A Higher-Level Security Scheme for Key Access on Cloud Computing
2021, IEEE Access
https://doi.org/10.1109/ACCESS.2021.3101048Abstract
In this work, we construct a key access management scheme that seamlessly transitions any hierarchical-like access policy to the digital medium. The proposed scheme allows any public cloud system to be used as a private cloud. We consider the data owner an entity consisting of several organization units. We provide a secure method for each user of this entity to access the public cloud from both inside and outside the company's network. The idea of our key access control scheme, which is based on Shamir's secret sharing algorithm and polynomial interpolation method, is suitable especially for hierarchical organizational structures. It offers a secure, flexible, and hierarchical key access mechanism for organizations utilizing mission-critical data. It also minimizes concerns about moving mission-critical data to the public cloud and ensures that only users with sufficient approvals from the same or higher privileged users can access the key by making use of the topological ordering of a directed graph, including self-loop. Main overheads such as public and private storage needs are reduced to a tolerable level, and the key derivation is computationally efficient. From a security perspective, our scheme is both resistant to collaboration attacks and provides key indistinguishability security. Since the key does not need to be held anywhere, the problem of a data breach based on key disclosure risk is also eliminated.
References (44)
- E. Thomas, P. Ricardo, and M. Zaigham, Cloud Computing: Concepts, Technology, and Architecture, 1st ed. Upper Saddle River, NJ, USA: Prentice-Hall, 2013.
- M. Peter and G. Timothy, ''The NIST definition of cloud computing, recommendations of the national institute of standards and technology,'' NIST, Gaithersburg, MD, USA, Tech. Rep. 800-145, 2013.
- Information Technology-Cloud Computing-Reference Architecture, Standard ISO/IEC 17789:2014, 2014.
- Information Technology-Cloud Computing-Overview and Vocabulary, Standard ISO/IEC 17788:2014, 2014.
- L. Zhou, V. Varadharajan, and M. Hitchens, ''Achieving secure role-based access control on encrypted data in cloud storage,'' IEEE Trans. Inf. Forensics Security, vol. 8, no. 12, pp. 1947-1960, Dec. 2013.
- S. Kamara and K. Lauter, ''Cryptographic cloud storage,'' in Proc. Int. Conf. Financial Cryptogr. Data Secur., Tenerife, Spain, 2010, pp. 136-149, doi: 10.1007/978-3-642-14992-4_13.
- X. Dong, J. Yu, Y. Luo, Y. Chen, G. Xue, and M. Li, ''Achieving secure and efficient data collaboration in cloud computing,'' in Proc. IEEE/ACM 21st Int. Symp. Qual. Service (IWQoS), Jun. 2013, pp. 1-6, doi: 10.1109/IWQoS.2013.6550281.
- M. Armbrust, A. Fox, R. Griffith, A. D. Joseph, R. Katz, A. Konwinski, G. Lee, D. Patterson, A. Rabkin, I. Stoica, and M. Zaharia, ''A view of cloud computing,'' Commun. ACM, vol. 53, no. 4, pp. 50-58, 2010.
- L. Zhou, V. Varadharajan, and M. Hitchens, ''Trust enhanced cryptographic role-based access control for secure cloud data storage,'' IEEE Trans. Inf. Forensics Security, vol. 10, no. 11, pp. 2381-2395, Nov. 2015.
- S. G. Akl and P. D. Taylor, ''Cryptographic solution to a problem of access control in a hierarchy,'' ACM Trans. Comput. Syst., vol. 1, no. 3, pp. 239-248, 1983.
- S. J. Mackinnon, P. D. Taylor, H. Meijer, and S. G. Akl, ''An optimal algo- rithm for assigning cryptographic keys to control access in a hierarchy,'' IEEE Trans. Comput., vol. C-34, no. 9, pp. 797-802, Sep. 1985.
- R. S. Sandhu, ''Cryptographic implementation of a tree hierarchy for access control,'' Inf. Process. Lett., vol. 27, no. 2, pp. 95-98, 1988.
- L. Harn and H.-Y. Lin, ''A cryptographic key generation scheme for multi- level data security,'' Comput. Secur., vol. 9, no. 6, pp. 539-546, Oct. 1990.
- C.-C. Chang, R.-J. Hwang, and T.-C. Wu, ''Cryptographic key assign- ment scheme for access control in a hierarchy,'' Inf. Syst., vol. 17, no. 3, pp. 243-247, May 1992.
- H. T. Liaw, S. J. Wang, and C. L. Lei, ''A dynamic cryptographic key assignment scheme in a tree structure,'' Comput. Math. Appl., vol. 25, no. 6, pp. 109-114, Mar. 1993.
- M. S. Hwang, C. C. Chang, and W. P. Yang, ''Modified Chang-Hwang-Wu access control scheme,'' Electron. Lett., vol. 29, no. 24, pp. 2095-2096, 1993.
- H.-T. Liaw and C.-L. Lei, ''An optimal algorithm to assign cryptographic keys in a tree structure for access control,'' BIT, vol. 33, no. 1, pp. 46-56, Mar. 1993.
- H. Min-Shiang, ''A cryptographic key assignment scheme in a hierarchy for access control,'' Math. Comput. Model., vol. 26, no. 2, pp. 27-31, Jul. 1997.
- P. D'Arco, A. De Santis, A. L. Ferrara, and B. Masucci, ''Variations on a theme by Akl and Taylor: Security and tradeoffs,'' Theor. Comput. Sci., vol. 411, no. 1, pp. 213-227, 2010.
- W.-G. Tzeng, ''A time-bound cryptographic key assignment scheme for access control in a hierarchy,'' IEEE Trans. Knowl. Data Eng., vol. 14, no. 1, pp. 182-188, Aug. 2002.
- H.-Y. Chen, ''Efficient time-bound hierarchical key assignment scheme,'' IEEE Trans. Knowl. Data Eng., vol. 16, no. 10, pp. 1301-1304, Oct. 2004, doi: 10.1109/TKDE.2004.59.
- G. Ateniese, A. De Santis, A. L. Ferrara, and B. Masucci, ''Provably-secure time-bound hierarchical key assignment schemes,'' J. Cryptol., vol. 25, no. 2, pp. 243-270, 2012, doi: 10.1007/s00145-010-9094-6.
- A. Shamir, ''How to share a secret,'' Commun. ACM, vol. 22, no. 11, pp. 612-613, Nov. 1979.
- X. Yi, ''Security of Chien's efficient time-bound hierarchical key assignment scheme,'' IEEE Trans. Knowl. Data Eng., vol. 17, no. 9, pp. 1298-1299, Sep. 2005, doi: 10.1109/TKDE.2005.152.
- X. Yi and Y. Ye, ''Security of Tzeng's time-bound key assignment scheme for access control in a hierarchy,'' IEEE Trans. Knowl. Data Eng., vol. 15, no. 4, pp. 1054-1055, Jul./Aug. 2003, doi: 10.1109/TKDE.2003.1209023.
- C. Jason, M. Keith, and W. Peter, ''On key assignment for hierarchi- cal access control,'' in Proc. Comput. Secur. Found. Workshop, 2006, pp. 98-111, doi: 10.1109/CSFW.2006.20.
- M. J. Atallah, M. Blanton, N. Fazio, and K. B. Frikken, ''Dynamic and efficient key management for access hierarchies,'' ACM Trans. Inf. Syst. Secur., vol. 12, no. 3, pp. 1-43, Jan. 2009.
- V. R. L. Shen and T.-S. Chen, ''A novel key management scheme based on discrete logarithms and polynomial interpolations,'' Comput. Secur., vol. 21, no. 2, pp. 164-171, 2002.
- E. S. V. Freire, K. G. Paterson, and B. Poettering, ''Simple, efficient and strongly KI-secure hierarchical key assignment schemes,'' in Topics in Cryptology-CT-RSA (Lecture Notes in Computer Science), vol. 7779, E. Dawson, Ed. Berlin, Germany: Springer, 2013.
- E. Bertino, N. Shang, and S. S. Wagstaff, Jr., ''An efficient time-bound hier- archical key management scheme for secure broadcasting,'' IEEE Trans. Dependable Secure Comput., vol. 5, no. 2, pp. 65-70, Apr./Jun. 2008, doi: 10.1109/TDSC.2007.70241.
- Y. F. Chung, H. H. Lee, F. Lai, and T. S. Chen, ''Access control in user hierarchy based on elliptic curve cryptosystem,'' Inf. Sci., vol. 178, no. 1, pp. 230-243, Jan. 2008.
- F.-G. Jeng and C.-M. Wang, ''An efficient key-management scheme for hierarchical access control based on elliptic curve cryptosystem,'' J. Syst. Softw., vol. 79, no. 8, pp. 1161-1167, Aug. 2006.
- H. M. Sun, K. H. Wang, and C. M. Chen, ''On the security of an efficient time-bound hierarchical key management scheme,'' IEEE Trans. Depend- able Secure Comput., vol. 6, no. 2, pp. 159-160, Apr. 2009.
- A. K. Das, N. R. Paul, and L. Tripathy, ''Cryptanalysis and improvement of an access control in user hierarchy based on elliptic curve cryptosystem,'' Inf. Sci., vol. 209, pp. 80-92, Nov. 2012.
- Y.-L. Lin and C.-L. Hsu, ''Secure key management scheme for dynamic hierarchical access control based on ECC,'' J. Syst. Softw., vol. 84, no. 4, pp. 679-685, 2011.
- A. De Santis, A. L. Ferrara, and B. Masucci, ''Efficient provably-secure hierarchical key assignment schemes,'' Theor. Comput. Sci., vol. 412, no. 41, pp. 5684-5699, 2011.
- H. R. Hassen, H. Bettahar, A. Bouadbdallah, and Y. Challal, ''An efficient key management scheme for content access control for linear hierarchies,'' Comput. Netw., vol. 56, no. 8, pp. 2107-2118, May 2012.
- S. Tang, X. Li, X. Huang, Y. Xiang, and L. Xu, ''Achieving simple, secure and efficient hierarchical access control in cloud computing,'' IEEE Trans. Comput., vol. 65, no. 7, pp. 2325-2331, Jul. 2016.
- L. Page, S. Brin, R. Motwani, and T. Winograd, ''The PageRank citation ranking: Bringing order to the web,'' Stanford InfoLab, Stanford, CA, USA, Tech. Rep. 1999-66.
- M. Abadi et al., ''TensorFlow: A system for large-scale machine learning,'' in Proc. 12th USENIX Symp. Oper. Syst. Design Implement. (OSDI), Savannah, GA, USA, 2016, pp. 265-283.
- C.-L. Hsu and T.-S. Wu, ''Cryptanalyses and improvements of two cryp- tographic key assignment schemes for dynamic access control in a user hierarchy,'' Comput. Secur., vol. 22, no. 5, pp. 453-456, Jul. 2003.
- S. Zhong and T. Lin, ''A comment on the Chen-Chung scheme for hier- archical access control,'' Comput. Secur., vol. 22, no. 5, pp. 450-452, Jul. 2003.
- D. Tiwari and G. R. Gangadharan, ''SecCloudSharing: Secure data sharing in public cloud using ciphertext-policy attribute-based proxy re-encryption with revocation,'' Int. J. Commun. Syst., vol. 31, no. 5, p. e3494, Mar. 2018.
- D. E. Knuth, The Art of Computer Programming, 3rd ed. Reading, MA, USA: Addison-Wesley, 1998. BARIS CELIKTAS received the B.S. degree in system engineering from Turkish Military Academy, Turkey, in 2008, the M.S. degree in international relations from Karadeniz Technical University, in 2016, and the M.S. degree in applied informatics from Istanbul Technical University, in 2018, where he is currently pursuing the Ph.D.