An approach of implementing core role based access control model using attribute based encryption

Yong Wang*, Xuemin Tong, Ming Li, Jingfeng Xue, Ji Zhang, Zhenyan Liu, Dan Hao, Ning Wang

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Cloud Storage, which provides cost-efficient and scalable storage services, has emerged as a hot paradigm today. However, in the resource outsourcing environment such as cloud storage, the resource owner is separated from the resource superintendent, and the authorization decision is made by the untrusted outsourcing server, as a result of which the correct enforcement of the access control policies cannot be ensured. To keep the data confidential against unauthorized parties, cryptographic access control must be applied. In this paper, we present a new cryptographic approach of implementing Core Role based Access Control Model named ABE-RBAC. We use Attribute Based Encryption (ABE) to manage users, roles, permissions, as well as user role assignments (URA) and role permission assignments (RPA), which enables the resource owner to fully control the authorization management, and ensures the proper enforcement of access control polices. This is the first cryptographic core RBAC enforcement that completely conform to the standard GB/T 25062-2010.

Original languageEnglish
Title of host publicationTrusted Computing and Information Security - 11th Chinese Conference, CTCIS 2017, Proceedings
EditorsFei Yan, Ming Xu, Shaojing Fu, Zheng Qin
PublisherSpringer Verlag
Pages397-408
Number of pages12
ISBN (Print)9789811070792
DOIs
Publication statusPublished - 2017
Event11th Chinese Conference on Trusted Computing and Information Security, CTCIS 2017 - Changsha, China
Duration: 14 Sept 201717 Sept 2017

Publication series

NameCommunications in Computer and Information Science
Volume704
ISSN (Print)1865-0929

Conference

Conference11th Chinese Conference on Trusted Computing and Information Security, CTCIS 2017
Country/TerritoryChina
CityChangsha
Period14/09/1717/09/17

Keywords

  • ABE
  • Cloud storage
  • Cryptographic access control
  • GB/T 25062-2010
  • RBAC

Fingerprint

Dive into the research topics of 'An approach of implementing core role based access control model using attribute based encryption'. Together they form a unique fingerprint.

Cite this