SecRBAC: Secure data in the Clouds

被引:17
作者
Marin Perez, Juan M. [1 ]
Martinez Perez, Gregorio [1 ]
Skarmeta Gomez, Antonio F. [1 ]
机构
[1] Univ Murcia, Dept Informat & Commun Engn, E-30071 Murcia, Spain
基金
欧盟第七框架计划; 欧盟地平线“2020”;
关键词
cloud computing; authorization; Data-centric security; role-based access control; ACCESS-CONTROL; ENCRYPTION; SCHEME;
D O I
10.1109/TSC.2016.2553668
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Most current security solutions are based on perimeter security. However, Cloud computing breaks the organization perimeters. When data resides in the Cloud, they reside outside the organizational bounds. This leads users to a loos of control over their data and raises reasonable security concerns that slow down the adoption of Cloud computing. Is the Cloud service provider accessing the data? Is it legitimately applying the access control policy defined by the user? This paper presents a data-centric access control solution with enriched role-based expressiveness in which security is focused on protecting user data regardless the Cloud service provider that holds it. Novel identity-based and proxy re-encryption techniques are used to protect the authorization model. Data is encrypted and authorization rules are cryptographically protected to preserve user data against the service provider access or misbehavior. The authorization model provides high expressiveness with role hierarchy and resource hierarchy support. The solution takes advantage of the logic formalism provided by Semantic Web technologies, which enables advanced rule management like semantic conflict detection. A proof of concept implementation has been developed and a working prototypical deployment of the proposal has been integrated within Google services.
引用
收藏
页码:726 / 740
页数:15
相关论文
共 24 条
[1]   Detection of semantic conflicts in ontology and rule-based information systems [J].
Alcaraz Calero, Jose M. ;
Marin Perez, Juan M. ;
Bernal Bernabe, Jorge ;
Garcia Clemente, Felix J. ;
Martinez Perez, Gregorio ;
Gomez Skarmeta, Antonio F. .
DATA & KNOWLEDGE ENGINEERING, 2010, 69 (11) :1117-1137
[2]  
Ateniese G., 2006, ACM Transactions on Information and Systems Security, V9, P1, DOI 10.1145/1127345.1127346
[3]  
Balamurugan B., 2014, Journal of Emerging Technologies in Web Intelligence, V6, P263, DOI 10.4304/jetwi.6.3.263-272
[4]  
Bobba R, 2009, LECT NOTES COMPUT SC, V5789, P587, DOI 10.1007/978-3-642-04444-1_36
[5]  
Boneh E.-J. G. Dan, 2006, PROPOSAL P1363 3 PRO
[6]  
Chang D. Y., 2015, U.S. Patent, Patent No. [20,150,007,274, 20150007274]
[7]  
Cloud Security Alliance, 2003, TECH REP
[8]   ABAC and RBAC: Scalable, Flexible, and Auditable Access Management [J].
Coyne, Ed ;
Weil, Timothy R. .
IT PROFESSIONAL, 2013, 15 (03) :14-16
[9]  
Empower ID, 2013, CISC VIS NETW IND GL
[10]  
Goyal V., 2006, P 2006 INT C PRIVACY, P1