[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/3320269.3384767acmconferencesArticle/Chapter ViewAbstractPublication Pagesasia-ccsConference Proceedingsconference-collections
research-article

Exploring Architectures for Cryptographic Access Control Enforcement in the Cloud for Fun and Optimization

Published: 05 October 2020 Publication History

Abstract

To facilitate the adoption of cloud by organizations, Cryptographic Access Control (CAC) is the obvious solution to control data sharing among users while preventing partially trusted Cloud Service Providers (CSP) from accessing sensitive data. Indeed, several CAC schemes have been proposed in the literature. Despite their differences, available solutions are based on a common set of entities---e.g., a data storage service or a proxy mediating the access of users to encrypted data---that operate in different (security) domains---e.g., on-premise or the CSP. However, the majority of the CAC schemes assume a fixed assignment of entities to domains; this has security and usability implications that are not made explicit and can make inappropriate the use of a CAC scheme in certain scenarios with specific requirements. For instance, assuming that the proxy runs at the premises of the organization avoids the vendor lock-in effect but may substantially undermine scalability.
To the best of our knowledge, no previous work considers how to select the best possible architecture (i.e., the assignment of entities to domains) to deploy a CAC scheme for the requirements of a given scenario. In this paper, we propose a methodology to assist administrators in exploring different architectures of CAC schemes for a given scenario. We do this by identifying the possible architectures underlying the CAC schemes available in the literature and formalizing them in simple set theory. This allows us to reduce the problem of selecting the most suitable architecture satisfying a heterogeneous set of requirements arising from the considered scenario to a Multi-Objective Optimization Problem (MOOP) for which state-of-the-art solvers can be invoked. Finally, we show how the capability of solving the MOOP can be used to build a prototype tool assisting administrators to preliminary perform a "What-if'' analysis to explore the trade-offs among the various architectures and then use available standards and tools (such as TOSCA and Cloudify) for automated deployment in multiple CSPs.

Supplementary Material

MP4 File (3320269.3384767.mp4)
The video presents the main contributions of the paper entitled "Exploring Architectures for Cryptographic Access Control Enforcement in the Cloud for Fun and Optimization" written by Stefano Berlato, Roberto Carbone and Silvio Ranise from Fondazione Bruno Kessler (FBK), Italy, and Adam J. Lee from the University of Pittsburgh. In the first part, the video introduces the context of Cryptographic Access Control (CAC), the addressed problem and the proposed solution. Then, the video goes through the main contributions of the paper, that are a model for CAC architectures in the cloud, so to express a set of possible architectures for CAC, the formalization of a Multi-Objective Optimization Problem for selecting the best architecture and then the assisted and automated deployment of CAC architectures.

References

[1]
Assad Abbas and Samee U. Khan. A Review on the State-of-the-Art Privacy-Preserving Approaches in the e-Health Clouds. IEEE Journal of Biomedical and Health Informatics, 18(4):1431--1441, July 2014.
[2]
Mikhail J. Atallah, Marina Blanton, Nelly Fazio, and Keith B. Frikken. Dynamic and efficient key management for access hierarchies. ACM Trans. Inf. Syst. Secur., 12(3):18:1--18:43, January 2009.
[3]
John Bethencourt, Amit Sahai, and Brent Waters. Ciphertext-policy attribute-based encryption. In 2007 IEEE Symposium on Security and Privacy (SP '07), 05 2007.
[4]
Arnar Birgisson, Joe Gibbs Politz, Úlfar Erlingsson, Ankur Taly, Michael Vrable, and Mark Lentczner. Macaroons: Cookies with contextual caveats for decentralized authorization in the cloud. In, 01 2014.
[5]
Ning Cao, Cong Wang, Ming Li, Kui Ren, and Wenjing Lou. Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data. IEEE Transactions on Parallel and Distributed Systems, 25(1):222--233, January 2014.
[6]
Marios D. Dikaiakos, Dimitrios Katsaros, Pankaj Mehra, George Pallis, and Athena Vakali. Cloud Computing: Distributed Internet Computing for IT and Scientific Research. IEEE Internet Computing, 13(5):10--13, September 2009.
[7]
Josep Domingo-Ferrer, Oriol Farràs, Jordi Ribes-González, and David Sánchez. Privacy-preserving cloud computing on sensitive data: A survey of methods, products and challenges. Computer Communications, 140--141:38--60, May 2019.
[8]
Anna Lisa Ferrara, Georg Fachsbauer, Bin Liu, and Bogdan Warinschi. Policy Privacy in Cryptographic Access Control. In 2015 IEEE 28th Computer Security Foundations Symposium, pages 46--60, Verona, July 2015. IEEE.
[9]
Sara Foresti, Sushil Jajodia, Stefano Paraboschi, and Pierangela Samarati. Encryption policies for regulating access to outsourced data. ACM Transactions on Database Systems (TODS), 35:12, 04 2010.
[10]
William C. Garrison, Adam Shull, Steven Myers, and Adam J. Lee. On the Practicality of Cryptographically Enforcing Dynamic Access Control Policies in the Cloud. In 2016 IEEE Symposium on Security and Privacy (SP), pages 819--838, San Jose, CA, May 2016. IEEE.
[11]
Valentin Ghita, Sergiu Costea, and Nicolae Tapus. Implementation of cryptographically enforced rbac. The Scientific Bulletin - University Politehnica of Bucharest, 79(2):9--3--102, 2017.
[12]
Vipul Goyal, Abhishek Jain, Omkant Pandey, and Amit Sahai. Bounded ciphertext policy attribute based encryption. In ICALP '08 Proceedings of the 35th international colloquium on Automata, Languages and Programming, Part II, pages 579--591, 07 2008.
[13]
Vipul Goyal, Omkant Pandey, Amit Sahai, and Brent Waters. Attribute-based encryption for fine-grained access control of encrypted data. In Proceedings of the ACM Conference on Computer and Communications Security, pages 89--98, 01 2006.
[14]
Horst W. Hamacher, Christian Roed Pedersen, and Stefan Ruzika. Multiple objective minimum cost flow problems: A review. European Journal of Operational Research, 176(3):1404--1422, February 2007.
[15]
Felix Horandner, Stephan Krenn, Andrea Migliavacca, Florian Thiemer, and Bernd Zwattendorfer. CREDENTIAL: A Framework for Privacy-Preserving Cloud-Based Data Sharing. In 2016 11th International Conference on Availability, Reliability and Security (ARES), pages 742--749, Salzburg, Austria, August 2016. IEEE.
[16]
Jeremy Horwitz and Ben Lynn. Toward hierarchical identity-based encryption. In Advances in Cryptology - EUROCRYPT 2002, International Conference on the Theory and Applications of Cryptographic Techniques, pages 466--481, 04 2002.
[17]
Yashpalsinh Jadeja and Kirit Modi. Cloud computing - concepts, architecture and challenges. In 2012 International Conference on Computing, Electronics and Electrical Technologies (ICCEET), pages 877--880, Nagercoil, Tamil Nadu, India, March 2012. IEEE.
[18]
Julian Jang-Jaccard. A Practical Client Application Based on Attribute Based Access Control for Untrusted Cloud Storage. In Computer Science & Information Technology, pages 01--15. Academy & Industry Research Collaboration Center (AIRCC), January 2018.
[19]
Md. Tanzim Khorshed, A.B.M. Shawkat Ali, and Saleh A. Wasimi. A survey on gaps, threat remediation challenges and some thoughts for proactive attack detection in cloud computing. Future Generation Computer Systems, 28(6):833--851, June 2012.
[20]
Rakesh Kumar and Rinkaj Goyal. On cloud security requirements, threats, vulnerabilities and countermeasures: A survey. Computer Science Review, 33:1--48, August 2019.
[21]
Thomas Loruenser, Daniel Slamanig, Thomas Langer, and Henrich C. Pohls. PRISMACLOUD Tools: A Cryptographic Toolbox for Increasing Security in Cloud Services. In 2016 11th International Conference on Availability, Reliability and Security (ARES), pages 733--741, Salzburg, Austria, August 2016. IEEE.
[22]
R.T. Marler and J.S. Arora. Survey of multi-objective optimization methods for engineering. Structural and Multidisciplinary Optimization, 26(6):369--395, April 2004.
[23]
Sascha Muller and Stefan Katzenbeisser. Hiding the policy in cryptographic access control. In Security and Trust Management, pages 90--105, 2012.
[24]
Rafail Ostrovsky, Amit Sahai, and Brent Waters. Attribute-based encryption with non-monotonic access structures. In CCS '07 Proceedings of the 14th ACM conference on Computer and communications security, pages 195--203, 01 2007.
[25]
Praveen Kumar P, Syam Kumar P, and Alphonse P.J.A. Attribute based encryption in cloud computing: A survey, gap analysis, and future directions. Journal of Network and Computer Applications, 108:37--52, April 2018.
[26]
David W. Pentico. Assignment problems: A golden anniversary survey. European Journal of Operational Research, 176(2):774--793, January 2007.
[27]
R. Perlman. File System Design with Assured Delete. In Third IEEE International Security in Storage Workshop (SISW'05), pages 83--88, San Francisco, CA, USA, 2005. IEEE.
[28]
Uthpala Premarathne, Alsharif Abuadbba, Abdulatif Alabdulatif, Ibrahim Khalil, Zahir Tari, Albert Zomaya, and Rajkumar Buyya. Hybrid Cryptographic Access Control for Cloud-Based EHR Systems. IEEE Cloud Computing, 3(4):58--64, July 2016.
[29]
Saiyu Qi and Yuanqing Zheng. Crypt-DAC: Cryptographically Enforced Dynamic Access Control in the Cloud. IEEE Transactions on Dependable and Secure Computing, pages 1--1, 2019.
[30]
Gururaj Ramachandra, Mohsin Iftikhar, and Farrukh Aslam Khan. A Comprehensive Survey on Security in Cloud Computing. Procedia Computer Science, 110:465--472, 2017.
[31]
E. Ramirez, J. Brill, M.K. Ohlhausen, J.D. Wright, and T. McSweeny. Data brokers: A call for transparency and accountability. In Data brokers: A call for transparency and accountability, pages 1--101. CreateSpace Independent Publishing Platform, January 2014.
[32]
Fatemeh Rezaeibagha and Yi Mu. Distributed clinical data sharing via dynamic access-control policy transformation. International Journal of Medical Informatics, 89:25--31, May 2016.
[33]
R. L. Rivest, A. Shamir, and L. Adleman. A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM, 21(2):120--126, February 1978.
[34]
Pierangela Samarati and Sabrina de Capitani di Vimercati. Access control: Policies, models, and mechanisms. In Riccardo Focardi and Roberto Gorrieri, editors, Foundations of Security Analysis and Design, volume 2171, pages 137--196. Springer Berlin Heidelberg, 2000.
[35]
Ravi Sandhu. Access control: principle and practice. Advances in Computers, 46:237 -- 286, 10 1998.
[36]
Hiroyuk Sato and Somchart Fugkeaw. Design and Implementation of Collaborative Ciphertext-Policy Attribute-Role based Encryption for Data Access Control in Cloud. Journal of Information Security Research, 6(3):71--84, September 2015.
[37]
Adi Shamir. How to share a secret. Communications of the ACM, 22(11):612--613, November 1979.
[38]
Ashish Singh and Kakali Chatterjee. Cloud security issues and challenges: A survey. Journal of Network and Computer Applications, 79:88--115, February 2017.
[39]
Yang Tang, Patrick P.C. Lee, John C.S. Lui, and Radia Perlman. Secure Overlay Cloud Storage with Access Control and Assured Deletion. IEEE Transactions on Dependable and Secure Computing, 9(6):903--916, November 2012.
[40]
Saman Zarandioon, Danfeng Yao, and Vinod Ganapathy. K2c: Cryptographic Cloud Storage with Lazy Revocation and Anonymous Access. In Muttukrishnan Rajarajan, Fred Piper, Haining Wang, and George Kesidis, editors, Security and Privacy in Communication Networks, volume 96, pages 59--76. Springer Berlin Heidelberg, Berlin, Heidelberg, 2012.
[41]
Lan Zhou, Vijay Varadharajan, and Michael Hitchens. Achieving Secure Role-Based Access Control on Encrypted Data in Cloud Storage. IEEE Transactions on Information Forensics and Security, 8(12):1947--1960, December 2013.

Cited By

View all
  • (2024)Cloud-Enhanced Machine Learning Models for Predictive Maintenance in Industrial IoT2024 International Conference on Trends in Quantum Computing and Emerging Business Technologies10.1109/TQCEBT59414.2024.10545129(1-5)Online publication date: 22-Mar-2024
  • (2024)A Secure Data Encryption Mechanism in Cloud Using Elliptic Curve Cryptography2024 International Conference on Intelligent and Innovative Technologies in Computing, Electrical and Electronics (IITCEE)10.1109/IITCEE59897.2024.10467407(1-5)Online publication date: 24-Jan-2024
  • (2024)Segmentation of Liver Tumors in CT Scans Using Active Contour Models and Machine Learning2024 IEEE International Conference on Communication, Computing and Signal Processing (IICCCS)10.1109/IICCCS61609.2024.10763688(1-5)Online publication date: 19-Sep-2024
  • Show More Cited By

Index Terms

  1. Exploring Architectures for Cryptographic Access Control Enforcement in the Cloud for Fun and Optimization

      Recommendations

      Comments

      Please enable JavaScript to view thecomments powered by Disqus.

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      ASIA CCS '20: Proceedings of the 15th ACM Asia Conference on Computer and Communications Security
      October 2020
      957 pages
      ISBN:9781450367509
      DOI:10.1145/3320269
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Sponsors

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 05 October 2020

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. architecture
      2. cryptographic access control
      3. optimization

      Qualifiers

      • Research-article

      Funding Sources

      • National Science Foundation
      • FINSEC

      Conference

      ASIA CCS '20
      Sponsor:

      Acceptance Rates

      Overall Acceptance Rate 418 of 2,322 submissions, 18%

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)63
      • Downloads (Last 6 weeks)7
      Reflects downloads up to 20 Dec 2024

      Other Metrics

      Citations

      Cited By

      View all
      • (2024)Cloud-Enhanced Machine Learning Models for Predictive Maintenance in Industrial IoT2024 International Conference on Trends in Quantum Computing and Emerging Business Technologies10.1109/TQCEBT59414.2024.10545129(1-5)Online publication date: 22-Mar-2024
      • (2024)A Secure Data Encryption Mechanism in Cloud Using Elliptic Curve Cryptography2024 International Conference on Intelligent and Innovative Technologies in Computing, Electrical and Electronics (IITCEE)10.1109/IITCEE59897.2024.10467407(1-5)Online publication date: 24-Jan-2024
      • (2024)Segmentation of Liver Tumors in CT Scans Using Active Contour Models and Machine Learning2024 IEEE International Conference on Communication, Computing and Signal Processing (IICCCS)10.1109/IICCCS61609.2024.10763688(1-5)Online publication date: 19-Sep-2024
      • (2024)Algorithmic Approaches to Securing Cloud Environments in the Realm of Cybersecurity2024 10th International Conference on Communication and Signal Processing (ICCSP)10.1109/ICCSP60870.2024.10543914(697-702)Online publication date: 12-Apr-2024
      • (2023)Exploring Cryptographic Paradigms for Secure Cloud Computing2023 Second International Conference on Augmented Intelligence and Sustainable Systems (ICAISS)10.1109/ICAISS58487.2023.10250744(1290-1294)Online publication date: 23-Aug-2023
      • (2022)An enhanced bacterial foraging optimization algorithm for secure data storage and privacy-preserving in cloudPeer-to-Peer Networking and Applications10.1007/s12083-022-01322-715:4(2007-2020)Online publication date: 28-May-2022
      • (2021)Formal Modelling and Automated Trade-off Analysis of Enforcement Architectures for Cryptographic Access Control in the CloudACM Transactions on Privacy and Security10.1145/347405625:1(1-37)Online publication date: 23-Nov-2021
      • (2021)Blockchain Based RAN Data Sharing2021 IEEE International Conference on Smart Data Services (SMDS)10.1109/SMDS53860.2021.00029(152-161)Online publication date: Sep-2021

      View Options

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media