TRUST ENHANCEMENT USING RING SIGNATURE FOR RBAC IN CLOUD STORAGE

Authors

  • Sneha K S Master of Engineering, Dept. of CSE, Dhanalakshmi Srinivasan College of Engineering, Coimbatore, India.

Keywords:

RBAC, Tust Models, Ring Signature

Abstract

Cloud data storage has provided significant benefits by allowing users to store massive amount of data on demand in a cost-effective manner. To protect the privacy of data stored in the cloud cryptographic role -based access control (RBAC) schemes have been developed to ensure that data can only be accessed by those who are allowed by access policies. Trust models improve the security for stored data in cloud storage systems that use cryptographic RBAC schemes. The trust models take into account role inheritance and hierarchy in the evaluation of trustworthiness of roles. The existing trust models to assist (i) the data owners to evaluate the trust on the roles in a RBAC system and use this trust evaluation to decide whether to store their encrypted data in the cloud for a particular role, and (ii) the roles to evaluate the trust on the users in the RBAC system and use this trust in the decision to grant the membership to a user. The proposed system ensures a trust-based cloud storage system which shows how the trust models can be integrated into a system that uses cryptographic RBAC schemes along with ring signature. Ring signature is a type of digital signature that can be performed by any member of a group of users that each have keys. One of the security properties of a ring signature is that it should be computationally infeasible to determine which of the group member’s keys was used to produce the signature. A ring signature scheme is a triple of ppt algorithms (Gen, Sign, and Vrfy) that, respectively, generate keys for a user, sign a message, and verify the signature of a message.

References

D. F. Ferraiolo and D. R. Kuhn, “Role-based access controls,” in Proceedings of the 15th NIST-NCSC National Computer Security Conference. NIST, National Computer Security Center, October 10-13 1992, pp. 554 – 563.

Lan Zhou,Vijay Varadharajan,and Michael Hitchens “Trust Enhanced Cryptographic Role-based Access Control for Secure Cloud Data Storage” IEEE Transactions on Information Forensics and Security, vol. 10, issue: 11, Page(s): 2381 – 2395, November 2015.

L. Zhou, V. Varadharajan, and M. Hitchens, “Achieving Secure Role- Based Access Control on Encrypted Data in Cloud Storage,” IEEE Transactions on Information Forensics and Security, vol. 8, no. 12, pp. 1947–1960, 2013.

Y. Zhu, H. Hu, G.-J. Ahn, H. Wang, and S.-B. Wang, “Provably secure role-based encryption with revocation mechanism,” Journal of Computer Science and Technology, vol. 26, no. 4, pp. 697–

L. Zhou, V. Varadharajan, and M. Hitchens, “Enforcing role-based access control for secure data storage in the cloud,” The Computer Journal, vol. 54, no. 13, pp. 1675–1687, October 2011.

L. Zhou, V. Varadharajan, and M. Hitchens, “Integrating trust with cryptographic role-based access control for secure cloud data storage,” in TrustCom 2013. IEEE, July 2013, pp. 560–569.

M. Toahchoodee, R. Abdunabi, I. Ray, and I. Ray, “A trust-based access control model for pervasive computing applications,” in DBSec 2009, ser. LNCS, vol. 5645. Springer, July 12-15 2009, pp. 307–314.

S. D. C. di Vimercati, S. Foresti, S. Jajodia, S. Paraboschi, and P. Samarati, “A data outsourcing architecture combining cryptography and access control,” in Proceedings of CSAW 2007. ACM, November 2 2007, pp. 63–69.

S. D. C. D. Vimercati, S. Foresti, S. Jajodia, S. Paraboschi, and P. Samarati, “Over-encryption: Management of access control evolution on outsourced data,” in VLDB. ACM, September 23-27 2007, pp. 123– 134.

S. Chakraborty and I. Ray, “Trustbac - integrating trust relationships into the rbac model for access control in open systems,” in SACMAT 2006. ACM, June 2006, pp. 49–58.

Additional Files

Published

30-04-2019

How to Cite

Sneha K S. (2019). TRUST ENHANCEMENT USING RING SIGNATURE FOR RBAC IN CLOUD STORAGE. International Educational Journal of Science and Engineering, 2(2). Retrieved from https://iejse.com/journals/index.php/iejse/article/view/28