A Role-Based Encryption Scheme for Securing Outsourced Cloud Data in a Multi-Organization Context

04/11/2020
by   Nazatul Haque Sultan, et al.
0

Role-Based Access Control (RBAC) is a popular model which maps roles to access permissions for resources and then roles to the users to provide access control. Role-Based Encryption (RBE) is a cryptographic form of RBAC model that integrates traditional RBAC with the cryptographic encryption method, where RBAC access policies are embedded in encrypted data itself so that any user holding a qualified role can access the data by decrypting it. However, the existing RBE schemes have been focusing on the single-organization cloud storage system, where the stored data can be accessed by users of the same organization. This paper presents a novel RBE scheme with efficient user revocation for the multi-organization cloud storage system, where the data from multiple independent organizations are stored and can be accessed by the authorized users from any other organization. Additionally, an outsourced decryption mechanism is introduced which enables the users to delegate expensive cryptographic operations to the cloud, thereby reducing the overhead on the end-users. Security and performance analyses of the proposed scheme demonstrate that it is provably secure against Chosen Plaintext Attack and can be useful for practical applications due to its low computation overhead.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
04/23/2020

Securing Organization's Data: A Role-Based Authorized Keyword Search Scheme with Efficient Decryption

For better data availability and accessibility while ensuring data secre...
research
01/08/2018

P-MOD: Secure Privilege-Based Multilevel Organizational Data-Sharing in Cloud Computing

Cloud computing has changed the way enterprises store, access and share ...
research
02/16/2020

AMOUN: Asymmetric lightweight cryptographic scheme for wireless group communication

Multi-recipient cryptographic schemes provide secure communication, betw...
research
12/19/2012

Role Mining with Probabilistic Models

Role mining tackles the problem of finding a role-based access control (...
research
05/03/2018

IBBE-SGX: Cryptographic Group Access Control using Trusted Execution Environments

While many cloud storage systems allow users to protect their data by ma...
research
05/02/2022

Using Constraint Programming and Graph Representation Learning for Generating Interpretable Cloud Security Policies

Modern software systems rely on mining insights from business sensitive ...
research
01/25/2021

SEA-BREW: A Scalable Attribute-Based Encryption Scheme for Low-Bitrate IoT Wireless Networks

Attribute-Based Encryption (ABE) is an emerging cryptographic technique ...

Please sign up or login with your details

Forgot password? Click here to reset