An efficient privacy-enhanced attribute-based access control mechanism

被引:61
|
作者
Xu, Yang [1 ,2 ]
Zeng, Quanrun [2 ]
Wang, Guojun [3 ]
Zhang, Cheng [2 ]
Ren, Ju [2 ]
Zhang, Yaoxue [2 ]
机构
[1] Hunan Univ, Coll Comp Sci & Elect Engn, Changsha 410082, Hunan, Peoples R China
[2] Cent South Univ, Sch Comp Sci & Engn, Changsha 410083, Hunan, Peoples R China
[3] Guangzhou Univ, Sch Comp Sci & Technol, Guangzhou 510006, Guangdong, Peoples R China
来源
基金
中国国家自然科学基金;
关键词
attribute-based access control; binary search tree; digital signature; privacy; security;
D O I
10.1002/cpe.5556
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Owing to the rapid progress of network researching, attribute-based access control (ABAC) has attracted more and more attention due to its appreciable expressiveness, flexibility, and scalability. Unfortunately, collecting user attributes is necessary to complete the standard ABAC decision process, which increases the risk of privacy disclosure. This problem increases public doubts about ABAC and hinders its popularization. In this paper, a privacy-protected and efficient attribute-based access control (EPABAC) scheme is proposed to prevent the privacy leakage of access subject in the decision-making process of ABAC by introducing a novel hash-based binary search tree. The analyses and experimental evaluations show that the EPABAC achieves user privacy protection in the decision-making process with acceptable additional computing overhead.
引用
收藏
页数:10
相关论文
共 50 条
  • [1] A privacy-enhanced attribute-based access control system
    Kolter, Jan
    Schillinger, Rolf
    Pernul, Guenther
    [J]. DATA AND APPLICATIONS SECURITY XXI, PROCEEDINGS, 2007, 4602 : 129 - +
  • [2] Privacy-enhanced attribute-based private information retrieval
    Lai, Jianchang
    Mu, Yi
    Guo, Fuchun
    Jiang, Peng
    Susilo, Willy
    [J]. INFORMATION SCIENCES, 2018, 454 : 275 - 291
  • [3] A Privacy-Enhanced Access Control Model
    Xu, Fei
    He, Jingsha
    Wu, Xu
    Xu, Jing
    [J]. NSWCTC 2009: INTERNATIONAL CONFERENCE ON NETWORKS SECURITY, WIRELESS COMMUNICATIONS AND TRUSTED COMPUTING, VOL 2, PROCEEDINGS, 2009, : 703 - +
  • [4] Attribute-Based Privacy-Friendly Access Control with Context
    Put, Andreas
    De Decker, Bart
    [J]. E-BUSINESS AND TELECOMMUNICATIONS (ICETE 2016), 2017, 764 : 291 - 315
  • [5] A Privacy-Preserving Attribute-Based Access Control Scheme
    Xu, Yang
    Zeng, Quanrun
    Wang, Guojun
    Zhang, Cheng
    Ren, Ju
    Zhang, Yaoxue
    [J]. SECURITY, PRIVACY, AND ANONYMITY IN COMPUTATION, COMMUNICATION, AND STORAGE (SPACCS 2018), 2018, 11342 : 361 - 370
  • [6] Efficient Attribute-Based Comparable Data Access Control
    Wang, Zhijie
    Huang, Dijiang
    Zhu, Yan
    Li, Bing
    Chung, Chun-Jen
    [J]. IEEE TRANSACTIONS ON COMPUTERS, 2015, 64 (12) : 3430 - 3443
  • [7] Security and Privacy in Smart Health: Efficient Policy-Hiding Attribute-Based Access Control
    Zhang, Yinghui
    Zheng, Dong
    Deng, Robert H.
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2018, 5 (03): : 2130 - 2145
  • [8] Towards a Fine-Grained Privacy-Enabled Attribute-Based Access Control Mechanism
    Que Nguyet Tran Thi
    Tran Khanh Dang
    [J]. TRANSACTIONS ON LARGE-SCALE DATA- AND KNOWLEDGECENTERED SYSTEMS XXXVI: SPECIAL ISSUE ON DATA AND SECURITY ENGINEERING, 2018, 10720 : 52 - 72
  • [9] A Blockchain-Based Medical Data Sharing Mechanism with Attribute-Based Access Control and Privacy Protection
    Chen, Yingwen
    Meng, Linghang
    Zhou, Huan
    Xue, Guangtao
    [J]. WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2021, 2021
  • [10] Attribute-Based Access Control
    Hu, Vincent C.
    Kuhn, D. Richard
    Ferraiolo, David F.
    [J]. COMPUTER, 2015, 48 (02) : 85 - 88