Cooperative attribute-based access control for enterprise computing system

被引:1
|
作者
Li, Mengting [1 ]
Huang, Xinyi [1 ]
Liu, Joseph K. [2 ]
Xu, Li [1 ]
Wu, Wei [1 ]
机构
[1] Fujian Normal Univ, Sch Math & Comp Sci, Fujian Prov Key Lab Network Secur & Cryptol, Fuzhou, Peoples R China
[2] Inst Infocomm Res, Infocomm Secur Dept, Singapore, Singapore
基金
中国国家自然科学基金;
关键词
enterprise computing; access control; cloud computing; signature; formal security; attribute-based;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper we introduce a cooperative attribute-based access control mechanism, which is specifically designed for enterprise computing systems. In our system, users are divided into different groups and they are affiliated with different attributes. Only members from the same group can combine their signing keys to form the signing key of a larger union set of attributes, but users from different groups cannot make it. With the union of the attributes, users can generate a signature which can be used to grant access right to the enterprise cloud system. The applications range from private cloud of a small and medium enterprise (SME) to a large public cloud of electronic healthcare system. We give an efficient design of this mechanism, formally prove its security and implement the prototype of our scheme.
引用
收藏
页码:191 / 202
页数:12
相关论文
共 50 条
  • [21] Attribute-Based Data and Privilege Hybrid Access Control Scheme in Cloud Computing
    Liu, Qin
    Li, Pengju
    Yu, Chunwu
    Computer Engineering and Applications, 2024, 60 (13) : 276 - 286
  • [22] Secure and Efficient General Circuits Attribute-Based Access Control in Cloud Computing
    Wu, Qing
    Li, Liangjun
    Zhang, Leyou
    Mu, Yi
    Rezaeibagha, Fatemeh
    IEEE SYSTEMS JOURNAL, 2022, 16 (04): : 5533 - 5543
  • [23] k-Times Attribute-Based Anonymous Access Control for Cloud Computing
    Yuen, Tsz Hon
    Liu, Joseph K.
    Au, Man Ho
    Huang, Xinyi
    Susilo, Willy
    Zhou, Jianying
    IEEE TRANSACTIONS ON COMPUTERS, 2015, 64 (09) : 2595 - 2608
  • [24] Mining Attribute-Based Access Control Policies
    Davari, Maryam
    Zulkernine, Mohammad
    INFORMATION SYSTEMS SECURITY, ICISS 2022, 2022, 13784 : 186 - 201
  • [25] Monotonicity and Completeness in Attribute-Based Access Control
    Crampton, Jason
    Morisset, Charles
    SECURITY AND TRUST MANAGEMENT (STM 2014), 2014, 8743 : 33 - 48
  • [26] ABACaaS: Attribute-Based Access Control as a Service
    Meshram, Augustee
    Das, Saptarshi
    Sural, Shamik
    Vaidya, Jaideep
    Atluri, Vijayalakshmi
    PROCEEDINGS OF THE NINTH ACM CONFERENCE ON DATA AND APPLICATION SECURITY AND PRIVACY (CODASPY '19), 2019, : 153 - 155
  • [27] Mining Attribute-Based Access Control Policies
    Xu, Zhongyuan
    Stoller, Scott D.
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2015, 12 (05) : 533 - 545
  • [28] Combining Mandatory and Attribute-based Access Control
    Kerr, Lawrence
    Alves-Foss, Jim
    PROCEEDINGS OF THE 49TH ANNUAL HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES (HICSS 2016), 2016, : 2616 - 2623
  • [29] A contextual attribute-based access control model
    Covington, Michael J.
    Sastry, Manoj R.
    On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops, Pt 2, Proceedings, 2006, 4278 : 1996 - 2006
  • [30] Immediate attribute revocation in decentralized attribute-based access control
    Imine, Youcef
    Lounis, Ahmed
    Bouabdallah, Abdelmadjid
    2017 16TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS / 11TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING / 14TH IEEE INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS, 2017, : 33 - 40