Title :
Achieving Secure Role-Based Access Control on Encrypted Data in Cloud Storage
Author :
Lan Zhou ; Varadharajan, Vijay ; Hitchens, Michael
Author_Institution :
Dept. of Comput., Macquarie Univ., North Ryde, NSW, Australia
Abstract :
With the rapid developments occurring in cloud computing and services, there has been a growing trend to use the cloud for large-scale data storage. This has raised the important security issue of how to control and prevent unauthorized access to data stored in the cloud. One well known access control model is the role-based access control (RBAC), which provides flexible controls and management by having two mappings, users to roles and roles to privileges on data objects. In this paper, we propose a role-based encryption (RBE) scheme that integrates the cryptographic techniques with RBAC. Our RBE scheme allows RBAC policies to be enforced for the encrypted data stored in public clouds. Based on the proposed scheme, we present a secure RBE-based hybrid cloud storage architecture that allows an organization to store data securely in a public cloud, while maintaining the sensitive information related to the organization´s structure in a private cloud. We describe a practical implementation of the proposed RBE-based architecture and discuss the performance results. We demonstrate that users only need to keep a single key for decryption, and system operations are efficient regardless of the complexity of the role hierarchy and user membership in the system.
Keywords :
authorisation; cloud computing; private key cryptography; storage management; RBAC policies; RBE scheme; RBE-based hybrid cloud storage architecture; cloud computing; cloud services; cryptographic techniques; data encryption; data objects; large-scale data storage; public clouds; role hierarchy; role-based encryption scheme; secure role-based access control; sensitive information maintenance; single key decryption; unauthorized access; user membership; Access control; Cloud computing; Computer architecture; Distributed databases; Encryption; Memory; Role-based access control; architecture; cloud computing; data storage; role-based encryption;
Journal_Title :
Information Forensics and Security, IEEE Transactions on
DOI :
10.1109/TIFS.2013.2286456