TY - GEN
T1 - An approach of implementing core role based access control model using attribute based encryption
AU - Wang, Yong
AU - Tong, Xuemin
AU - Li, Ming
AU - Xue, Jingfeng
AU - Zhang, Ji
AU - Liu, Zhenyan
AU - Hao, Dan
AU - Wang, Ning
N1 - Publisher Copyright:
© Springer Nature Singapore Pte Ltd. 2017.
PY - 2017
Y1 - 2017
N2 - Cloud Storage, which provides cost-efficient and scalable storage services, has emerged as a hot paradigm today. However, in the resource outsourcing environment such as cloud storage, the resource owner is separated from the resource superintendent, and the authorization decision is made by the untrusted outsourcing server, as a result of which the correct enforcement of the access control policies cannot be ensured. To keep the data confidential against unauthorized parties, cryptographic access control must be applied. In this paper, we present a new cryptographic approach of implementing Core Role based Access Control Model named ABE-RBAC. We use Attribute Based Encryption (ABE) to manage users, roles, permissions, as well as user role assignments (URA) and role permission assignments (RPA), which enables the resource owner to fully control the authorization management, and ensures the proper enforcement of access control polices. This is the first cryptographic core RBAC enforcement that completely conform to the standard GB/T 25062-2010.
AB - Cloud Storage, which provides cost-efficient and scalable storage services, has emerged as a hot paradigm today. However, in the resource outsourcing environment such as cloud storage, the resource owner is separated from the resource superintendent, and the authorization decision is made by the untrusted outsourcing server, as a result of which the correct enforcement of the access control policies cannot be ensured. To keep the data confidential against unauthorized parties, cryptographic access control must be applied. In this paper, we present a new cryptographic approach of implementing Core Role based Access Control Model named ABE-RBAC. We use Attribute Based Encryption (ABE) to manage users, roles, permissions, as well as user role assignments (URA) and role permission assignments (RPA), which enables the resource owner to fully control the authorization management, and ensures the proper enforcement of access control polices. This is the first cryptographic core RBAC enforcement that completely conform to the standard GB/T 25062-2010.
KW - ABE
KW - Cloud storage
KW - Cryptographic access control
KW - GB/T 25062-2010
KW - RBAC
UR - http://www.scopus.com/inward/record.url?scp=85036462461&partnerID=8YFLogxK
U2 - 10.1007/978-981-10-7080-8_27
DO - 10.1007/978-981-10-7080-8_27
M3 - Conference contribution
AN - SCOPUS:85036462461
SN - 9789811070792
T3 - Communications in Computer and Information Science
SP - 397
EP - 408
BT - Trusted Computing and Information Security - 11th Chinese Conference, CTCIS 2017, Proceedings
A2 - Yan, Fei
A2 - Xu, Ming
A2 - Fu, Shaojing
A2 - Qin, Zheng
PB - Springer Verlag
T2 - 11th Chinese Conference on Trusted Computing and Information Security, CTCIS 2017
Y2 - 14 September 2017 through 17 September 2017
ER -