Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/1755688.1755728acmconferencesArticle/Chapter ViewAbstractPublication Pagesasia-ccsConference Proceedingsconference-collections
research-article

Cryptographic role-based security mechanisms based on role-key hierarchy

Published: 13 April 2010 Publication History

Abstract

Even though role-based access control (RBAC) can tremendously help us minimize the complexity in administering users, it is still needed to realize the notion of roles at the resource level. In this paper, we propose a practical cryptographic RBAC model, called role-key hierarchy model, to support various security features including signature and encryption based on role-key hierarchy. With the help of rich algebraic structure of elliptic curve, we introduce a role-based cryptosystem construction to verify the rationality and validity of our proposed model. Also, a proof-of-concept prototype implementation and performance evaluation are discussed to demonstrate the feasibility and efficiency of our mechanisms.

References

[1]
E. Bertino, N. Shang, and S. Wagstaff. An efficient time-bound hierarchical key management scheme for secure broadcasting. IEEE Trans. on Dependable and Secure Computing, 5(2):65--70, 2008.
[2]
D. Boneh and M. Franklin. Identity-based encryption from the weil pairing. In Advances in Cryptology (CRYPTO'01), volume 2139 of LNCS, pages 213--229, 2001.
[3]
D. Boneh and M. Hamburg. Generalized identity based and broadcast encryption schemes. In ASIACRYPT, pages 455--470, 2008.
[4]
D. Boneh and H. Shacham. Group signatures with verifier-local revocation. In ACM Conference on Computer and Communications Security, pages 168--177, 2004.
[5]
B. W. D. Boneh, C. Gentry. Collusion resistant broadcast encryption with short ciphertexts and private keys. In Advances in Cryptology (CRYPTO'2005), volume 3621 of LNCS, pages 258--275, 2005.
[6]
E. Goh, H. Shacham, N. Modadugu, and D. Boneh. Sirius: Securing remote untrusted storage. In Proceedings of the Internet Society (ISOC) Network and Distributed Systems Security (NDSS) Symposium, pages 131--145, 2003.
[7]
J. Jing and G.-J. Ahn. Role-based access management for ad-hoc collaborative sharing. In Proc. of 11th Symposium on Access Control Models and Technologies (SACMAT), pages 200--209, 2006.
[8]
X. Liang, Z. Cao, H. Lin, and J. Shao. Attribute based proxy re-encryption with delegating capabilities. In ASIACCS, pages 276--286, 2009.
[9]
R. S. Q. Mahesh Kallahalla, Erik Riedel and K. Fu. Plutus: Scalable secure file sharing on untrusted storage. In Proceedings of the 2nd USENIX Conference on File and Storage Technologies (FAST), pages 29--42, 2003.
[10]
R. Sandhu, E. Coyne, H. Fenstein, and C. Youman. Role-based access control models. IEEE Computer, 29(2):38--47, 1996.
[11]
R. Sandhu, D. Ferraiolo, and D. Kuhn. The nist model for role-based access control: Towards a unified standard. In Proceedings of 5th ACM Workshop on Role Based Access Control (RBAC'00), pages 47--63, 2000.

Cited By

View all
  • (2023)A Role-Based Encryption (RBE) Scheme for Securing Outsourced Cloud Data in a Multi-Organization ContextIEEE Transactions on Services Computing10.1109/TSC.2022.319425216:3(1647-1661)Online publication date: 1-May-2023
  • (2023)Design and Implementation of Enhanced Security Algorithm for Hybrid Cloud using KerberosSN Computer Science10.1007/s42979-023-01807-z4:5Online publication date: 7-Jun-2023
  • (2022)Cryptographic Role-Based Access Control, ReconsideredProvable and Practical Security10.1007/978-3-031-20917-8_19(282-289)Online publication date: 7-Nov-2022
  • Show More Cited By

Index Terms

  1. Cryptographic role-based security mechanisms based on role-key hierarchy

        Recommendations

        Comments

        Information & Contributors

        Information

        Published In

        cover image ACM Conferences
        ASIACCS '10: Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security
        April 2010
        363 pages
        ISBN:9781605589367
        DOI:10.1145/1755688
        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Sponsors

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        Published: 13 April 2010

        Permissions

        Request permissions for this article.

        Check for updates

        Author Tags

        1. access control
        2. pairing-based cryptosystem
        3. role-based cryptosystem
        4. role-key hierarchy

        Qualifiers

        • Research-article

        Funding Sources

        Conference

        ASIA CCS '10
        Sponsor:

        Acceptance Rates

        ASIACCS '10 Paper Acceptance Rate 25 of 166 submissions, 15%;
        Overall Acceptance Rate 418 of 2,322 submissions, 18%

        Contributors

        Other Metrics

        Bibliometrics & Citations

        Bibliometrics

        Article Metrics

        • Downloads (Last 12 months)3
        • Downloads (Last 6 weeks)1
        Reflects downloads up to 24 Dec 2024

        Other Metrics

        Citations

        Cited By

        View all
        • (2023)A Role-Based Encryption (RBE) Scheme for Securing Outsourced Cloud Data in a Multi-Organization ContextIEEE Transactions on Services Computing10.1109/TSC.2022.319425216:3(1647-1661)Online publication date: 1-May-2023
        • (2023)Design and Implementation of Enhanced Security Algorithm for Hybrid Cloud using KerberosSN Computer Science10.1007/s42979-023-01807-z4:5Online publication date: 7-Jun-2023
        • (2022)Cryptographic Role-Based Access Control, ReconsideredProvable and Practical Security10.1007/978-3-031-20917-8_19(282-289)Online publication date: 7-Nov-2022
        • (2018)Generic construction of role-based encryption in the standard modelInternational Journal of Security and Networks10.1504/IJSN.2017.08440012:3(198-205)Online publication date: 17-Dec-2018
        • (2018)Generic constructions for role-based encryptionInternational Journal of Information Security10.1007/s10207-014-0267-414:5(417-430)Online publication date: 24-Dec-2018
        • (2017)Achieving Flexible and Self-Contained Data Protection in Cloud ComputingIEEE Access10.1109/ACCESS.2017.26655865(1510-1523)Online publication date: 2017
        • (2016)Injecting Subject Policy into Access Control for Strengthening the Protection of Personal InformationWireless Personal Communications: An International Journal10.1007/s11277-015-3094-789:3(715-728)Online publication date: 1-Aug-2016
        • (2015)Policy Privacy in Cryptographic Access ControlProceedings of the 2015 IEEE 28th Computer Security Foundations Symposium10.1109/CSF.2015.11(46-60)Online publication date: 13-Jul-2015
        • (2015)A Provable Data Possession Scheme with Data Hierarchy in CloudRevised Selected Papers of the 11th International Conference on Information Security and Cryptology - Volume 958910.1007/978-3-319-38898-4_18(301-321)Online publication date: 1-Nov-2015
        • (2014)SecDSIM: A Framework for Secure Data Storage and Identity Management in the CloudCloud Computing10.1007/978-3-319-10530-7_5(105-125)Online publication date: 21-Oct-2014
        • Show More Cited By

        View Options

        Login options

        View options

        PDF

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader

        Media

        Figures

        Other

        Tables

        Share

        Share

        Share this Publication link

        Share on social media