Achieving Secure Role-Based Access Control on Encrypted Data in Cloud Storage

被引:134
|
作者
Zhou, Lan [1 ]
Varadharajan, Vijay [1 ]
Hitchens, Michael [1 ]
机构
[1] Macquarie Univ, Dept Comp, Adv Cyber Secur Res Ctr, N Ryde, NSW 2109, Australia
关键词
Role-based access control; data storage; role-based encryption; cloud computing; architecture; KEY MANAGEMENT; EFFICIENT;
D O I
10.1109/TIFS.2013.2286456
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
With the rapid developments occurring in cloud computing and services, there has been a growing trend to use the cloud for large-scale data storage. This has raised the important security issue of how to control and prevent unauthorized access to data stored in the cloud. One well known access control model is the role-based access control (RBAC), which provides flexible controls and management by having two mappings, users to roles and roles to privileges on data objects. In this paper, we propose a role-based encryption (RBE) scheme that integrates the cryptographic techniques with RBAC. Our RBE scheme allows RBAC policies to be enforced for the encrypted data stored in public clouds. Based on the proposed scheme, we present a secure RBE-based hybrid cloud storage architecture that allows an organization to store data securely in a public cloud, while maintaining the sensitive information related to the organization's structure in a private cloud. We describe a practical implementation of the proposed RBE-based architecture and discuss the performance results. We demonstrate that users only need to keep a single key for decryption, and system operations are efficient regardless of the complexity of the role hierarchy and user membership in the system.
引用
收藏
页码:1947 / 1960
页数:14
相关论文
共 50 条
  • [41] CryptCloud+: Secure and Expressive Data Access Control for Cloud Storage
    Ning, Jianting
    Cao, Zhenfu
    Dong, Xiaolei
    Liang, Kaitai
    Wei, Lifei
    Choo, Kim-Kwang Raymond
    IEEE TRANSACTIONS ON SERVICES COMPUTING, 2021, 14 (01) : 111 - 124
  • [42] Provisioning trust-oriented role-based access control for maintaining data integrity in cloud
    Urvashi Rahul Saxena
    Taj Alam
    International Journal of System Assurance Engineering and Management, 2023, 14 (6) : 2559 - 2578
  • [43] Provisioning trust-oriented role-based access control for maintaining data integrity in cloud
    Saxena, Urvashi Rahul
    Alam, Taj
    INTERNATIONAL JOURNAL OF SYSTEM ASSURANCE ENGINEERING AND MANAGEMENT, 2023, 14 (06) : 2559 - 2578
  • [44] Index Generation and Secure Multi-User Access Control over an Encrypted Cloud Data
    Raghavendra, S.
    Meghana, K.
    Doddabasappa, P. A.
    Geeta, C. M.
    Buyya, Rajkumar
    Venugopal, K. R.
    Iyengar, S. S.
    Patnaik, L. M.
    TWELFTH INTERNATIONAL CONFERENCE ON COMMUNICATION NETWORKS, ICCN 2016 / TWELFTH INTERNATIONAL CONFERENCE ON DATA MINING AND WAREHOUSING, ICDMW 2016 / TWELFTH INTERNATIONAL CONFERENCE ON IMAGE AND SIGNAL PROCESSING, ICISP 2016, 2016, 89 : 293 - 300
  • [45] Role-based access control and the access control matrix
    Saunders, G
    Hitchens, M
    Varadharajan, V
    INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2003, 2836 : 145 - 157
  • [46] Role-Based Access Control and the Access Control Matrix
    Saunders, G.
    Hitchens, M.
    Varadharajan, V.
    2001, Association for Computing Machinery (35):
  • [47] Secure Cloud Storage System by Integrating Trust with Role Based Access Control and Cryptographic Algorithm
    Bhise, Avdhut Suryakant
    Latif, Patil M. Toushif
    TECHNO-SOCIETAL 2018: PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON ADVANCED TECHNOLOGIES FOR SOCIETAL APPLICATIONS - VOL 2, 2020, : 87 - 97
  • [48] Combining Data Owner-Side and Cloud-Side Access Control for Encrypted Cloud Storage
    Xue, Kaiping
    Chen, Weikeng
    Li, Wei
    Hong, Jianan
    Hong, Peilin
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2018, 13 (08) : 2062 - 2074
  • [49] A secure, constraint-aware role-based access control interoperation framework
    Baracaldo N.
    Masoumzadeh A.
    Joshi J.
    Proceedings - 2011 5th International Conference on Network and System Security, NSS 2011, 2011, : 200 - 207
  • [50] Secure Storage and Deletion Based on Blockchain for Cloud Data with Fine-grained Access Control
    Zhou Yousheng
    Chen Lujun
    JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2021, 43 (07) : 1856 - 1863