Attribute-based access control with hidden policies and hidden credentials

被引:71
|
作者
Frikken, Keith
Atallah, Mikhail
Li, Jiangtao
机构
[1] Purdue Univ, CERIAS, W Lafayette, IN 47907 USA
[2] Purdue Univ, Dept Comp Sci, W Lafayette, IN 47907 USA
基金
美国国家科学基金会;
关键词
electronic commerce-security; management of computing and information systems; security and protection; authentication; access control; trust negotiation; hidden credentials; privacy;
D O I
10.1109/TC.2006.158
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In an open environment such as the Internet, the decision to collaborate with a stranger (e.g., by granting access to a resource) is often based on the characteristics (rather than the identity) of the requester, via digital credentials: Access is granted if Alice's credentials satisfy Bob's access policy. The literature contains many scenarios in which it is desirable to carry out such trust negotiations in a privacy-preserving manner, i.e., so as minimize the disclosure of credentials and/or of access policies. Elegant solutions were, proposed for achieving various degrees of privacy-preservation through minimal disclosure. In this paper, we present protocols that protect both sensitive credentials and sensitive policies. That is, Alice gets the resource only if she satisfies the policy, Bob does not learn anything about Alice's credentials (not even whether Alice got access), and Alice learns neither Bob's policy structure nor which credentials caused her to gain access. Our protocols are efficient in terms of communication and in rounds of interaction.
引用
收藏
页码:1259 / 1270
页数:12
相关论文
共 50 条
  • [31] A blockchain based access control scheme with hidden policy and attribute
    Wu, Nannan
    Xu, Lei
    Zhu, Liehuang
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2023, 141 : 186 - 196
  • [32] Attribute-Based Access Control
    Hu, Vincent C.
    Kuhn, D. Richard
    Ferraiolo, David F.
    [J]. COMPUTER, 2015, 48 (02) : 85 - 88
  • [33] Hidden attribute-based signatures without anonymity revocation
    Li, Jin
    Kim, Kwangjo
    [J]. INFORMATION SCIENCES, 2010, 180 (09) : 1681 - 1689
  • [34] Secure Fine-grained Attribute-based Access Control with Hidden Policy for Electronic Health Record System
    Ji, Sai
    Jin, Xin
    Lai, Jin-Feng
    Shen, Jian
    [J]. JOURNAL OF INTERNET TECHNOLOGY, 2020, 21 (04): : 941 - 948
  • [35] An Ontological Template for Context Expressions in Attribute-based Access Control Policies
    Veloudis, Simeon
    Paraskakis, Iraklis
    Petsos, Christos
    Verginadis, Yiannis
    Patiniotakis, Ioannis
    Mentzas, Gregoris
    [J]. CLOSER: PROCEEDINGS OF THE 7TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING AND SERVICES SCIENCE, 2017, : 123 - 134
  • [36] Fast Distributed Evaluation of Stateful Attribute-Based Access Control Policies
    Thang Bui
    Stoller, Scott D.
    Sharma, Shikhar
    [J]. DATA AND APPLICATIONS SECURITY AND PRIVACY XXXI, DBSEC 2017, 2017, 10359 : 101 - 119
  • [37] Using attribute-based access control to enable attribute-based messaging
    Bobba, Rakesh
    Fatemieh, Omid
    Khan, Fariba
    Gunter, Carl A.
    Khurana, Himanshu
    [J]. 22ND ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2006, : 403 - +
  • [38] Efficient Attribute-Based Secure Data Sharing with Hidden Policies and Traceability in Mobile Health Networks
    Hahn, Changhee
    Kwon, Hyunsoo
    Hur, Junbeom
    [J]. MOBILE INFORMATION SYSTEMS, 2016, 2016
  • [39] Towards Attribute-Based Credentials in the Cloud
    Krenn, Stephan
    Lorunser, Thomas
    Salzer, Anja
    Striecks, Christoph
    [J]. CRYPTOLOGY AND NETWORK SECURITY (CANS 2017), 2018, 11261 : 179 - 202
  • [40] Improving Security in Ciphertext-Policy Attribute-Based Encryption with Hidden Access Policy and Testing
    Yin, Hongjian
    Zhang, Leyou
    Cui, Yilei
    [J]. KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2019, 13 (05): : 2768 - 2780