A Role-Based Encryption (RBE) Scheme for Securing Outsourced Cloud Data in a Multi-Organization Context

被引:3
|
作者
Sultan, Nazatul Haque [1 ]
Varadharajan, Vijay [2 ]
Zhou, Lan [3 ,4 ]
Barbhuiya, Ferdous Ahmed [1 ]
机构
[1] Indian Inst Informat Technol Guwahati, Dept Comp Sci & Engn, Gauhati 781015, Assam, India
[2] Univ Newcastle, Fac Engn & Built Environm, Dept Comp, Callaghan, NSW 2308, Australia
[3] Univ Newcastle, Adv Cyber Secur Engn Res Ctr, Callaghan, NSW 2308, Australia
[4] Amazon, Seattle, WA 98109 USA
关键词
Cloud computing; Organizations; Standards organizations; Encryption; Security; Access control; Data models; Data encryption; role-based encryption; cloud security; data outsourcing; user revocation; ATTRIBUTE-BASED ENCRYPTION; DATA ACCESS-CONTROL; IDENTITY-BASED ENCRYPTION; AUTHORITY; STORAGE; EFFICIENT; SIZE;
D O I
10.1109/TSC.2022.3194252
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Role-Based Encryption (RBE) is an emerging new technique that integrates role based access control (RBAC) model with encryption. RBE embeds RBAC access policies in encrypted data itself so that only users belonging to appropriate roles are able to decrypt and access the data. However, the existing RBE schemes have been focusing on the single-organization cloud storage system, where the stored data can be accessed by users of the same organization. This paper presents a novel RBE scheme with efficient user revocation for the multi-organization cloud storage system, where the data from multiple independent organizations are stored and can be accessed by the authorized users from any other organization. Additionally, an outsourced decryption mechanism is introduced which enables the users to delegate expensive cryptographic operations to the cloud, thereby reducing the overhead on the end-users. Security and performance analyses of the proposed scheme demonstrate that it is provably secure against Chosen Plaintext Attack and can be useful for practical applications due to its low computation overhead.
引用
收藏
页码:1647 / 1661
页数:15
相关论文
共 50 条
  • [1] Role-based access using partial homomorphic encryption for securing cloud data
    Saxena, Urvashi Rahul
    Alam, Taj
    [J]. INTERNATIONAL JOURNAL OF SYSTEM ASSURANCE ENGINEERING AND MANAGEMENT, 2023, 14 (03) : 950 - 966
  • [2] Role-based access using partial homomorphic encryption for securing cloud data
    Urvashi Rahul Saxena
    Taj Alam
    [J]. International Journal of System Assurance Engineering and Management, 2023, 14 : 950 - 966
  • [3] Securing medical data by role-based user policy with partially homomorphic encryption in AWS cloud
    Boomija, M. D.
    Raja, S. V. Kasmir
    [J]. SOFT COMPUTING, 2023, 27 (01) : 559 - 568
  • [4] Securing Organization's Data: A Role-Based Authorized Keyword Search Scheme With Efficient Decryption
    Sultan, Nazatul Haque
    Laurent, Maryline
    Varadharajan, Vijay
    [J]. IEEE TRANSACTIONS ON CLOUD COMPUTING, 2023, 11 (01) : 25 - 43
  • [5] REKS: Role-Based Encrypted Keyword Search With Enhanced Access Control for Outsourced Cloud Data
    Miao, Yinbin
    Li, Feng
    Jia, Xiaohua
    Wang, Huaxiong
    Liu, Ximeng
    Choo, Kim-Kwang Raymond
    Deng, Robert H.
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2024, 21 (04) : 3247 - 3261
  • [6] A Density-aware Data Encryption Scheme for Outsourced Databases in Cloud Computing
    Yoon, Min
    Jang, Miyoung
    Shin, Young-Sung
    Chang, Jae-Woo
    [J]. 2014 IEEE INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING AND COMMUNICATIONS, 2014 IEEE 6TH INTL SYMP ON CYBERSPACE SAFETY AND SECURITY, 2014 IEEE 11TH INTL CONF ON EMBEDDED SOFTWARE AND SYST (HPCC,CSS,ICESS), 2014, : 1097 - 1104
  • [7] Role based access control using identity and broadcast based encryption for securing cloud data
    Urvashi Rahul Saxena
    Taj Alam
    [J]. Journal of Computer Virology and Hacking Techniques, 2022, 18 : 171 - 182
  • [8] Role based access control using identity and broadcast based encryption for securing cloud data
    Saxena, Urvashi Rahul
    Alam, Taj
    [J]. JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2022, 18 (03) : 171 - 182
  • [9] Efficient Multi-keyword Ranked Search over Outsourced Cloud Data based on Homomorphic Encryption
    Nie, Mengxi
    Ran, Peng
    Yang, HaoMiao
    [J]. 2016 8TH INTERNATIONAL CONFERENCE ON COMPUTER AND AUTOMATION ENGINEERING (ICCAE 2016), 2016, 56
  • [10] Securing Data with Selective Encryption Based DAC Scheme for MANET
    Nithyapriya, J.
    Jothi, R. Anandha
    Palanisamy, V
    [J]. PROCEEDING OF THE INTERNATIONAL CONFERENCE ON COMPUTER NETWORKS, BIG DATA AND IOT (ICCBI-2018), 2020, 31 : 133 - 139