Role-based access control to outsourced data in cloud computing

  • Authors:
  • Lili Sun;Hua Wang;Elisa Bertino

  • Affiliations:
  • University of Southern Queensland, Toowoomba QLD Australia;University of Southern Queensland, Toowoomba QLD Australia;Purdue University, West Lafayette, IN

  • Venue:
  • ADC '13 Proceedings of the Twenty-Fourth Australasian Database Conference - Volume 137
  • Year:
  • 2013

Quantified Score

Hi-index 0.00

Visualization

Abstract

Data outsourcing is a major component for cloud computing that allows data owners to distribute resources to external services for users and organizations who can apply the resources. A crucial problem for owners is how to make sure their sensitive information accessed by legitimate users only using the trusted services but not authorized to read the actual information. We address the problem with role-based access control to enforce selective access to outsourced data without involving the owner in the access control authorization. The basic idea is to combine cryptography with authorizations, data owners assign keys to roles that will enforce access via encryption. A formal role-based access model is designed to analyse the translating an authorization policy into an equivalent encryption policy. The paper also investigates the affect of role hirarchy structure in the authorization process. The comparisions to other related work are presented. Finnaly the future work are introduced.