Garbled role-based access control in the cloud

Security has always been a major concern in the cloud environment because outsourcing leads to the new security issues. Privacy risks related to the job assignment are the dominating hurdles in the wide organizations like research, military and intelligence. To address this issue Garbled Role-Based Access Control (GRBAC) mechanism is being offered in this paper having key component that obliviously assign roles to the users through (RSA Oblivious-Transfer). The design of the proposed model has been guided by the Role-Based Access Control and Dynamic Separation of Duty. The proposed model also includes the flexible authentication based on the user’s context information. GRBAC offers fine-grained security while algorithm does not have to be secret from adversary. Security of this model is based on the adopted Garbled Function ($$f_g$$fg). The proposed model is best suited for the organizations where available roles cannot be revealed to the users and assigned roles are not to be leaked even to the server.

[1]  Luca Viganò,et al.  Security Constraints in Temporal Role-Based Access-Controlled Workflows , 2015, CODASPY.

[2]  Jorge Lobo,et al.  Privacy-aware role-based access control , 2010 .

[3]  Weiran Liu,et al.  Anonymous Role-Based Access Control on E-Health Records , 2016, IACR Cryptol. ePrint Arch..

[4]  Ling Liu,et al.  Role-based and time-bound access and management of EHR data , 2014, Secur. Commun. Networks.

[5]  Ali Miri,et al.  Using Mediated Identity-Based Cryptography to Support Role-Based Access Control , 2004, ISC.

[6]  Lionel C. Briand,et al.  A Model-driven Approach to Representing and Checking RBAC Contextual Policies , 2016, CODASPY.

[7]  Hiroyuki Sato,et al.  An Extended CP-ABE Based Access Control Model for Data Outsourced in the Cloud , 2015, 2015 IEEE 39th Annual Computer Software and Applications Conference.

[8]  Xiaohui Liang,et al.  BECAN: A Bandwidth-Efficient Cooperative Authentication Scheme for Filtering Injected False Data in Wireless Sensor Networks , 2012, IEEE Transactions on Parallel and Distributed Systems.

[9]  Yongge Wang,et al.  Garbled computation in cloud , 2016, Future Gener. Comput. Syst..

[10]  Vijay Varadharajan,et al.  Secure administration of cryptographic role-based access control for large-scale cloud storage systems , 2014, J. Comput. Syst. Sci..

[11]  Yongge Wang,et al.  Privacy Preserving Computation in Cloud Using Noise-Free Fully Homomorphic Encryption (FHE) Schemes , 2016, ESORICS.

[12]  Hiroyuki Sato,et al.  Privacy-preserving access control model for big data cloud , 2015, 2015 International Computer Science and Engineering Conference (ICSEC).

[13]  Moni Naor,et al.  Efficient oblivious transfer protocols , 2001, SODA '01.

[14]  Michael O. Rabin,et al.  How To Exchange Secrets with Oblivious Transfer , 2005, IACR Cryptol. ePrint Arch..

[15]  Hsing-Chung Chen,et al.  A trusted user-to-role and role-to-key access control scheme , 2015, Soft Computing.

[16]  Yuval Ishai,et al.  Extending Oblivious Transfers Efficiently , 2003, CRYPTO.

[17]  Dorothy E. Denning,et al.  Location-based authentication: Grounding cyberspace for better security , 1996 .

[18]  Yael Tauman Kalai,et al.  Reusable garbled circuits and succinct functional encryption , 2013, STOC '13.

[19]  M Gobi,et al.  AN ACCESS CONTROL PROTOCOL FOR CLOUD DATA USING SECURED HYPER ELLIPTIC CURVE CRYPTOGRAPHY. , 2016 .

[20]  Georg Fuchsbauer,et al.  Policy Privacy in Cryptographic Access Control , 2015, 2015 IEEE 28th Computer Security Foundations Symposium.

[21]  Craig Gentry,et al.  Fully homomorphic encryption using ideal lattices , 2009, STOC '09.

[22]  Andrew Chi-Chih Yao,et al.  Protocols for Secure Computations (Extended Abstract) , 1982, FOCS.

[23]  Oded Goldreich,et al.  A randomized protocol for signing contracts , 1985, CACM.

[24]  Craig Gentry,et al.  A fully homomorphic encryption scheme , 2009 .

[25]  J. Hsu,et al.  Context-aware Access Control in Pervasive Healthcare , 2005 .

[26]  Vijay Varadharajan,et al.  Trust Enhanced Cryptographic Role-Based Access Control for Secure Cloud Data Storage , 2015, IEEE Transactions on Information Forensics and Security.

[27]  Fatima Amounas,et al.  ECC Encryption and Decryption with a Data Sequence , 2012 .

[28]  Yehuda Lindell,et al.  A Proof of Security of Yao’s Protocol for Two-Party Computation , 2009, Journal of Cryptology.

[29]  Xin Zhou,et al.  Research and implementation of RSA algorithm for encryption and decryption , 2011, Proceedings of 2011 6th International Forum on Strategic Technology.