A Framework for the Cryptographic Enforcement of Information Flow Policies

被引:3
|
作者
Alderman, James [1 ]
Crampton, Jason [1 ]
Farley, Naomi [1 ]
机构
[1] Royal Holloway Univ London, Informat Secur Grp, Egham TW20 0EX, Surrey, England
来源
PROCEEDINGS OF THE 22ND ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES (SACMAT'17) | 2017年
基金
欧盟地平线“2020”; 英国工程与自然科学研究理事会;
关键词
Cryptographic Enforcement Scheme; Information Flow Policy; Access Control; Cryptography; Key Assignment Scheme; Attribute-based Encryption;
D O I
10.1145/3078861.3078868
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
It is increasingly common to outsource data storage to untrusted, third party (e.g. cloud) servers. However, in such settings, low-level online reference monitors may not be appropriate for enforcing read access, and thus cryptographic enforcement schemes (CESs) may be required. Much of the research on cryptographic access control has focused on the use of specific primitives and, primarily, on how to generate appropriate keys and fails to model the access control system as a whole. Recent work in the context of role-based access control has shown a gap between theoretical policy specification and computationally secure implementations of access control policies, potentially leading to insecure implementations. Without a formal model, it is hard to (i) reason about the correctness and security of a CES, and (ii) show that the security properties of a particular cryptographic primitive are sufficient to guarantee security of the CES as a whole. In this paper, we provide a rigorous definitional framework for a CES that enforces read-only information flow policies (which encompass many practical forms of access control, including role-based policies). This framework (i) provides a tool by which instantiations of CESs can be proven correct and secure, (ii) is independent of any particular cryptographic primitives used to instantiate a CES, and (iii) helps to identify the limitations of current primitives (e.g. key assignment schemes) as components of a CES.
引用
收藏
页码:143 / 154
页数:12
相关论文
共 50 条
  • [41] ENFORCEMENT POLICIES FOR PARKING REGULATIONS
    TARTARONE, S
    LEVIS, AH
    IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS, 1973, SMC3 (06): : 604 - 610
  • [42] Tractable enforcement of declassification policies
    Barthe, Gilles
    Cavadini, Salvador
    Rezk, Tamara
    CSF 2008: 21ST IEEE COMPUTER SECURITY FOUNDATIONS SYMPOSIUM, PROCEEDINGS, 2008, : 83 - 97
  • [43] Corrective Enforcement of Security Policies
    Khoury, Raphael
    Tawbi, Nadia
    FORMAL ASPECTS OF SECURITY AND TRUST, 2011, 6561 : 176 - 190
  • [44] Policies for operating enforcement cameras
    Dreyfuss, Michael
    Sher, Mali
    JOURNAL OF TRANSPORTATION SAFETY & SECURITY, 2020, 12 (06) : 746 - 763
  • [45] An Algorithmic Framework for Wireless Information Flow
    Goemans, Michel X.
    Iwata, Satoru
    Zenklusen, Rico
    2009 47TH ANNUAL ALLERTON CONFERENCE ON COMMUNICATION, CONTROL, AND COMPUTING, VOLS 1 AND 2, 2009, : 294 - +
  • [46] Conceptual framework for a unified information flow
    Eliseev, A.G.
    Shakirova, F.R.
    Gazovaya Promyshlennost, 2005, (06): : 45 - 47
  • [47] A FRAMEWORK FOR THE STUDY OF CRYPTOGRAPHIC PROTOCOLS
    BERGER, R
    KANNAN, S
    PERALTA, R
    LECTURE NOTES IN COMPUTER SCIENCE, 1986, 218 : 87 - 103
  • [48] The design of the OpenBSD cryptographic framework
    Keromytis, AD
    Wright, JL
    de Raadt, T
    USENIX ASSOCIATION PROCEEDINGS OF THE GENERAL TRACK, 2003, : 181 - 196
  • [49] Structured Information Flow (SIF): A Framework to Model Information Flow Infrastructure for Organizations
    Buiatia, Shishir
    Arthur, James D.
    IMSCI '08: 2ND INTERNATIONAL MULTI-CONFERENCE ON SOCIETY, CYBERNETICS AND INFORMATICS, VOL III, PROCEEDINGS, 2008, : 261 - 266
  • [50] ACTkit: A Framework for the Definition and Enforcement of Role, Content and Context-based Access Control Policies
    Betarte, G.
    Gatto, A.
    Martinez, R.
    Zipitria, F.
    IEEE LATIN AMERICA TRANSACTIONS, 2012, 10 (03) : 1742 - 1751