مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

Persian Verion

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

video

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

sound

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

Persian Version

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View:

586
مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

Download:

238
مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

Cites:

Information Journal Paper

Title

ENFORCING RBAC POLICIES OVER DATA STORED ON UNTRUSTED SERVER

Pages

  129-139

Abstract

 One of the security issues in data outsourcing is enforcement of the data owner' s ACCESS CONTROL policies. This includes some challenges. The first challenge is preserving confidentiality of data and policies. One of the existing solutions is encrypting data before outsourcing which brings new challenges; namely, the number of keys required to access authorized resources, efficient policy updating, write ACCESS CONTROL enforcement, overhead of accessing/processing data at the user/owner side. Most of the existing solutions address only some of challenges, while imposing high overhead on both owner and users. Though, policy management in the Role-Based ACCESS CONTROL (RBAC) model is easier and more efficient due to the existence of role hierarchical structure and role inheritance; most of the existing solutions address only enforcement of policies in the form of ACCESS CONTROL matrix. In this paper, we propose an approach to enforce RBAC policies on encrypted data outsourced to a service provider. We utilize CHINESE REMAINDER THEOREM for key management and role/permission assignment. Efficient user revocation, efficient role hierarchical structure updating, availability of authorized resources for users of new roles, and enforcement of write ACCESS CONTROL policies as well as static separation of duties, are of advantages of the proposed solution.

Cites

  • No record.
  • References

  • No record.
  • Cite

    APA: Copy

    SOLTANI, NAEIMEH, BOHLOOLI, RAMIN, & JALILI, RASOOL. (2018). ENFORCING RBAC POLICIES OVER DATA STORED ON UNTRUSTED SERVER. THE ISC INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 10(2 ), 129-139. SID. https://sid.ir/paper/241808/en

    Vancouver: Copy

    SOLTANI NAEIMEH, BOHLOOLI RAMIN, JALILI RASOOL. ENFORCING RBAC POLICIES OVER DATA STORED ON UNTRUSTED SERVER. THE ISC INTERNATIONAL JOURNAL OF INFORMATION SECURITY[Internet]. 2018;10(2 ):129-139. Available from: https://sid.ir/paper/241808/en

    IEEE: Copy

    NAEIMEH SOLTANI, RAMIN BOHLOOLI, and RASOOL JALILI, “ENFORCING RBAC POLICIES OVER DATA STORED ON UNTRUSTED SERVER,” THE ISC INTERNATIONAL JOURNAL OF INFORMATION SECURITY, vol. 10, no. 2 , pp. 129–139, 2018, [Online]. Available: https://sid.ir/paper/241808/en

    Related Journal Papers

    Related Seminar Papers

  • No record.
  • Related Plans

  • No record.
  • Recommended Workshops






    Move to top
    telegram sharing button
    whatsapp sharing button
    linkedin sharing button
    twitter sharing button
    email sharing button
    email sharing button
    email sharing button
    sharethis sharing button