MLS-ABAC: Efficient Multi-Level Security Attribute-Based Access Control scheme

被引:21
作者
Aghili, Seyed Farhad [1 ]
Sedaghat, Mahdi [1 ]
Singelee, Dave [1 ]
Gupta, Maanak [2 ]
机构
[1] Katholieke Univ Leuven, Imec COSIC, Leuven, Belgium
[2] Tennessee Technol Univ, Cookeville, TN 38505 USA
来源
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE | 2022年 / 131卷
基金
欧盟地平线“2020”;
关键词
Access control; Attribute-Based Encryption; Multi-Level Security; Authenticated encryption; Dynamic attributes; ENCRYPTION; FRAMEWORK;
D O I
10.1016/j.future.2022.01.003
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Realizing access control to sensitive data offloaded to a Cloud is challenging in the Internet of Things, where various devices with low computational power and different security levels are interconnected. Despite various solutions, the National Institute of Standards and Technology (NIST)'s Attribute-Based Access Control (ABAC) model is one of the preferred techniques in the literature. In this model, users who satisfy access policies using both static and dynamic attributes are allowed to access the data. However, NIST's ABAC model does not support encryption and therefore does not satisfy data confidentiality. Attribute-Based Encryption (ABE) is a known cryptographic primitive that enables fine-grained access control over encrypted data. However, currently the existing ABE schemes do not meet NIST's ABAC requirements or are not computationally efficient enough for IoT applications. In this paper, we propose a Multi-Level Security ABAC (MLS-ABAC) scheme that satisfies the requirements of NIST's ABAC model. Our construction is efficient and relies on a decryption outsourceable Ciphertext-Policy ABE scheme. Additionally, based on realistic application scenarios, only the authorized data users can decrypt the ciphertext, and check the integrity of the retrieved message. Furthermore, we present both conceptual and formal models for our proposed MLS-ABAC architecture along with performance metrics. The experimental results show that the proposed MLS-ABAC achieves a constant ciphertext size of similar to 230 bytes and with encryption and decryption running times of similar to 18 and similar to 10 ms, respectively, independent of the number of attributes. (c) 2022 The Author(s). Published by Elsevier B.V.This is an open access article under the CC BY license (http://creativecommons.org/licenses/by/4.0/).
引用
收藏
页码:75 / 90
页数:16
相关论文
共 40 条
  • [1] LACO: Lightweight Three-Factor Authentication, Access Control and Ownership Transfer Scheme for E-Health Systems in IoT
    Aghili, Seyed Farhad
    Mala, Hamid
    Shojafar, Mohammad
    Peris-Lopez, Pedro
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2019, 96 : 410 - 424
  • [2] Charm: a framework for rapidly prototyping cryptosystems
    Akinyele, Joseph A.
    Garman, Christina
    Miers, Ian
    Pagano, Matthew W.
    Rushanan, Michael
    Green, Matthew
    Rubin, Aviel D.
    [J]. JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2013, 3 (02) : 111 - 128
  • [3] Beimel A., 1996, SECURE SCHEMES SECRE
  • [4] Bell D. E., 1976, Tech. Rep. ESD-TR-75-306
  • [5] Bertoni G., 2007, ECR HASH WORKSH
  • [6] Ciphertext-policy attribute-based encryption
    Bethencourt, John
    Sahai, Amit
    Waters, Brent
    [J]. 2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, : 321 - +
  • [7] Identity-based encryption from the Weil pairing
    Boneh, D
    Franklin, M
    [J]. SIAM JOURNAL ON COMPUTING, 2003, 32 (03) : 586 - 615
  • [8] Cheung L, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P456
  • [9] Key regeneration-free ciphertext-policy attribute-based encryption and its application
    Cui, Hui
    Deng, Robert H.
    Qin, Baodong
    Weng, Jian
    [J]. INFORMATION SCIENCES, 2020, 517 : 217 - 229
  • [10] Delerablée C, 2008, LECT NOTES COMPUT SC, V5157, P317, DOI 10.1007/978-3-540-85174-5_18