Cryptographic Enforcement of Access Control Policies in the Cloud: Implementation and Experimental Assessment

被引:0
|
作者
Berlato, Stefano [1 ,2 ]
Carbone, Roberto [2 ]
Ranise, Silvio [2 ,3 ]
机构
[1] Univ Genoa, DIBRIS, Genoa, Italy
[2] Fdn Bruno Kessler, Secur & Trust Res Unit, Trento, Italy
[3] Univ Trento, Dept Math, Trento, Italy
基金
欧盟地平线“2020”;
关键词
Cryptographic Access Control; Experimental Assessment; Honest but Curious Cloud Service Provider; STORAGE;
D O I
10.5220/0010608003700381
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
While organisations move their infrastructure to the cloud, honest but curious Cloud Service Providers (CSPs) threaten the confidentiality of cloud-hosted data. In this context, many researchers proposed Cryptographic Access Control (CAC) schemes to support data sharing among users while preventing CSPs from accessing sensitive data. However, the majority of these schemes focuses on high-level features only and cannot adapt to the multiple requirements arising in different scenarios. Moreover, (almost) no CAC scheme implementation is available for enforcement of authorisation policies in the cloud, and performance evaluation is often overlooked. To fill this gap, we propose the toolchain COERCIVE, short for CryptOgraphy killEd (the honest but) cuRious Cloud servIce proVidEr, which is composed of two tools: TradeOffBoard and CryptoAC. TradeOffBoard assists organisations in identifying the optimal CAC architecture for their scenario. CryptoAC enforces authorisation policies in the cloud by deploying the architecture selected with TradeOffBoard. In this paper, we describe the implementation of CryptoAC and conduct a thorough performance evaluation to demonstrate its scalability and efficiency with synthetic benchmarks.
引用
收藏
页码:370 / 381
页数:12
相关论文
共 50 条
  • [11] CRYPTOGRAPHIC IMPLEMENTATION OF A TREE HIERARCHY FOR ACCESS-CONTROL
    SANDHU, RS
    INFORMATION PROCESSING LETTERS, 1988, 27 (02) : 95 - 98
  • [12] A Framework for the Cryptographic Enforcement of Information Flow Policies
    Alderman, James
    Crampton, Jason
    Farley, Naomi
    PROCEEDINGS OF THE 22ND ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES (SACMAT'17), 2017, : 143 - 154
  • [13] A Dynamic Cryptographic Access Control Scheme in Cloud Storage Services
    Zhang, Rui
    Chen, PeiShuai
    2012 8TH INTERNATIONAL CONFERENCE ON COMPUTING AND NETWORKING TECHNOLOGY (ICCNT, INC, ICCIS AND ICMIC), 2012, : 50 - 55
  • [14] An Algebra for Composing Access Control Policies in Cloud
    Balamurugan, B.
    Mandadi, Akhil Reddy
    Mohan, Sahana
    Faatheima, Sherein
    INTERNATIONAL CONFERENCE ON INNOVATION INFORMATION IN COMPUTING TECHNOLOGIES, 2015, 2015,
  • [15] A CRYPTOGRAPHIC IMPLEMENTATION FOR DYNAMIC ACCESS-CONTROL IN A USER HIERARCHY
    TSAI, HM
    CHANG, CC
    COMPUTERS & SECURITY, 1995, 14 (02) : 159 - 166
  • [16] From Formal Access Control Policies to Runtime Enforcement Aspects
    Kallel, Slim
    Charfi, Anis
    Mezini, Mira
    Jmaiel, Mohamed
    Klose, Karl
    ENGINEERING SECURE SOFTWARE AND SYSTEMS, PROCEEDINGS, 2009, 5429 : 16 - +
  • [17] Automatic enforcement of access control policies among dynamic coalitions
    Atluri, V
    Warner, J
    DISTRIBUTED COMPUTING AND INTERNET TECHNOLOGY, PROCEEDINGS, 2004, 3347 : 369 - 378
  • [18] A Rigorous Framework for Specification, Analysis and Enforcement of Access Control Policies
    Margheri, Andrea
    Masi, Massimiliano
    Pugliese, Rosario
    Tiezzi, Francesco
    IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 2019, 45 (01) : 2 - 33
  • [19] Cryptographic Protocols for Enforcing Relationship-based Access Control Policies
    Pang, Jun
    Zhang, Yang
    39TH ANNUAL IEEE COMPUTERS, SOFTWARE AND APPLICATIONS CONFERENCE (COMPSAC 2015), VOL 2, 2015, : 484 - 493
  • [20] Towards Efficient Update of Access Control Policy for Cryptographic Cloud Storage
    Jiang, Weiyu
    Wang, Zhan
    Liu, Limin
    Gao, Neng
    INTERNATIONAL CONFERENCE ON SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, SECURECOMM 2014, PT II, 2015, 153 : 341 - 356