Privacy-preserving attribute-based access control for grid computing

被引:9
|
作者
Park, Sang M. [1 ]
Chung, Soon M. [1 ]
机构
[1] Wright State Univ, Dept Comp Sci & Engn, Dayton, OH 45435 USA
关键词
grid; attribute-based access control; privacy protection; Shibboleth; XACML;
D O I
10.1504/IJGUC.2014.065372
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In Attribute- Based Access Control (ABAC), access is granted based on the attributes of the requesting user. ABAC is a highly flexible and scalable access control scheme which can deal with diverse security requirements in a grid computing environment. However, in ABAC the user attributes published by the identity providers for authorisation decision may cause some privacy violation. We developed an attribute release control mechanism to publish an optimal set of user attributes that are essential to access a desired resource (or service), while exposing the least amount of sensitive user information. To facilitate the selection of an optimal set of user attributes, we also developed a Web service, named Security Policy Publication Service (SPPS), which retrieves the access condition from the access control policies in eXtensible Access Control Markup Language (XACML) and converts it into a Disjunctive Normal Form (DNF) of user attributes. For the implementation of our privacy- preserving ABAC, we used the Globus Toolkit and modified the Shibboleth Identity Provider and GridShib. Our performance analysis shows that the overhead of the proposed system is very small.
引用
收藏
页码:286 / 296
页数:11
相关论文
共 50 条
  • [1] A Privacy-Preserving Attribute-Based Access Control Scheme
    Xu, Yang
    Zeng, Quanrun
    Wang, Guojun
    Zhang, Cheng
    Ren, Ju
    Zhang, Yaoxue
    [J]. SECURITY, PRIVACY, AND ANONYMITY IN COMPUTATION, COMMUNICATION, AND STORAGE (SPACCS 2018), 2018, 11342 : 361 - 370
  • [2] Constraints Validation in Privacy-Preserving Attribute-Based Access Control
    Oleshchuk, Vladimir
    [J]. 2015 IEEE 8TH INTERNATIONAL CONFERENCE ON INTELLIGENT DATA ACQUISITION AND ADVANCED COMPUTING SYSTEMS: TECHNOLOGY AND APPLICATIONS (IDAACS), VOLS 1-2, 2015, : 429 - 431
  • [3] A Privacy-Preserving Attribute-Based Authentication Scheme for Cloud Computing
    Huang, Chanying
    Wei, Songjie
    Yan, Kedong
    Zhang, Gongxuan
    Fu, Anmin
    [J]. 2018 ASIA-PACIFIC SIGNAL AND INFORMATION PROCESSING ASSOCIATION ANNUAL SUMMIT AND CONFERENCE (APSIPA ASC), 2018, : 260 - 265
  • [4] Privacy-Preserving Attribute Distribution Mechanism for Access Control in a Grid
    Park, Sang M.
    Chung, Soon M.
    [J]. ICTAI: 2009 21ST INTERNATIONAL CONFERENCE ON TOOLS WITH ARTIFICIAL INTELLIGENCE, 2009, : 308 - 313
  • [5] Attribute-Based encryption mechanism with Privacy-Preserving approach in cloud computing
    Yogesh Deshmukh, Jyoti
    Yadav, S.K.
    Bhandari, G.M.
    [J]. Materials Today: Proceedings, 2023, 80 : 1786 - 1791
  • [6] Privacy-Preserving Attribute-Based Encryption Supporting Expressive Access Structures
    Zhang, Liangxuan
    Li, Hui
    Zhang, Yinghui
    Khan, Fawad
    [J]. 2017 IEEE SECOND INTERNATIONAL CONFERENCE ON DATA SCIENCE IN CYBERSPACE (DSC), 2017, : 475 - 482
  • [7] Privacy-Preserving Auditing for Attribute-Based Credentials
    Camenisch, Jan
    Lehmann, Anja
    Neven, Gregory
    Rial, Alfredo
    [J]. COMPUTER SECURITY - ESORICS 2014, PT II, 2014, 8713 : 109 - 127
  • [8] Attribute-Based Privacy-Preserving Data Sharing for Dynamic Groups in Cloud Computing
    Xiong, Hu
    Zhang, Hao
    Sun, Jianfei
    [J]. IEEE SYSTEMS JOURNAL, 2019, 13 (03): : 2739 - 2750
  • [9] PriExpress: Privacy-Preserving Express Delivery with Fine-Grained Attribute-Based Access Control
    Li, Tao
    Zhang, Rui
    Zhang, Yanchao
    [J]. 2016 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2016, : 333 - 341
  • [10] Concepts and languages for privacy-preserving attribute-based authentication
    Camenisch, Jan
    Dubovitskaya, Maria
    Enderlein, Robert R.
    Lehmann, Anja
    Neven, Gregory
    Paquin, Christian
    Preiss, Franz-Stefan
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2014, 19 (01) : 25 - 44