Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3201595.3201602acmconferencesArticle/Chapter ViewAbstractPublication PagessccConference Proceedingsconference-collections
research-article

Cryptographically Enforced Orthogonal Access Control at Scale

Published: 23 May 2018 Publication History

Abstract

We propose a new approach to cryptographically enforced data access controls that uses public key cryptography to secure large numbers of documents with arbitrarily large numbers of authorized users. Our approach uses a proxy re-encryption (PRE) scheme to handle the problems typical of public key cryptography including key management, rotation, and revocation, in a highly scalable way, while providing end-to-end encryption and provable access. In this paper we describe a system based on this approach. We call it an orthogonal access control system, because it allows the decision about the groups to which to encrypt a piece of data to be made independently and asynchronously from the decision about who belongs to a group and can therefore decrypt the data. We define specific requirements for a PRE scheme needed to support the system, and we provide a specific instance that meets these requirements. We detail the algorithms that make up the scheme, and we present an enhancement that provides better revocability of keys.

References

[1]
G. Ateniese, K. Fu, M. Green, and S. Hohenberger. 2006. Improved Proxy Re-encryption Schemes with Applications to Secure Distributed Storage. ACM Transactions on Information and System Security (TISSEC) Vol. 9, 1 (2006), 1--30.
[2]
M. Blaze, G. Bleumer, and M. Strauss. 1998. Divertible protocols and atomic proxy cryptography EUROCRYPT. Springer-Verlag, 127--144.
[3]
Y. Cai and X. Liu. 2014. A Multi-use CCA-secure Proxy Re-encryption Scheme. IEEE 12th International Conference on Dependable, Autonomic, and Secure Computing Vol. 7 (2014).
[4]
R. Canetti and S. Hohenberger. 2007. Chosen-ciphertext Secure Proxy Re-encryption. In Proceedings of the 14th ACM Conference on Computer and Communications Security (CCS). ACM, New York, NY, USA, 185--194.
[5]
R. Chow, P. Golle, M. Jakobsson, E. Shi, J. Staddon, R. Masuoka, and J. Molina. 2009. Controlling data in the cloud: outsourcing computation without outsourcing control. In Proceedings of the ACM Workshop on Cloud Computing Security. ACM, 85--90.
[6]
Q. Liu, G. Wang, and J. Wu. 2014. Time-based proxy re- encryption scheme for secure data sharing in a cloud environment. In Information Sciences, Vol. Vol. 258. Elsevier, 355--370.
[7]
Z. Qin, H. Xiong, S. Wu, and J. Batamuliza. {n. d.}. A Survey of Proxy Re-Encryption for Secure Data Sharing in Cloud Computing IEEE Transactions on Services Computing, Vol. Vol. PP.
[8]
G. Wang, Q. Liu, and J. Wu. 2010. Hierarchical attribute-based encryption for fine-grained access control in cloud storage services. In Proceedings of the ACM Conference on Computer and Communications Security. IEEE, 735--737.
[9]
H. Wang and Z. Cao. 2009. A Fully Secure Unidirectional and Multi-use Proxy Re-encryption Scheme. ACM CCS Poster Session (2009).
[10]
H. Xiong, X. Zhang, D. Yao, and X. Wu. 2012. Towards End-to-End Secure Content Storage and Delivery with Public Cloud Proceedings of the second ACM conference on Data and Application Security and Privacy (CODASPY'12). 257--266.
[11]
L. Xu, X. Wu, and X. Zhang. 2012. CL-PRE: A certificateless proxy re-encryption scheme for secure data sharing with public cloud. In Proceedings of the 7th ACM Symposium on Information, Computer and Communications Security. ACM, New York, NY, USA, 87--88.
[12]
S. Yu, C. Wang, K. Ren, and W. Lou. {n. d.}. Achieving secure, scalable, and fine-grained data access control in cloud computing Proceedings of the IEEE International Conference on Computer Communications.
[13]
J. Zhang and X. A. Wang. 2013. On the Security of Two Multi-use CCA-secure Proxy Re-encryption Schemes. Int. J. Intelligent Information and Database Systems Vol. 7, 5 (2013), 422--440.

Cited By

View all
  • (2024)Proxy Re-Encryption for Enhanced Data Security in Healthcare: A Practical ImplementationProceedings of the 19th International Conference on Availability, Reliability and Security10.1145/3664476.3670874(1-11)Online publication date: 30-Jul-2024

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
SCC '18: Proceedings of the 6th International Workshop on Security in Cloud Computing
May 2018
71 pages
ISBN:9781450357593
DOI:10.1145/3201595
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 23 May 2018

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. cryptographic access control
  2. key management
  3. orthogonal access control
  4. pairing-based cryptography
  5. proxy re-encryption

Qualifiers

  • Research-article

Conference

ASIA CCS '18
Sponsor:

Acceptance Rates

SCC '18 Paper Acceptance Rate 6 of 17 submissions, 35%;
Overall Acceptance Rate 64 of 159 submissions, 40%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)17
  • Downloads (Last 6 weeks)0
Reflects downloads up to 16 Oct 2024

Other Metrics

Citations

Cited By

View all
  • (2024)Proxy Re-Encryption for Enhanced Data Security in Healthcare: A Practical ImplementationProceedings of the 19th International Conference on Availability, Reliability and Security10.1145/3664476.3670874(1-11)Online publication date: 30-Jul-2024

View Options

Get Access

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media