Garbled role-based access control in the cloud

被引:0
作者
Masoom Alam
Naina Emmanuel
Tanveer Khan
Yang Xiang
Houcine Hassan
机构
[1] COMSATS Institute of Information Technology Islamabad,Cyber Security Lab Department of Computer Science
[2] Deakin University,undefined
[3] Universitat Politècnica de València,undefined
来源
Journal of Ambient Intelligence and Humanized Computing | 2018年 / 9卷
关键词
Garbled computing; Role-based access control; Oblivious-transfer; Dynamic separation of duty;
D O I
暂无
中图分类号
学科分类号
摘要
Security has always been a major concern in the cloud environment because outsourcing leads to the new security issues. Privacy risks related to the job assignment are the dominating hurdles in the wide organizations like research, military and intelligence. To address this issue Garbled Role-Based Access Control (GRBAC) mechanism is being offered in this paper having key component that obliviously assign roles to the users through (RSA Oblivious-Transfer). The design of the proposed model has been guided by the Role-Based Access Control and Dynamic Separation of Duty. The proposed model also includes the flexible authentication based on the user’s context information. GRBAC offers fine-grained security while algorithm does not have to be secret from adversary. Security of this model is based on the adopted Garbled Function (fg\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$f_g$$\end{document}). The proposed model is best suited for the organizations where available roles cannot be revealed to the users and assigned roles are not to be leaked even to the server.
引用
收藏
页码:1153 / 1166
页数:13
相关论文
共 39 条
  • [1] Amounas F(2012)ECC encryption and decryption with a data sequence Appl Math Sci 6 5039-5047
  • [2] El Kinani E(2016)A trusted user-to-role and role-to-key access control scheme Soft Comput 20 1721-1733
  • [3] Chen HC(1996)Location-based authentication: grounding cyberspace for better security Comput Fraud Secur 2 12-16
  • [4] Denning DE(1985)A randomized protocol for signing contracts Commun ACM 28 637-647
  • [5] MacDoran PF(2009)A proof of security of Yaos protocol for two-party computation J Cryptol 22 161-188
  • [6] Even S(2012)Becan: a bandwidth-efficient cooperative authentication scheme for filtering injected false data in wireless sensor networks IEEE Trans Parallel Distrib Syst 23 32-43
  • [7] Goldreich O(2010)Privacy-aware role-based access control ACM Trans Inf Syst Secur TISSEC 13 24-592
  • [8] Lempel A(2005)How to exchange secrets with oblivious transfer IACR Cryptol ePrint Arch 2005 187-65
  • [9] Lindell Y(2016)Quantum cryptographic approach to decentralized access control and privacy preserving in cloud Asian J Inf Technol 15 578-1533
  • [10] Pinkas B(2016)Garbled computation in cloud Future Gener Comput Syst 62 54-2395