User-Friendly Design of Cryptographically-Enforced Hierarchical Role-based Access Control Models

dc.contributor.authorYu, Xiaoyuan
dc.contributor.authorHaakenson, Brandon
dc.contributor.authorPhillips, Tyler
dc.contributor.authorZou, Xukai
dc.contributor.departmentComputer and Information Science, School of Scienceen_US
dc.date.accessioned2021-09-09T14:47:14Z
dc.date.available2021-09-09T14:47:14Z
dc.date.issued2020-08
dc.description.abstractData access control is a critical issue for any organization generating, recording or leveraging sensitive information. The popular Role-based Access Control (RBAC) model is well- suited for large organizations with various groups of personnel, each needing their own set of data access privileges. Unfortunately, the traditional RBAC model does not involve the use of cryptographic keys needed to enforce access control policies and protect data privacy. Cryptography-based Hierarchical Access Control (CHAC) models, on the other hand, have been proposed to facilitate RBAC models and directly enforce data privacy and access controls through the use of key management schemes. Though CHAC models and efficient key management schemes can support large and dynamic organizations, they are difficult to design and maintain without intimate knowledge of symmetric encryption, key management and hierarchical access control models. Therefore, in this paper we propose an efficient algorithm which automatically generates a fine-grained CHAC model based on the input of a highly user-friendly representation of access control policies. The generated CHAC model, the dual-level key management (DLKM) scheme, leverages the collusion-resistant Access Control Polynomial (ACP) and Atallah's Efficient Key Management scheme in order to provide privacy at both the data and user levels. As a result, the proposed model generation algorithm serves to democratize the use of CHAC. We analyze each component of our proposed system and evaluate the resulting performance of the user-friendly CHAC model generation algorithm, as well as the DLKM model itself, along several dimensions.en_US
dc.eprint.versionAuthor's manuscripten_US
dc.identifier.citationYu, X., Haakenson, B., Phillips, T., & Zou, X. (2020). User-Friendly Design of Cryptographically-Enforced Hierarchical Role-based Access Control Models. 2020 29th International Conference on Computer Communications and Networks (ICCCN), 1–9. https://doi.org/10.1109/ICCCN49398.2020.9209656en_US
dc.identifier.urihttps://hdl.handle.net/1805/26596
dc.language.isoenen_US
dc.publisherIEEEen_US
dc.relation.isversionof10.1109/ICCCN49398.2020.9209656en_US
dc.relation.journal2020 29th International Conference on Computer Communications and Networksen_US
dc.rightsPublisher Policyen_US
dc.sourceAuthoren_US
dc.subjectcryptography-based hierarchical access controlen_US
dc.subjectrole-based access controlen_US
dc.subjectkey managementen_US
dc.titleUser-Friendly Design of Cryptographically-Enforced Hierarchical Role-based Access Control Modelsen_US
dc.typeConference proceedingsen_US
Files
Original bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
Yu2020User-AAM.pdf
Size:
1.07 MB
Format:
Adobe Portable Document Format
Description:
License bundle
Now showing 1 - 1 of 1
No Thumbnail Available
Name:
license.txt
Size:
1.99 KB
Format:
Item-specific license agreed upon to submission
Description: