Attribute-Based Messaging: Access Control and Confidentiality

被引:15
|
作者
Bobba, Rakesh [1 ]
Fatemieh, Omid [1 ]
Khan, Fariba [1 ]
Khan, Arindam [1 ]
Gunter, Carl A. [1 ]
Khurana, Himanshu [1 ]
Prabhakaran, Manoj [1 ]
机构
[1] Univ Illinois, Informat Trust Inst, Urbana, IL 61801 USA
基金
美国国家科学基金会;
关键词
Design; Performance; Security; Attributes; messaging; attribute-based encryption; ENCRYPTION;
D O I
10.1145/1880022.1880025
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Attribute-Based Messaging (ABM) enables messages to be addressed using attributes of recipients rather than an explicit list of recipients. Such messaging offers benefits of efficiency, exclusiveness, and intensionality, but faces challenges in access control and confidentiality. In this article we explore an approach to intraenterprise ABM based on providing access control and confidentiality using information from the same attribute database exploited by the addressing scheme. We show how to address three key challenges. First, we demonstrate a manageable access control system based on attributes. Second, we demonstrate use of attribute-based encryption to provide end-to-end confidentiality. Third, we show that such a system can be efficient enough to support ABM for mid-size enterprises. Our implementation can dispatch confidential ABM messages approved by XACML policy review for an enterprise of at least 60,000 users with only seconds of latency.
引用
收藏
页数:35
相关论文
共 50 条
  • [21] Anonymity in Attribute-Based Access Control: Framework and Metric
    Zhang, Runnan
    Liu, Gang
    Kang, Hongzhaoning
    Wang, Quan
    Wan, Bo
    Luo, Nan
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2024, 21 (01) : 463 - 475
  • [22] On the Feasibility of Attribute-Based Access Control Policy Mining
    Chakraborty, Shuvra
    Sandhu, Ravi
    Krishnan, Ram
    2019 IEEE 20TH INTERNATIONAL CONFERENCE ON INFORMATION REUSE AND INTEGRATION FOR DATA SCIENCE (IRI 2019), 2019, : 245 - 252
  • [23] A New Attribute-Based Access Control Model for RDBMS
    Al-Saraireh, Jaafer
    Hassan, Majid
    CYBERNETICS AND INFORMATION TECHNOLOGIES, 2022, 22 (04) : 3 - 22
  • [24] Attribute-Based Secure Messaging in the Public Cloud
    Poh, Zhi Yuan
    Cui, Hui
    Deng, Robert H.
    Li, Yingjiu
    SYSTEMS APPROACH TO CYBER SECURITY, 2017, 15 : 86 - 96
  • [25] Automated trust negotiation in attribute-based access control
    Winsborough, WH
    Jacobs, J
    DARPA INFORMATION SURVIVABILITY CONFERENCE AND EXPOSITION, VOL II, PROCEEDINGS, 2003, : 252 - 257
  • [26] Attribute-based Access Control for ICN Naming Scheme
    Li, Bing
    Verleker, Ashwin Prabhu
    Huang, Dijiang
    Wang, Zhijie
    Zhu, Yan
    2014 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2014, : 391 - 399
  • [27] Attribute-based access control policy specification language
    Ye, Chunxiao
    Zhong, Jiang
    Feng, Yong
    Journal of Southeast University (English Edition), 2008, 24 (03) : 260 - 263
  • [28] A Time and Mutable Attribute-Based Access Control Model
    Yang, Ran
    Lin, Chuang
    Feng, Fujun
    JOURNAL OF COMPUTERS, 2009, 4 (06) : 510 - 518
  • [29] Attribute-Based Access Control for Layered Grid Resources
    Lang, Bo
    Li, Hangyu
    Ni, Wenting
    COMMUNICATION AND NETWORKING, PT II, 2010, 120 : 31 - 40
  • [30] Efficient Attribute-Based Comparable Data Access Control
    Wang, Zhijie
    Huang, Dijiang
    Zhu, Yan
    Li, Bing
    Chung, Chun-Jen
    IEEE TRANSACTIONS ON COMPUTERS, 2015, 64 (12) : 3430 - 3443