Secure Information Sharing Using Attribute Certificates and Role Based Access Control

نویسندگان

  • Ganesh Godavari
  • C. Edward Chow
چکیده

In this paper, we explore the issues involved with the design and rapid deployment of large scale secure information sharing (SIS) systems for coordination involved with multiple agencies. Procedures and tools were developed for setting up quickly the public key infrastructure (PKI) and privilege management infrastructure (PMI) for the multi-agency SIS systems. A multi-agency SIS testbed based on LDAP servers and web servers was built to explore the use of the attribute certificate, public key digital certificate, and role-based access control for secure access and efficient authorization. LDAP servers were enhanced to accept attribute certificates. The LDAP module for the apache web server was extended to submit the LDAP query based on the subject field of the client certificate, and to authorize the web access based on the attribute certificate return from a LDAP server. Preliminary performance of the SIS prototype shows that the techniques and tools developed can rapidly set up the PKI and PMI for a large scale multi-agency, web-based, SIS system and support secure web accesses based on the effective role-based access control and authorization. The main contribution of our paper is the development of framework that makes use PKI, RBAC, PMI, and webservices for information sharing based on authentication, authorization, and access. The framework and the software packages developed can be used to support the critical information and communication needs of a joint task force assembled for unexpected natural disasters, nuclear/chemical accidents, or terrorist attacks.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Attribute-based Access Control for Cloud-based Electronic Health Record (EHR) Systems

Electronic health record (EHR) system facilitates integrating patients' medical information and improves service productivity. However, user access to patient data in a privacy-preserving manner is still challenging problem. Many studies concerned with security and privacy in EHR systems. Rezaeibagha and Mu [1] have proposed a hybrid architecture for privacy-preserving accessing patient records...

متن کامل

Authorization models for secure information sharing: a survey and research agenda

This article presents a survey of authorization models and considers their 'fitness-for-purpose' in facilitating information sharing. Network-supported information sharing is an important technical capability that underpins collaboration in support of dynamic and unpredictable activities such as emergency response, national security, infrastructure protection, supply chain integration and emerg...

متن کامل

A combination of semantic and attribute-based access control model for virtual organizations

A Virtual Organization (VO) consists of some real organizations with common interests, which aims to provide inter organizational associations to reach some common goals by sharing their resources with each other. Providing security mechanisms, and especially a suitable access control mechanism, which enforces the defined security policy is a necessary requirement in VOs. Since VO is a complex ...

متن کامل

Design and Implementation of Collaborative Ciphertext-Policy Attribute-Role based

In a real-world collaborative data sharing scenario in cloud computing, there are multiple users who can access the resource shared by multiple data owners anytime and anywhere. The evolution of user status, roles, and privilege in the federated data sharing environment become even more and more complex to handle. Efficiently managing multiple access control policies and providing appropriate a...

متن کامل

An Efficient Role Specification Management Model for Highly Distributed Environments

Highly distributed environments such as pervasive computing environments not having global or broad control, need another attribute certificate management technique. For an efficient role based access control using attribute certificate, we use a technique of structuring role specification certificates. It can provide more flexible and secure collaborating environments. The roles are grouped an...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2005