Managing key hierarchies for access control enforcement: Heuristic approaches

نویسندگان

  • Carlo Blundo
  • Stelvio Cimato
  • Sabrina De Capitani di Vimercati
  • Alfredo De Santis
  • Sara Foresti
  • Stefano Paraboschi
  • Pierangela Samarati
چکیده

Data outsourcing is emerging today as a successful paradigm allowing individuals and organizations to resort to external servers for storing their data, and sharing them with others. The main problem of this trend is that sensitive data are stored on a site that is not under the data owner’s direct control. This scenario poses a major security problem since often the external server is relied upon for ensuring high availability of the data, but it is not authorized to read them. Data need therefore to be encrypted. In such a context, the application of an access control policy requires different data to be encrypted with different keys so to allow the external server to directly enforce access control and support selective dissemination and access. The problem therefore emerges of designing solutions for the efficient management of an encryption policy enforcing access control, with the goal of minimizing the number of keys to be maintained by the system and distributed to users. In this paper, we prove that the problem of minimizing the number of keys is NP-hard and present alternative approaches for its solution. We first formuIA preliminary version of this paper appeared under the title “Efficient Key Management for Enforcing Access Control in Outsourced Scenarios,” in Proc. of the 24th IFIP TC-11 International Information Security Conference (SEC 2009), Cyprus, May 2009 [1]. ∗Corresponding author Email addresses: [email protected] (Carlo Blundo), [email protected] (Stelvio Cimato), [email protected] (Sabrina De Capitani di Vimercati), [email protected] (Alfredo De Santis), [email protected] (Sara Foresti), [email protected] (Stefano Paraboschi), [email protected] (Pierangela Samarati) Preprint submitted to Computers & Security December 13, 2009 late the minimization problem as an instance of an integer linear programming problem and then propose three different families of heuristics, which are based on a key derivation tree exploiting the relationships among user groups. Finally, we experimentally evaluate the performance of our heuristics, comparing them with previous approaches.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Enforcing RBAC Policies over Data Stored on Untrusted Server (Extended Version)

One of the security issues in data outsourcing is the enforcement of the data owner’s access control policies. This includes some challenges. The first challenge is preserving confidentiality of data and policies. One of the existing solutions is encrypting data before outsourcing which brings new challenges; namely, the number of keys required to access authorized resources, efficient policy u...

متن کامل

Tree-Based Cryptographic Access Control

As more and more data is outsourced to third party servers, the enforcement of access control policies using cryptographic techniques becomes increasingly important. Enforcement schemes based on symmetric cryptography typically issue users a small amount of secret material which, in conjunction with public information, allows the derivation of decryption keys for all data objects for which they...

متن کامل

Access Control Management for Secure Cloud Storage

With the widespread success and adoption of cloud-based solutions, we are witnessing an ever increasing reliance on external providers for storing and managing data. This evolution is greatly facilitated by the availability of solutions typically based on encryption ensuring the confidentiality of externally outsourced data against the storing provider itself. Selective application of encryptio...

متن کامل

Visual Approach to Role Mining with Permission Usage Cardinality Constraint

Role Based Access Control (RBAC) is an effective way of managing permissions assigned to a large number of users in an enterprise. This paper offers a new role engineering approach to RBAC, referred to as visual role mining. The key idea is to graphically represent userpermission assignments to enable quick analysis and elicitation of meaningful roles with constraint. There are two algorithms: ...

متن کامل

Role Slices and Runtime Permissions: Improving an AOP-based access control schema

In this paper, we present several issues that need to be addressed to incorporate dynamic permissions –permissions depending on runtime elements– into our current approach to model access control: the role slice. We summarize four tasks that conforms to our future research directions: extending the role-slice artifact to represent permissions based on runtime elements; refining the rules that r...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • Computers & Security

دوره 29  شماره 

صفحات  -

تاریخ انتشار 2010