A secure and efficient role-based access policy towards cryptographic cloud storage

  • Authors:
  • Cheng Hong;Zhiquan lv;Min Zhang;Dengguo Feng

  • Affiliations:
  • The State Key Laboratory Of Information Security, Beijing, China;The State Key Laboratory Of Information Security, Beijing, China;The State Key Laboratory Of Information Security, Beijing, China;The State Key Laboratory Of Information Security, Beijing, China

  • Venue:
  • WAIM'11 Proceedings of the 12th international conference on Web-age information management
  • Year:
  • 2011

Quantified Score

Hi-index 0.01

Visualization

Abstract

Cloud Storage, which provides cost-efficient and scalable storage services, has emerged as a hot paradigm today. As promising as it is, Cloud Storage also brings forth security challenges. Sensitive data may be outsourced for sharing on cloud storage servers, which are not within the same trusted domain as the data owner (DO). To keep the data confidential against unauthorized parties, cryptographic access control must be applied. Existing methods usually require the access policies be fully managed by the DO, which could lead to the DO-side bottleneck. This paper addressed the issue by implementing a cryptographic Role-Based Access Control via CP-ABE. The access policies are divided into two parts: Permission Assignments (PAs) and Role Assignments (RAs), and we develop an approach called propagation to allow RAs to be handled effectively by users besides the DO. Since most of the dynamic policies in the Cloud are triggered by RAs, the bottleneck could be successfully avoided.