Integrating Trust with Cryptographic Role-based Access Control for Secure Cloud Data Storage

被引:12
|
作者
Zhou, Lan [1 ]
Varadharajan, Vijay [1 ]
Hitchens, Michael [1 ]
机构
[1] Macquarie Univ, Dept Comp, N Ryde, NSW 2109, Australia
关键词
D O I
10.1109/TrustCom.2013.69
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
There has been a recent trend in storing data in cloud due to the increasing amount of users' data and associated benefits such as on-demand access and scalability. Role-based access control (RBAC) provides a flexible way for data owners to manage and share their data in cloud. To enforce the access control policies in the cloud, cryptographic RBAC schemes have been developed, which combine cryptographic techniques and access control to protect the privacy of the data in an outsourced environment. Using these cryptographic schemes, the owner of data can encrypt the data in such a way that only the users with appropriate roles as specified by a role-based access control policy can decrypt and view the data. However these cryptographic approaches do not address the issues of trust when enforcing the access policies. The issue of trust is critical in cloud storage systems; the stored data in the cloud is secure under the assumptions that roles are properly administered by trusted authorities, roles manage the user membership in a trusted manner and qualified users also behave in a trusted manner. In this paper, we propose a trust model to reason about and improve the security for stored data in cloud storage systems that use cryptographic RBAC schemes. The trust model provides an approach for the owners to determine the trustworthiness of individual roles in the RBAC system. The data owners can use the trust models to decide whether to store their encrypted data in the cloud for a particular role. The proposed trust model takes into account role inheritance and hierarchy in the evaluation of trustworthiness of roles. In addition, we present a design of a trust-based cloud storage system which shows how the trust model can be integrated into a system that uses cryptographic RBAC schemes. We have also described the relevance of the proposed trust model by considering practical application scenarios and illustrated how the trust evaluations can be used to reduce the risks and enhance the quality of decision making by data owners of cloud storage service.
引用
收藏
页码:560 / 569
页数:10
相关论文
共 50 条
  • [31] An Efficient Authentication System to Access Electric Vehicle Data in The Cloud Based on Identity Role-based Access Control
    Sudarsono, Amang
    Sudibyo, Rahardhita Widyatra
    Winarno, Idris
    Yuliana, Mike
    2024 INTERNATIONAL ELECTRONICS SYMPOSIUM, IES 2024, 2024, : 207 - 214
  • [32] A Novel Role-based Access Control Model in Cloud Environments
    Luo, Jun
    Wang, Hongjun
    Gong, Xun
    Li, Tianrui
    INTERNATIONAL JOURNAL OF COMPUTATIONAL INTELLIGENCE SYSTEMS, 2016, 9 (01) : 1 - 9
  • [33] An Optimized Role-Based Access Control Using Trust Mechanism in E-Health Cloud Environment
    Butt, Ateeq Ur Rehman
    Mahmood, Tariq
    Saba, Tanzila
    Bahaj, Saeed Ali Omer
    Alamri, Faten S.
    Iqbal, Muhammad Waseem
    Khan, Amjad R.
    IEEE ACCESS, 2023, 11 : 138813 - 138826
  • [34] Role-Based Access Control in a Data Grid Using the Storage Resource Broker and Shibboleth
    Vineela Muppavarapu
    Soon M. Chung
    Journal of Grid Computing, 2009, 7 : 265 - 283
  • [35] Enhanced attribute based access control with secure deduplication for big data storage in cloud
    Premkamal, Praveen Kumar
    Pasupuleti, Syam Kumar
    Singh, Abhishek Kumar
    Alphonse, P. J. A.
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2021, 14 (01) : 102 - 120
  • [36] Role-Based Access Control in a Data Grid Using the Storage Resource Broker and Shibboleth
    Muppavarapu, Vineela
    Chung, Soon M.
    JOURNAL OF GRID COMPUTING, 2009, 7 (02) : 265 - 283
  • [37] Enhanced attribute based access control with secure deduplication for big data storage in cloud
    Praveen Kumar Premkamal
    Syam Kumar Pasupuleti
    Abhishek Kumar Singh
    P. J. A. Alphonse
    Peer-to-Peer Networking and Applications, 2021, 14 : 102 - 120
  • [38] Secure Data Access Control for multi-authority Quantum based Cloud Storage
    Vidya, K.
    Abinaya, A.
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON COMPUTING AND COMMUNICATIONS TECHNOLOGIES (ICCCT 15), 2015, : 387 - 391
  • [39] Trust-based user-role assignment in role-based access control
    Takabi, Hassan
    Amini, Morteza
    Jalili, Rasool
    2007 IEEE/ACS INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS AND APPLICATIONS, VOLS 1 AND 2, 2007, : 807 - +
  • [40] Designing secure e-commerce with role-based access control
    Yang, CG
    Zhang, CN
    IEEE INTERNATIONAL CONFERENCE ON E-COMMERCE, 2003, : 313 - 319