An approach of implementing core role based access control model using attribute based encryption

Yong Wang*, Xuemin Tong, Ming Li, Jingfeng Xue, Ji Zhang, Zhenyan Liu, Dan Hao, Ning Wang

*此作品的通讯作者

科研成果: 书/报告/会议事项章节会议稿件同行评审

摘要

Cloud Storage, which provides cost-efficient and scalable storage services, has emerged as a hot paradigm today. However, in the resource outsourcing environment such as cloud storage, the resource owner is separated from the resource superintendent, and the authorization decision is made by the untrusted outsourcing server, as a result of which the correct enforcement of the access control policies cannot be ensured. To keep the data confidential against unauthorized parties, cryptographic access control must be applied. In this paper, we present a new cryptographic approach of implementing Core Role based Access Control Model named ABE-RBAC. We use Attribute Based Encryption (ABE) to manage users, roles, permissions, as well as user role assignments (URA) and role permission assignments (RPA), which enables the resource owner to fully control the authorization management, and ensures the proper enforcement of access control polices. This is the first cryptographic core RBAC enforcement that completely conform to the standard GB/T 25062-2010.

源语言英语
主期刊名Trusted Computing and Information Security - 11th Chinese Conference, CTCIS 2017, Proceedings
编辑Fei Yan, Ming Xu, Shaojing Fu, Zheng Qin
出版商Springer Verlag
397-408
页数12
ISBN(印刷版)9789811070792
DOI
出版状态已出版 - 2017
活动11th Chinese Conference on Trusted Computing and Information Security, CTCIS 2017 - Changsha, 中国
期限: 14 9月 201717 9月 2017

出版系列

姓名Communications in Computer and Information Science
704
ISSN(印刷版)1865-0929

会议

会议11th Chinese Conference on Trusted Computing and Information Security, CTCIS 2017
国家/地区中国
Changsha
时期14/09/1717/09/17

指纹

探究 'An approach of implementing core role based access control model using attribute based encryption' 的科研主题。它们共同构成独一无二的指纹。

引用此