DocumentCode
59921
Title
Achieving Secure Role-Based Access Control on Encrypted Data in Cloud Storage
Author
Lan Zhou ; Varadharajan, Vijay ; Hitchens, Michael
Author_Institution
Dept. of Comput., Macquarie Univ., North Ryde, NSW, Australia
Volume
8
Issue
12
fYear
2013
fDate
Dec. 2013
Firstpage
1947
Lastpage
1960
Abstract
With the rapid developments occurring in cloud computing and services, there has been a growing trend to use the cloud for large-scale data storage. This has raised the important security issue of how to control and prevent unauthorized access to data stored in the cloud. One well known access control model is the role-based access control (RBAC), which provides flexible controls and management by having two mappings, users to roles and roles to privileges on data objects. In this paper, we propose a role-based encryption (RBE) scheme that integrates the cryptographic techniques with RBAC. Our RBE scheme allows RBAC policies to be enforced for the encrypted data stored in public clouds. Based on the proposed scheme, we present a secure RBE-based hybrid cloud storage architecture that allows an organization to store data securely in a public cloud, while maintaining the sensitive information related to the organization´s structure in a private cloud. We describe a practical implementation of the proposed RBE-based architecture and discuss the performance results. We demonstrate that users only need to keep a single key for decryption, and system operations are efficient regardless of the complexity of the role hierarchy and user membership in the system.
Keywords
authorisation; cloud computing; private key cryptography; storage management; RBAC policies; RBE scheme; RBE-based hybrid cloud storage architecture; cloud computing; cloud services; cryptographic techniques; data encryption; data objects; large-scale data storage; public clouds; role hierarchy; role-based encryption scheme; secure role-based access control; sensitive information maintenance; single key decryption; unauthorized access; user membership; Access control; Cloud computing; Computer architecture; Distributed databases; Encryption; Memory; Role-based access control; architecture; cloud computing; data storage; role-based encryption;
fLanguage
English
Journal_Title
Information Forensics and Security, IEEE Transactions on
Publisher
ieee
ISSN
1556-6013
Type
jour
DOI
10.1109/TIFS.2013.2286456
Filename
6642048
Link To Document