Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1007/978-3-642-38980-1_3guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

CloudHKA: a cryptographic approach for hierarchical access control in cloud computing

Published: 25 June 2013 Publication History

Abstract

Cloud services are blooming recently. They provide a convenient way for data accessing, sharing, and processing. A key ingredient for successful cloud services is to control data access while considering the specific features of cloud services. The specific features include great quantity of outsourced data, large number of users, honest-but-curious cloud servers, frequently changed user set, dynamic access control policies, and data accessing for light-weight mobile devices. This paper addresses a cryptographic key assignment problem for enforcing a hierarchical access control policy over cloud data.
We propose a new hierarchical key assignment scheme CloudHKA that observes the Bell-LaPadula security model and efficiently deals with the user revocation issue practically. We use CloudHKA to encrypt outsourced data so that the data are secure against honest-but-curious cloud servers. CloudHKA possesses almost all advantages of the related schemes, e.g., each user only needs to store one secret key, supporting dynamic user set and access hierarchy, and provably-secure against collusive attacks. In particular, CloudHKA provides the following distinct features that make it more suitable for controlling access of cloud data. (1) A user only needs a constant computation time for each data accessing. (2) The encrypted data are securely updatable so that the user revocation can prevent a revoked user from decrypting newly and previously encrypted data. Notably, the updates can be outsourced by using public information only. (3) CloudHKA is secure against the legal access attack. The attack is launched by an authorized, but malicious, user who pre-downloads the needed information for decrypting data ciphertexts in his authorization period. The user uses the pre-downloaded information for future decryption even after he is revoked. Note that the pre-downloaded information are often a small portion of encrypted data only, e.g. the header-cipher in a hybrid encrypted data ciphertext. (4) Each user can be flexibly authorized the access rights of Write or Read, or both.

References

[1]
Akl, S.G., Taylor, P.D.: Cryptographic solution to a problem of access control in a hierarchy. ACM Transactions on Computer Systems 1(3), 239-248 (1983).
[2]
Atallah, M.J., Blanton, M., Fazio, N., Frikken, K.B.: Dynamic and efficient key management for access hierarchies. ACM Transactions on Information and System Security 12(3) (2009).
[3]
Atallah, M.J., Frikken, K.B., Blanton, M.: Dynamic and efficient key management for access hierarchies. In: Proceedings of the ACM Conference on Computer and Communications Security (CCS), pp. 190-202 (2005).
[4]
Ateniese, G., Fu, K., Green, M., Hohenberger, S.: Improved proxy re-encryption schemes with applications to secure distributed storage. ACM Transactions on Information and System Security 9(1), 1-30 (2006).
[5]
Bell, D.E., Lapadula, L.J.: Secure computer systems: Unified exposition and multics interpretation. Technical Report MTR-2997, Mitre Corporation, Bedford, Massachusetts (1976).
[6]
Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption. In: Proceedings of the IEEE Symposium on Security and Privacy (S&P), pp. 321-334 (2007).
[7]
Blaze, M., Bleumer, G., Strauss, M.: Divertible protocols and atomic proxy cryptography. In: Nyberg, K. (ed.) EUROCRYPT 1998. LNCS, vol. 1403, pp. 127-144. Springer, Heidelberg (1998).
[8]
Boldyreva, A., Goyal, V., Kumar, V.: Identity-based encryption with efficient revocation. In: ACM Conference on Computer and Communications Security (CCS), pp. 417-426 (2008).
[9]
Canetti, R., Hohenberger, S.: Chosen-ciphertext secure proxy re-encryption. In: Proceedings of ACM Conference on Computer and Communications Security (CCS), pp. 185-194 (2007).
[10]
Chen, Y.-R., Chu, C.-K., Tzeng, W.-G., Zhou, J.: Cloudhka: A cryptographic approach for hierarchical access control in cloud computing. Cryptology ePrint Archive, Report 2013/208 (2013), http://eprint.iacr.org/
[11]
Chen, Y.-R., Tygar, J.D., Tzeng, W.-G.: Secure group key management using unidirectional proxy re-encryption schemes. In: Proceedings of the IEEE International Conference on Computer Communications (INFOCOM), pp. 1952-1960 (2011).
[12]
Chou, K.-Y., Chen, Y.-R., Tzeng, W.-G.: An efficient and secure group key management scheme supporting frequent key updates on pay-tv systems. In: Proceedings of the IEEE Asia-Pacific Network Operations and Management Symposium (APNOMS), pp. 1-8 (2011).
[13]
Crampton, J., Martin, K.M., Wild, P.R.: On key assignment for hierarchical access control. In: Proceedings of the IEEE Computer Security Foundations Workshop (CSFW), pp. 98-111 (2006).
[14]
Goyal, V., Pandey, O., Sahai, A., Waters, B.: Attribute-based encryption for fine-grained access control of encrypted data. In: Proceedings of the ACM Conference on Computer and Communications Security (CCS), pp. 89-98 (2006).
[15]
Green, M., Ateniese, G.: Identity-based proxy re-encryption. In: Katz, J., Yung, M. (eds.) ACNS 2007. LNCS, vol. 4521, pp. 288-306. Springer, Heidelberg (2007).
[16]
Green, M., Hohenberger, S., Waters, B.: Outsourcing the decryption of abe ciphertexts. In: Proceedings of the USENIX Security Symposium (2011).
[17]
Harn, L., Lin, H.-Y.: A cryptographic key generation scheme for multilevel data security. Computers & Security 9(6), 539-546 (1990).
[18]
Hur, J., Noh, D.K.: Attribute-based access control with efficient revocation in data outsourcing systems. IEEE Transactions on Parallel and Distributed Systems 22(7), 1214-1221 (2011).
[19]
Luo, S., Shen, Q., Chen, Z.: Fully secure unidirectional identity-based proxy reencryption. In: Kim, H. (ed.) ICISC 2011. LNCS, vol. 7259, pp. 109-126. Springer, Heidelberg (2012).
[20]
MacKinnon, S.J., Taylor, P.D., Meijer, H., Akl, S.G.: An optimal algorithm for assigning cryptographic keys to control access in a hierarchy. IEEE Transactions on Computers 34(9), 797-802 (1985).
[21]
Ray, I., Ray, I., Narasimhamurthi, N.: A cryptographic solution to implement access control in a hierarchy and more. In: ACM Symposium on Access Control Models and Technologies (SACMAT), pp. 65-73 (2002).
[22]
Rivest, R.L.: All-or-nothing encryption and the package transform. In: Biham, E. (ed.) FSE 1997. LNCS, vol. 1267, pp. 210-218. Springer, Heidelberg (1997).
[23]
Sahai, A., Seyalioglu, H., Waters, B.: Dynamic credentials and ciphertext delegation for attribute-based encryption. In: Safavi-Naini, R. (ed.) CRYPTO 2012. LNCS, vol. 7417, pp. 199-217. Springer, Heidelberg (2012).
[24]
Sahai, A., Waters, B.: Fuzzy identity-based encryption. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 457-473. Springer, Heidelberg (2005).
[25]
De Santis, A., Ferrara, A.L., Masucci, B.: Efficient provably-secure hierarchical key assignment schemes. Theoretical Computer Science 412(41), 5684-5699 (2011).
[26]
Shao, J., Liu, P., Cao, Z., Wei, G.: Multi-use unidirectional proxy re-encryption. In: Proceedings of IEEE International Conference on Communications (ICC), pp. 1-5 (2011).
[27]
Tzeng, W.-G.: A time-bound cryptographic key assignment scheme for access control in a hierarchy. IEEE Transactions on Knowledge and Data Engineering (TKDE) 14(1), 182-188 (2002).
[28]
Wang, H., Cao, Z., Wang, L.: Multi-use and unidirectional identity-based proxy re-encryption schemes. Information Sciences 180(20), 4042-4059 (2010).
[29]
Wong, C.K., Gouda, M.G., Lam, S.S.: Secure group communications using key graphs. IEEE/ACM Transactions on Network 8(1), 16-30 (2000).
[30]
Yu, S., Wang, C., Ren, K., Lou, W.: Achieving secure, scalable, and fine-grained data access control in cloud computing. In: Proceedings of the IEEE International Conference on Computer Communications (INFOCOM), pp. 534-542 (2010).
[31]
Zhong, S.: A practical key management scheme for access control in a user hierarchy. Computers & Security 21(8), 750-759 (2002).

Cited By

View all

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Guide Proceedings
ACNS'13: Proceedings of the 11th international conference on Applied Cryptography and Network Security
June 2013
571 pages
ISBN:9783642389795

Publisher

Springer-Verlag

Berlin, Heidelberg

Publication History

Published: 25 June 2013

Author Tags

  1. access control
  2. bell-LaPadula security model
  3. cloud computing
  4. hierarchical key assignment
  5. key management
  6. outsourced data
  7. proxy re-encryption

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 03 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2021)KAPREJournal of Information Security and Applications10.1016/j.jisa.2021.10300963:COnline publication date: 1-Dec-2021
  • (2017)Supporting dynamic updates in storage clouds with the AklTaylor schemeInformation Sciences: an International Journal10.1016/j.ins.2016.08.093387:C(56-74)Online publication date: 1-May-2017
  • (2016)Efficient authorisation update on cloud dataInternational Journal of Web and Grid Services10.1504/IJWGS.2016.07659412:2(109-141)Online publication date: 1-May-2016
  • (2016)Identity-based key management for cloud computingSecurity and Communication Networks10.1002/sec.14749:13(2143-2156)Online publication date: 10-Sep-2016
  • (2015)DualAcESecurity and Communication Networks10.1002/sec.10988:8(1494-1508)Online publication date: 25-May-2015
  • (2014)Improved anonymous proxy re-encryption with CCA securityProceedings of the 9th ACM symposium on Information, computer and communications security10.1145/2590296.2590322(249-258)Online publication date: 4-Jun-2014

View Options

View options

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media