• DocumentCode
    73426
  • Title

    Role-Based Cryptosystem: A New Cryptographic RBAC System Based on Role-Key Hierarchy

  • Author

    Zhu, Yujia ; Ahn, Gail-Joon ; Hu, Haibo ; Ma, Dongsheng ; Wang, Shuhui

  • Author_Institution
    School of Computer and Communication Engineering, University of Science and Technology Beijing, Beijing, China
  • Volume
    8
  • Issue
    12
  • fYear
    2013
  • fDate
    Dec. 2013
  • Firstpage
    2138
  • Lastpage
    2153
  • Abstract
    Even though role-based access control (RBAC) can tremendously help us to minimize the complexity in administering users, it still needs to realize the notion of roles at the resource level. In this paper, we propose a practical cryptographic RBAC model, called role-key hierarchy model, to support various security features, including signature, identification, and encryption on role-key hierarchy. In addition, several advanced features, such as role or user revocation, tracing, and anonymity, are implemented as well. With the help of rich algebraic structure of elliptic curves, we introduce a unified and complete construction of role-based cryptosystem to verify the rationality and validity of our proposed model. In addition, a proof-of-concept prototype implementation and performance evaluation is discussed to demonstrate the feasibility and efficiency of our mechanisms.
  • Keywords
    Access control; Elliptic curve cryptography; Encryption; Security; Security; access control; role and user revocation; role-based cryptosystem; role-key hierarchy;
  • fLanguage
    English
  • Journal_Title
    Information Forensics and Security, IEEE Transactions on
  • Publisher
    ieee
  • ISSN
    1556-6013
  • Type

    jour

  • DOI
    10.1109/TIFS.2013.2287858
  • Filename
    6650102