, and performance evaluation is often overlooked. To fill this gap, we propose the toolchain COERCIVE, short for CryptOgraphy killEd (the honest but) cuRious Cloud servIce proVidEr, which is composed of two tools: TradeOffBoard and CryptoAC. TradeOffBoard assists organisations in identifying the optimal CAC architecture for their scenario. CryptoAC enforces authorisation policies in the cloud by deploying the architecture selected with TradeOffBoard. In this paper, we describe the implementation of CryptoAC and conduct a thorough performance evaluation to demonstrate its scalability and efficiency with synthetic benchmarks.
引用
收藏
页码:370 / 381
页数:12
相关论文
共 41 条
[11]   An efficient signcryption for data access control in cloud computing [J].
Li, Fagen ;
Liu, Bo ;
Hong, Jiaojiao .
COMPUTING, 2017, 99 (05) :465-479
[12]   Garbled role-based access control in the cloud [J].
Alam, Masoom ;
Emmanuel, Naina ;
Khan, Tanveer ;
Xiang, Yang ;
Hassan, Houcine .
JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2018, 9 (04) :1153-1166
[13]   Attributes Union in CP-ABE Algorithm for Large Universe Cryptographic Access Control [J].
Cheng, Yong ;
Ren, Jiangchun ;
Wang, Zhiying ;
Mei, Songzhu ;
Zhou, Jie .
SECOND INTERNATIONAL CONFERENCE ON CLOUD AND GREEN COMPUTING / SECOND INTERNATIONAL CONFERENCE ON SOCIAL COMPUTING AND ITS APPLICATIONS (CGC/SCA 2012), 2012, :180-186
[14]   Provably Secure Data Access Control Protocol for Cloud Computing [J].
Zhang, Ji ;
Chen, Anmin ;
Zhang, Ping .
SYMMETRY-BASEL, 2023, 15 (12)
[15]   A scalable multilabel-based access control as a service for the cloud (SMBACaaS) [J].
Chinnasamy, P. ;
Deepalakshmi, P. .
TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2018, 29 (08)
[16]   Flexible Data Access Control Based on Trust and Reputation in Cloud Computing [J].
Yan, Zheng ;
Li, Xueyun ;
Wang, Mingjun ;
Vasilakos, Athanasios V. .
IEEE TRANSACTIONS ON CLOUD COMPUTING, 2017, 5 (03) :485-498
[17]   Attribute-Based Access Control Scheme with Efficient Revocation in Cloud Computing [J].
Xia, Zhihua ;
Zhang, Liangao ;
Liu, Dandan .
CHINA COMMUNICATIONS, 2016, 13 (07) :92-99
[18]   CloudFile: A cloud data access control system based on mobile social trust [J].
Yan, Zheng ;
Shi, Wangyang .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2017, 86 :46-58
[19]   A trustworthy access control model for mobile cloud computing based on reputation and mechanism design [J].
Lin, Hui ;
Xu, Li ;
Huang, Xinyi ;
Wu, Wei ;
Huang, Yijie .
AD HOC NETWORKS, 2015, 35 :51-64
[20]   Time efficient secure DNA based access control model for cloud computing environment [J].
Namasudra, Suyel ;
Roy, Pinki ;
Vijayakumar, Pandi ;
Audithan, Sivaraman ;
Balusamy, Balamurugan .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2017, 73 :90-105