Cryptographic Enforcement of Access Control Policies in the Cloud: Implementation and Experimental Assessment

被引:0
|
作者
Berlato, Stefano [1 ,2 ]
Carbone, Roberto [2 ]
Ranise, Silvio [2 ,3 ]
机构
[1] Univ Genoa, DIBRIS, Genoa, Italy
[2] Fdn Bruno Kessler, Secur & Trust Res Unit, Trento, Italy
[3] Univ Trento, Dept Math, Trento, Italy
基金
欧盟地平线“2020”;
关键词
Cryptographic Access Control; Experimental Assessment; Honest but Curious Cloud Service Provider; STORAGE;
D O I
10.5220/0010608003700381
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
While organisations move their infrastructure to the cloud, honest but curious Cloud Service Providers (CSPs) threaten the confidentiality of cloud-hosted data. In this context, many researchers proposed Cryptographic Access Control (CAC) schemes to support data sharing among users while preventing CSPs from accessing sensitive data. However, the majority of these schemes focuses on high-level features only and cannot adapt to the multiple requirements arising in different scenarios. Moreover, (almost) no CAC scheme implementation is available for enforcement of authorisation policies in the cloud, and performance evaluation is often overlooked. To fill this gap, we propose the toolchain COERCIVE, short for CryptOgraphy killEd (the honest but) cuRious Cloud servIce proVidEr, which is composed of two tools: TradeOffBoard and CryptoAC. TradeOffBoard assists organisations in identifying the optimal CAC architecture for their scenario. CryptoAC enforces authorisation policies in the cloud by deploying the architecture selected with TradeOffBoard. In this paper, we describe the implementation of CryptoAC and conduct a thorough performance evaluation to demonstrate its scalability and efficiency with synthetic benchmarks.
引用
收藏
页码:370 / 381
页数:12
相关论文
共 50 条
  • [21] Hybrid Cryptographic Access Control for Cloud-Based EHR Systems
    Premarathne, Uthpala
    Abuadbba, Alsharif
    Alabdulatif, Abdulatif
    Khalil, Ibrahim
    Tari, Zahir
    Zomaya, Albert
    Buyya, Rajkumar
    IEEE CLOUD COMPUTING, 2016, 3 (04): : 58 - 64
  • [22] Uniform application-level access control enforcement of organizationwide policies
    Verhanneman, T
    Piessens, F
    De Win, B
    Joosen, W
    21st Annual Computer Security Applications Conference, Proceedings, 2005, : 389 - 398
  • [23] Efficient IRM enforcement of history-based access control policies
    Yan, Fei
    Fong, Philip W. L.
    Proceedings of the 4th International Symposium on ACM Symposium on Information, Computer and Communications Security, ASIACCS'09, 2009, : 35 - 46
  • [24] Securing programs via modeling and efficient enforcement of access control policies
    Parsa, Saeed
    Damanafshan, Morteza
    9TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY: TOWARD NETWORK INNOVATION BEYOND EVOLUTION, VOLS 1-3, 2007, : 2118 - +
  • [25] Research on key techniques of cryptographic access control and properties optimisation in cloud storage
    Zhu S.
    Jiang L.
    Zhou Z.
    Zhu, Shidong (zhusd@sie.edu.cn), 2018, Inderscience Publishers, 29, route de Pre-Bois, Case Postale 856, CH-1215 Geneva 15, CH-1215, Switzerland (17) : 257 - 274
  • [26] Enabling Constraints and Dynamic Preventive Access Control Policy Enforcement in the Cloud
    Fugkeaw, Somchart
    Sato, Hiroyuki
    PROCEEDINGS 10TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY ARES 2015, 2015, : 576 - 583
  • [27] Access control enforcement on query-aware encrypted cloud databases
    Ferretti, Luca
    Colajanni, Michele
    Marchetti, Mirco
    2013 IEEE FIFTH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING TECHNOLOGY AND SCIENCE (CLOUDCOM), VOL 2, 2013, : 717 - 722
  • [28] On the Practicality of Cryptographically Enforcing Dynamic Access Control Policies in the Cloud
    Garrison, William C., III
    Shull, Adam
    Myers, Steven
    Lee, Adam J.
    2016 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2016, : 819 - 838
  • [29] Using Semantics for Automatic Enforcement of Access Control Policies among Dynamic Coalitions
    Warner, Janice
    Atluri, Vijayalakshmi
    Mukkamala, Ravi
    Vaidya, Jaideep
    SACMAT'07: PROCEEDINGS OF THE 12TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES, 2007, : 235 - 244
  • [30] Seamless secure development of systems: From Modeling to enforcement of access control policies
    Parsa, Saeed
    Damanafshan, Morteza
    2007 IEEE/ACS INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS AND APPLICATIONS, VOLS 1 AND 2, 2007, : 799 - +