Cryptographic Enforcement of Access Control Policies in the Cloud: Implementation and Experimental Assessment

被引:0
|
作者
Berlato, Stefano [1 ,2 ]
Carbone, Roberto [2 ]
Ranise, Silvio [2 ,3 ]
机构
[1] Univ Genoa, DIBRIS, Genoa, Italy
[2] Fdn Bruno Kessler, Secur & Trust Res Unit, Trento, Italy
[3] Univ Trento, Dept Math, Trento, Italy
基金
欧盟地平线“2020”;
关键词
Cryptographic Access Control; Experimental Assessment; Honest but Curious Cloud Service Provider; STORAGE;
D O I
10.5220/0010608003700381
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
While organisations move their infrastructure to the cloud, honest but curious Cloud Service Providers (CSPs) threaten the confidentiality of cloud-hosted data. In this context, many researchers proposed Cryptographic Access Control (CAC) schemes to support data sharing among users while preventing CSPs from accessing sensitive data. However, the majority of these schemes focuses on high-level features only and cannot adapt to the multiple requirements arising in different scenarios. Moreover, (almost) no CAC scheme implementation is available for enforcement of authorisation policies in the cloud, and performance evaluation is often overlooked. To fill this gap, we propose the toolchain COERCIVE, short for CryptOgraphy killEd (the honest but) cuRious Cloud servIce proVidEr, which is composed of two tools: TradeOffBoard and CryptoAC. TradeOffBoard assists organisations in identifying the optimal CAC architecture for their scenario. CryptoAC enforces authorisation policies in the cloud by deploying the architecture selected with TradeOffBoard. In this paper, we describe the implementation of CryptoAC and conduct a thorough performance evaluation to demonstrate its scalability and efficiency with synthetic benchmarks.
引用
收藏
页码:370 / 381
页数:12
相关论文
共 50 条
  • [1] Cryptographic Enforcement of Access Control Policies: Models, Applications, and Future Directions
    Masucci, Barbara
    PROCEEDINGS OF THE 29TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES, SACMAT 2024, 2024, : 3 - 4
  • [3] Assisted Authoring, Analysis and Enforcement of Access Control Policies in the Cloud
    Morelli, Umberto
    Ranise, Silvio
    ICT SYSTEMS SECURITY AND PRIVACY PROTECTION, SEC 2017, 2017, 502 : 296 - 309
  • [4] End-to-End Protection of IoT Communications Through Cryptographic Enforcement of Access Control Policies
    Berlato, Stefano
    Morelli, Umberto
    Carbone, Roberto
    Ranise, Silvio
    DATA AND APPLICATIONS SECURITY AND PRIVACY XXXVI, DBSEC 2022, 2022, 13383 : 236 - 255
  • [5] Cryptographic Enforcement of Role-Based Access Control
    Crampton, Jason
    FORMAL ASPECTS OF SECURITY AND TRUST, 2011, 6561 : 191 - 205
  • [6] Verification and enforcement of access control policies
    Antonio Cau
    Helge Janicke
    Ben Moszkowski
    Formal Methods in System Design, 2013, 43 : 450 - 492
  • [7] Verification and enforcement of access control policies
    Cau, Antonio
    Janicke, Helge
    Moszkowski, Ben
    FORMAL METHODS IN SYSTEM DESIGN, 2013, 43 (03) : 450 - 492
  • [8] Formal Modelling and Automated Trade-off Analysis of Enforcement Architectures for Cryptographic Access Control in the Cloud
    Berlato, Stefano
    Carbone, Roberto
    Lee, Adam J.
    Ranise, Silvio
    ACM TRANSACTIONS ON PRIVACY AND SECURITY, 2022, 25 (01)
  • [9] Fine Grained Security in Cloud with Cryptographic Access Control
    Manikonda, Aparna
    Nalini, N
    2021 International Conference on Advance Computing and Innovative Technologies in Engineering, ICACITE 2021, 2021, : 154 - 157
  • [10] Cryptographic implementation for dynamic access control in a user hierarchy
    Tsai, Hui-Min
    Chang, Chin-Chen
    Computers and Security, 1995, 14 (02): : 159 - 166