DocumentCode :
111941
Title :
From RBAC to ABAC: Constructing Flexible Data Access Control for Cloud Storage Services
Author :
Yan Zhu ; Dijiang Huang ; Chang-Jyun Hu ; Xin Wang
Author_Institution :
Sch. of Comput. & Commun. Eng., Univ. of Sci. & Technol. Beijing, Beijing, China
Volume :
8
Issue :
4
fYear :
2015
fDate :
July-Aug. 1 2015
Firstpage :
601
Lastpage :
616
Abstract :
This paper addresses how to construct an RBAC-compatible secure cloud storage service with a user-friendly and easy-to-manage attribute-based access control (ABAC) mechanism. Similar to role hierarchies in RBAC, attribute hierarchies (considered as partial ordering relations) are introduced into attribute-based encryption (ABE) in order to define a seniority relation among all values of an attribute, whereby a user holding senior attribute values acquires permissions of his/her juniors. Based on these notations, we present a new ABE scheme called attribute-based encryption with attribute hierarchies (ABE-AH) to provide an efficient approach to implement comparison operations between attribute values on a poset derived from an attribute lattice. By using bilinear groups of a composite order, we present a practical construction of ABE-AH based on forward and backward derivation functions. Compared with prior solutions, our scheme offers a compact policy representation approach that can significantly reduce the size of private-keys and ciphertexts. To demonstrate how to use the presented solution, we illustrate how to provide richer expressive access policies to facilitate flexible access control for data access services in clouds.
Keywords :
authorisation; cloud computing; cryptography; ABAC; ABE scheme; ABE-AH; RBAC-compatible secure cloud storage service; access policies; attribute hierarchies; attribute lattice; attribute-based encryption; backward derivation functions; bilinear composite order groups; ciphertext size reduction; flexible data access control construction; forward derivation functions; partial-ordering relations; policy representation approach; private-key size reduction; senior attribute values; seniority relation; user-friendly-easy-to-manage attribute-based access control mechanism; Access control; Cloud computing; Educational institutions; Encryption; Lattices; Security; attribute-based encryption; data migration; role-based access control; secure cloud storage;
fLanguage :
English
Journal_Title :
Services Computing, IEEE Transactions on
Publisher :
ieee
ISSN :
1939-1374
Type :
jour
DOI :
10.1109/TSC.2014.2363474
Filename :
6926824
Link To Document :
بازگشت