Skip to main content
Erschienen in: Soft Computing 5/2016

31.05.2015 | Focus

A trusted user-to-role and role-to-key access control scheme

verfasst von: Hsing-Chung Chen

Erschienen in: Soft Computing | Ausgabe 5/2016

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The generalized trusted user-to-role assignment role-based access control (TURA-RBAC) scheme is first integrated and proposed in this paper, which is a new trusted role-based access control (RBAC) model. It could give a solution to cope with the problem on when many malicious users who want to launch insider threats (InTs) are assigned to an RBAC system. In the other words, the untrusted case is a type of InTs. The approach takes the advantages via soft computing approaches which are chosen by the system to evaluate each user in same interactive session. Upon finding some malicious access content, the user will be denied access to the role as well as the role-based RSA key. The main contributions are described as the following: first, this scheme designs a user-to-role assignment utilizing content awareness via soft computing techniques. Second, a novel generalization model of trusted RBAC is defined in this paper, which adds a new role-to-key assignment into the trusted RBAC model. Third, both the RSA algorithm and AKL approach are combined together into the role hierarchy structure in the TURA-RBAC model. Fourth, the dynamic change in role-to-key assignment in the role hierarchy is designed in this paper. In addition, the scheme provides a scheme that could achieve not only reduce the damage from InTs, but also easy implementation for trusted RBAC. In the end, the discussions, comparisons and security analyses are also presented in this paper.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Literatur
Zurück zum Zitat Akl SG, Taylor PD (1983) Cryptographic solution to a problem of access control in a hierarchy. ACM Trans Comput Syst 1(3):239–248CrossRef Akl SG, Taylor PD (1983) Cryptographic solution to a problem of access control in a hierarchy. ACM Trans Comput Syst 1(3):239–248CrossRef
Zurück zum Zitat Balamurugan B, Krishna PV (2015) Enhanced role-based access control for cloud security, artificial intelligence and evolutionary algorithms in engineering systems. Adv Intell Syst Comput 324:837–852CrossRef Balamurugan B, Krishna PV (2015) Enhanced role-based access control for cloud security, artificial intelligence and evolutionary algorithms in engineering systems. Adv Intell Syst Comput 324:837–852CrossRef
Zurück zum Zitat Cao J, Yao ZA (2005) An improved access control scheme for hierarchical groups. In: Proceedings of the 19th international conference on advanced information networking and applications, pp 719–723 Cao J, Yao ZA (2005) An improved access control scheme for hierarchical groups. In: Proceedings of the 19th international conference on advanced information networking and applications, pp 719–723
Zurück zum Zitat Chang CC, Lin C-H, Lee W, Hwang P-C (2004) Secret sharing with access structures in a hierarchy. In: Proceedings of the 18th international conference on advanced information networking and application, pp 123–126 Chang CC, Lin C-H, Lee W, Hwang P-C (2004) Secret sharing with access structures in a hierarchy. In: Proceedings of the 18th international conference on advanced information networking and application, pp 123–126
Zurück zum Zitat Chen HC, Christiana A (2014) A role-based RSA key management approach in a hierarchy scheme. In: Proceedings of eighth international conference on innovative mobile and internet services in ubiquitous computing (IMIS2014), pp 258–264, Birmingham, UK, 2–4 July 2014 Chen HC, Christiana A (2014) A role-based RSA key management approach in a hierarchy scheme. In: Proceedings of eighth international conference on innovative mobile and internet services in ubiquitous computing (IMIS2014), pp 258–264, Birmingham, UK, 2–4 July 2014
Zurück zum Zitat Chen HC (2010) A generalized temporal and spatial role-based access control model. J Netw 5(8):912–920 Chen HC (2010) A generalized temporal and spatial role-based access control model. J Netw 5(8):912–920
Zurück zum Zitat Choi JH, Kang DH, Jang H, Eom YI (2008) Adaptive access control scheme utilizing context awareness in pervasive computing environments. In: Proceedings of IEEE international performance, computing and communications conference (IPCCC 2008), pp 491–498 Choi JH, Kang DH, Jang H, Eom YI (2008) Adaptive access control scheme utilizing context awareness in pervasive computing environments. In: Proceedings of IEEE international performance, computing and communications conference (IPCCC 2008), pp 491–498
Zurück zum Zitat Coyne E, Weil TR (2013) ABAC and RBAC: scalable, flexible, and auditable access management. IT Prof 15(3):14–16CrossRef Coyne E, Weil TR (2013) ABAC and RBAC: scalable, flexible, and auditable access management. IT Prof 15(3):14–16CrossRef
Zurück zum Zitat Desmedt Y (1988)Society and group oriented cryptography: a new concept. In: Proceedings of conference on the theory and applications of cryptographic techniques on advances in cryptology (CRYPTO’87), Springer, Berlin, pp 120–127 Desmedt Y (1988)Society and group oriented cryptography: a new concept. In: Proceedings of conference on the theory and applications of cryptographic techniques on advances in cryptology (CRYPTO’87), Springer, Berlin, pp 120–127
Zurück zum Zitat Feng F, Lin C, Peng D, Li J (2008) A trust and context based access control model for distributed systems. In: Proceedings of 10th IEEE international conference on high performance computing and communications, (HPCC2008), pp 629–634 2008 Feng F, Lin C, Peng D, Li J (2008) A trust and context based access control model for distributed systems. In: Proceedings of 10th IEEE international conference on high performance computing and communications, (HPCC2008), pp 629–634 2008
Zurück zum Zitat Ferraiolo DF, Kuhn DR (1992) Role-based access controls. In: Proceedings of the 15th national computer security conference, pp 554–563, Oct. 13–16, 1992 Ferraiolo DF, Kuhn DR (1992) Role-based access controls. In: Proceedings of the 15th national computer security conference, pp 554–563, Oct. 13–16, 1992
Zurück zum Zitat Ferraiolo DF, Sandhu R, Gavrila S, Kuhn DR, Chandramouli R (2001) Proposed NIST standard for role-based access control. ACM Trans Inf Syst Secur 4(3):224–274CrossRef Ferraiolo DF, Sandhu R, Gavrila S, Kuhn DR, Chandramouli R (2001) Proposed NIST standard for role-based access control. ACM Trans Inf Syst Secur 4(3):224–274CrossRef
Zurück zum Zitat Ghodosi H, Pieprzyk J, Chames C, Naini RS (1996) Algorithm for hierarchical croups. In: Proceedings of 1’st security and privacy conference, pp 275–285 Ghodosi H, Pieprzyk J, Chames C, Naini RS (1996) Algorithm for hierarchical croups. In: Proceedings of 1’st security and privacy conference, pp 275–285
Zurück zum Zitat Lan Z, Varadharajan V, Hitchens M (2013) Integrating trust with cryptographic role-based access control for secure cloud data storage. In: Proceedings of 12th IEEE international conference on trust, security and privacy in computing and communications (Trust Com 2013), pp 560–569 Lan Z, Varadharajan V, Hitchens M (2013) Integrating trust with cryptographic role-based access control for secure cloud data storage. In: Proceedings of 12th IEEE international conference on trust, security and privacy in computing and communications (Trust Com 2013), pp 560–569
Zurück zum Zitat Li H, Wang S,Tian X, Wei W, Sun C (2015) A survey of extended role-based access control in cloud computing. On the proceedings of the 4th international conference on computer engineering and networks, pp 821–831 Li H, Wang S,Tian X, Wei W, Sun C (2015) A survey of extended role-based access control in cloud computing. On the proceedings of the 4th international conference on computer engineering and networks, pp 821–831
Zurück zum Zitat Lu R, Li X, Liang Xi, Shen X, Lin X (2011) GRS: the green, reliability, and security of emerging machine to machine communications. IEEE Commun Mag 49(4):28–35CrossRef Lu R, Li X, Liang Xi, Shen X, Lin X (2011) GRS: the green, reliability, and security of emerging machine to machine communications. IEEE Commun Mag 49(4):28–35CrossRef
Zurück zum Zitat Lu R, Lin X, Zhu H, Liang X, Shen X (2012) BECAN: a bandwidth-efficient cooperative authentication scheme for filtering injected false data in wireless sensor networks. IEEE Trans Parallel distrib Syst 23(1):32–43CrossRef Lu R, Lin X, Zhu H, Liang X, Shen X (2012) BECAN: a bandwidth-efficient cooperative authentication scheme for filtering injected false data in wireless sensor networks. IEEE Trans Parallel distrib Syst 23(1):32–43CrossRef
Zurück zum Zitat May A (2004) Computing the RSA secret key is deterministic polynomial time equivalent to factoring. In: Proceedings on lecture notes in computer science, advances in cryptology—CRYPTO 2004, Springer, Berlin, pp 213–219 May A (2004) Computing the RSA secret key is deterministic polynomial time equivalent to factoring. In: Proceedings on lecture notes in computer science, advances in cryptology—CRYPTO 2004, Springer, Berlin, pp 213–219
Zurück zum Zitat Odelu V, Das AK, Goswami A (2013) Scheme for a user hierarchy based on a hybrid algorithm. Smart Comput Rev 3(1):42–54 Odelu V, Das AK, Goswami A (2013) Scheme for a user hierarchy based on a hybrid algorithm. Smart Comput Rev 3(1):42–54
Zurück zum Zitat Patsakis C, Fountas E (2009) Creating RSA trapdoors using lagrange four square theorem. In: Proceedings of 5th international conference on intelligent information hiding and multimedia signal processing, Kyoto. IEEE, pp 779–782 Patsakis C, Fountas E (2009) Creating RSA trapdoors using lagrange four square theorem. In: Proceedings of 5th international conference on intelligent information hiding and multimedia signal processing, Kyoto. IEEE, pp 779–782
Zurück zum Zitat Rivest RL, Kaliski B (2005) RSA problem. In: van Tilborg HCA (ed) Encyclopedia of cryptography and security. Springer, Berlin Rivest RL, Kaliski B (2005) RSA problem. In: van Tilborg HCA (ed) Encyclopedia of cryptography and security. Springer, Berlin
Zurück zum Zitat Rivest RL, Shamir A, Adleman L (1978) A method for obtaining digital signatures and public-key algorithms. Commun ACM 21(2):120–126MathSciNetCrossRefMATH Rivest RL, Shamir A, Adleman L (1978) A method for obtaining digital signatures and public-key algorithms. Commun ACM 21(2):120–126MathSciNetCrossRefMATH
Zurück zum Zitat Sandhu RS, Coyne EJ, Feinstein HL, Youman CE (1996) Role-based access control models. Computer 29:38–47CrossRef Sandhu RS, Coyne EJ, Feinstein HL, Youman CE (1996) Role-based access control models. Computer 29:38–47CrossRef
Zurück zum Zitat Weber HA (2003) Role-based access control: the NIST solution. Certification: GSEC, Version: 1.4b, Option: 1, SANS Institute Reading Room, Oct. 8, 2003 Weber HA (2003) Role-based access control: the NIST solution. Certification: GSEC, Version: 1.4b, Option: 1, SANS Institute Reading Room, Oct. 8, 2003
Metadaten
Titel
A trusted user-to-role and role-to-key access control scheme
verfasst von
Hsing-Chung Chen
Publikationsdatum
31.05.2015
Verlag
Springer Berlin Heidelberg
Erschienen in
Soft Computing / Ausgabe 5/2016
Print ISSN: 1432-7643
Elektronische ISSN: 1433-7479
DOI
https://doi.org/10.1007/s00500-015-1715-4

Weitere Artikel der Ausgabe 5/2016

Soft Computing 5/2016 Zur Ausgabe