Integrating Trust with Cryptographic Role-based Access Control for Secure Cloud Data Storage

被引:12
|
作者
Zhou, Lan [1 ]
Varadharajan, Vijay [1 ]
Hitchens, Michael [1 ]
机构
[1] Macquarie Univ, Dept Comp, N Ryde, NSW 2109, Australia
关键词
D O I
10.1109/TrustCom.2013.69
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
There has been a recent trend in storing data in cloud due to the increasing amount of users' data and associated benefits such as on-demand access and scalability. Role-based access control (RBAC) provides a flexible way for data owners to manage and share their data in cloud. To enforce the access control policies in the cloud, cryptographic RBAC schemes have been developed, which combine cryptographic techniques and access control to protect the privacy of the data in an outsourced environment. Using these cryptographic schemes, the owner of data can encrypt the data in such a way that only the users with appropriate roles as specified by a role-based access control policy can decrypt and view the data. However these cryptographic approaches do not address the issues of trust when enforcing the access policies. The issue of trust is critical in cloud storage systems; the stored data in the cloud is secure under the assumptions that roles are properly administered by trusted authorities, roles manage the user membership in a trusted manner and qualified users also behave in a trusted manner. In this paper, we propose a trust model to reason about and improve the security for stored data in cloud storage systems that use cryptographic RBAC schemes. The trust model provides an approach for the owners to determine the trustworthiness of individual roles in the RBAC system. The data owners can use the trust models to decide whether to store their encrypted data in the cloud for a particular role. The proposed trust model takes into account role inheritance and hierarchy in the evaluation of trustworthiness of roles. In addition, we present a design of a trust-based cloud storage system which shows how the trust model can be integrated into a system that uses cryptographic RBAC schemes. We have also described the relevance of the proposed trust model by considering practical application scenarios and illustrated how the trust evaluations can be used to reduce the risks and enhance the quality of decision making by data owners of cloud storage service.
引用
收藏
页码:560 / 569
页数:10
相关论文
共 50 条
  • [41] An Efficient Paillier Cryptographic Technique for Secure Data Storage on the Cloud
    Pallavi
    Joshi, Sandeep
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING AND CONTROL SYSTEMS (ICICCS 2020), 2020, : 145 - 149
  • [42] Secure cloud services - extended cryptographic model of data storage
    Grocholewska-Czurylo, Anna
    Retinger, Marek
    PRZEGLAD ELEKTROTECHNICZNY, 2018, 94 (03): : 162 - 167
  • [43] A Secure Cloud Storage Framework With Access Control Based on Blockchain
    Wang, Shangping
    Wang, Xu
    Zhang, Yaling
    IEEE ACCESS, 2019, 7 : 112713 - 112725
  • [44] Domain Based Storage Protection with Secure Access Control for the Cloud
    Paladi, Nicolae
    Michalas, Antonis
    Gehrmann, Christian
    SCC'14: PROCEEDINGS OF THE 2ND INTERNATIONAL WORKSHOP ON SECURITY IN CLOUD COMPUTING, 2014, : 35 - 42
  • [45] Integration of Role Based Access Control with Homomorphic Cryptosystem for Secure and Controlled Access of Data in Cloud
    Sethi, Kamalakanta
    Chopra, Anish
    Bera, Padmalochan
    Tripathy, Bata Krishna
    SIN'17: PROCEEDINGS OF THE 10TH INTERNATIONAL CONFERENCE ON SECURITY OF INFORMATION AND NETWORKS, 2017, : 194 - 199
  • [46] Role-based access control
    Xiaoxing Weixing Jisuanji Xitong/Mini-Micro Systems, 2000, 21 (02): : 198 - 200
  • [47] Data access control in virtual organisations - Role-Based Access Control patterns
    Bertok, P
    Kodituwakku, SR
    DIGITAL ENTERPRISE CHALLENGES: LIFE-CYCLE APPROACH TO MANAGEMENT AND PRODUCTION, 2002, 77 : 394 - 405
  • [48] Integrating object oriented role-based access control model with mandatory access control principles
    Zhang, CN
    Yang, CG
    JOURNAL OF COMPUTER INFORMATION SYSTEMS, 2003, 43 (03) : 40 - 49
  • [49] Secure Data Deduplication With Dynamic Access Control for Mobile Cloud Storage
    Qi, Saiyu
    Wei, Wei
    Wang, Jianfeng
    Sun, Shifeng
    Rutkowski, Leszek
    Huang, Tingwen
    Kacprzyk, Janusz
    Qi, Yong
    IEEE TRANSACTIONS ON MOBILE COMPUTING, 2024, 23 (04) : 2566 - 2582
  • [50] CryptCloud+: Secure and Expressive Data Access Control for Cloud Storage
    Ning, Jianting
    Cao, Zhenfu
    Dong, Xiaolei
    Liang, Kaitai
    Wei, Lifei
    Choo, Kim-Kwang Raymond
    IEEE TRANSACTIONS ON SERVICES COMPUTING, 2021, 14 (01) : 111 - 124