Design and Implementation of Privacy-Preserving, Flexible and Scalable Role-Based Hierarchical Access Control

dc.contributor.authorPhillips, Tyler
dc.contributor.authorYu, Xiaoyuan
dc.contributor.authorHaakenson, Brandon
dc.contributor.authorZou, Xukai
dc.contributor.departmentComputer and Information Science, School of Scienceen_US
dc.date.accessioned2020-12-23T16:28:09Z
dc.date.available2020-12-23T16:28:09Z
dc.date.issued2019-12
dc.description.abstractIn many domains, organizations must model personnel and corresponding data access privileges as fine-grained hierarchical access control models. One class of such models, Role-based Access Control (RBAC) models, has been widely accepted and deployed. However, RBAC models are often used without involving cryptographic keys nor considering confidentiality/privacy at the data level. How to design, implement and dynamically modify such a hierarchy, ensure user and data privacy and distribute and manage necessary cryptographic keys are issues of the utmost importance. One elegant solution for cryptography-based hierarchical access control combines the collusion-resistant and privacy-preserving Access Control Polynomial (ACP) and Atallah's Dynamic and Efficient Extended Key Management scheme. Such a model involves cryptographic keys used to encrypt data, can address confidentiality/privacy at the data level and can efficiently support dynamic changes to the RBAC access hierarchy. In this paper, we discuss several implementation challenges and propose solutions when deploying such a system including: data encryption and decryption, key storage and key distribution. Furthermore, we provide analysis of the efficiency and scalability of the resulting system.en_US
dc.eprint.versionAuthor's manuscripten_US
dc.identifier.citationPhillips, T., Yu, X., Haakenson, B., & Zou, X. (2019). Design and Implementation of Privacy-Preserving, Flexible and Scalable Role-Based Hierarchical Access Control. 2019 First IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications (TPS-ISA), 46–55. https://doi.org/10.1109/TPS-ISA48467.2019.00015en_US
dc.identifier.urihttps://hdl.handle.net/1805/24720
dc.language.isoenen_US
dc.publisherIEEEen_US
dc.relation.isversionof10.1109/TPS-ISA48467.2019.00015en_US
dc.relation.journal2019 First IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications (TPS-ISA)en_US
dc.rightsPublisher Policyen_US
dc.sourceAuthoren_US
dc.subjectcryptography-based hierarchical access controlen_US
dc.subjectkey managementen_US
dc.subjectsecure group communicationen_US
dc.titleDesign and Implementation of Privacy-Preserving, Flexible and Scalable Role-Based Hierarchical Access Controlen_US
dc.typeArticleen_US
Files
Original bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
phillips2019design.pdf
Size:
1.06 MB
Format:
Adobe Portable Document Format
Description:
License bundle
Now showing 1 - 1 of 1
No Thumbnail Available
Name:
license.txt
Size:
1.99 KB
Format:
Item-specific license agreed upon to submission
Description: