MLS-ABAC: Efficient Multi-Level Security Attribute-Based Access Control scheme
نویسندگان
چکیده
Realizing access control to sensitive data offloaded a Cloud is challenging in the Internet of Things, where various devices with low computational power and different security levels are interconnected. Despite solutions, National Institute Standards Technology (NIST)’s Attribute-Based Access Control (ABAC) model one preferred techniques literature. In this model, users who satisfy policies using both static dynamic attributes allowed data. However, NIST’s ABAC does not support encryption therefore confidentiality. Encryption (ABE) known cryptographic primitive that enables fine-grained over encrypted currently existing ABE schemes do meet requirements or computationally efficient enough for IoT applications. paper, we propose Multi-Level Security (MLS-ABAC) scheme satisfies model. Our construction relies on decryption outsourceable Ciphertext-Policy scheme. Additionally, based realistic application scenarios, only authorized can decrypt ciphertext, check integrity retrieved message. Furthermore, present conceptual formal models our proposed MLS-ABAC architecture along performance metrics. The experimental results show achieves constant ciphertext size ∼230 bytes running times ∼18 ∼10 ms, respectively, independent number attributes.
منابع مشابه
Strategies for Incorporating Delegation into Attribute-Based Access Control (ABAC)
Attribute-Based Access Control (ABAC) is an emerging model of access control that has gained significant interest in both recent academic literature and industry application. However, to date there have been almost no attempts to incorporate the concept of dynamic delegation into ABAC. This work lays out a number of possible strategies for incorporating delegation into existing ABAC models and ...
متن کاملA "privacy by design" eID scheme supporting Attribute-based Access Control (ABAC)
This eID scheme built along "privacy by design" principles covers a full range of identification using a single mechanism starting from the use of pseudonyms, followed by a gradual disclosure of some attributes with the consent of the end-user, up to the disclosure of a sufficient number attributes that allows a full identification of an end-user under a given context, again with the consent of...
متن کاملMT-ABAC: A Multi-Tenant Attribute-Based Access Control Model with Tenant Trust
A major barrier to the adoption of cloud Infrastructure-as-aService (IaaS) is collaboration, where multiple tenants engage in collaborative tasks requiring resources to be shared across tenant boundaries. Currently, cloud IaaS providers focus on multi-tenant isolation, and offer limited or no cross-tenant access capabilities in their IaaS APIs. In this paper, we present a novel attribute-based ...
متن کاملEfficient Multi-level Threshold Attribute Based Encryption
Anonymous access control is a very desirable property in various applications e.g. encrypted storage in distributed environments; and attribute based encryption (ABE) is a cryptographic scheme that is targeted to achieve this property. ABE is an encryption mechanism that is useful in settings where the list of users may not be known apriori, but all users may possess certain credentials which c...
متن کاملAttribute-Based Access Control Scheme for Security of Cloud Storage Systems Using RNS Cryptography
Emerging features of the cloud storage services enables data owners to store their big data in the cloud and provide the data access to the users. As privacy and security of the cloud server is not ensured, an Attribute-Based Encryption (ABE) a promising technique for data access control in cloud storage is utilized in this project. Attribute-based encryption, especially for cipher text-policy ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Future Generation Computer Systems
سال: 2022
ISSN: ['0167-739X', '1872-7115']
DOI: https://doi.org/10.1016/j.future.2022.01.003