Skip to main content
Log in

Garbled role-based access control in the cloud

  • Original Research
  • Published:
Journal of Ambient Intelligence and Humanized Computing Aims and scope Submit manuscript

Abstract

Security has always been a major concern in the cloud environment because outsourcing leads to the new security issues. Privacy risks related to the job assignment are the dominating hurdles in the wide organizations like research, military and intelligence. To address this issue Garbled Role-Based Access Control (GRBAC) mechanism is being offered in this paper having key component that obliviously assign roles to the users through (RSA Oblivious-Transfer). The design of the proposed model has been guided by the Role-Based Access Control and Dynamic Separation of Duty. The proposed model also includes the flexible authentication based on the user’s context information. GRBAC offers fine-grained security while algorithm does not have to be secret from adversary. Security of this model is based on the adopted Garbled Function (\(f_g\)). The proposed model is best suited for the organizations where available roles cannot be revealed to the users and assigned roles are not to be leaked even to the server.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3

Similar content being viewed by others

References

  • Amounas F, El Kinani E (2012) ECC encryption and decryption with a data sequence. Appl Math Sci 6(101):5039–5047

    MathSciNet  MATH  Google Scholar 

  • Ben Fadhel A, Bianculli D, Briand L, Hourte B (2016) A model-driven approach to representing and checking RBAC contextual policies. In: Proceedings of the sixth ACM conference on data and application security and privacy, ACM, pp 243–253

  • Chen HC (2016) A trusted user-to-role and role-to-key access control scheme. Soft Comput 20(5):1721–1733

    Article  Google Scholar 

  • Combi C, Vigano L, Zavatteri M (2016) Security constraints in temporal role-based access-controlled work-flows. In: Proceedings of the sixth ACM conference on data and application security and privacy, ACM, pp 207–218

  • Denning DE, MacDoran PF (1996) Location-based authentication: grounding cyberspace for better security. Comput Fraud Secur 2:12–16

    Article  Google Scholar 

  • Even S, Goldreich O, Lempel A (1985) A randomized protocol for signing contracts. Commun ACM 28(6):637–647

    Article  MathSciNet  MATH  Google Scholar 

  • Ferrara A L, Fachsbauer G, Liu B, Warinschi B (2015) Policy privacy in cryptographic access control. In: Computer security foundations symposium (CSF) 2015, IEEE 28th, IEEE, pp 46–60

  • Fugkeaw S, Sato H (2015) Privacy-preserving access control model for big data cloud. In: Computer science and engineering conference (ICSEC), 2015 International, IEEE, pp 1–6

  • Fugkeaw S, Sato H (2015) An extended CP-ABE based access control model for data outsourced in the cloud. Computer software and applications conference (COMPSAC), 2015 IEEE 39th annual, IEEE, vol 3, pp 73–78

  • Gentry C (2009) A fully homomorphic encryption scheme. PhD thesis, Stanford University

  • Goldwasser S, Kalai Y, Popa R A, Vaikuntanathan V, Zeldovich N (2013) Reusable garbled circuits and succinct functional encryption. In: Proceedings of the forty-fifth annual ACM symposium on theory of computing, ACM, pp 555–564

  • Garrison WC III, Shull A, Myers S, Lee AJ (2016) On the practicality of cryptographically enforcing dynamic access control policies in the cloud (extended version). arXiv preprint arXiv:1602.09069

  • Ishai Y, Kilian J, Nissim K, Petrank E (2003) Extending oblivious transfers efficiently. Annual international cryptology conference. Springer, pp 145–161

  • Jih WR, Cheng SY, Hsu JY, Tsai TM et al (2005) Context-aware access control in pervasive healthcare. Computer Science and Information Engineering, National Taiwan University, Taiwan. jih@ agents. csie.ntu.edu.tw. r93070, yjhsu@csie.ntu.edu

  • Lindell Y, Pinkas B (2009) A proof of security of Yaos protocol for two-party computation. J Cryptol 22(2):161–188

    Article  MathSciNet  MATH  Google Scholar 

  • Lu R, Lin X, Zhu H, Liang X, Shen X (2012) Becan: a bandwidth-efficient cooperative authentication scheme for filtering injected false data in wireless sensor networks. IEEE Trans Parallel Distrib Syst 23(1):32–43

    Article  Google Scholar 

  • Naor M, Pinkas B (2001) Efficient oblivious transfer protocols. In: Proceedings of the twelfth annual ACMSIAM symposium on discrete algorithms. Society for Industrial and Applied Mathematics, pp 448–457

  • Ni Q, Bertino E, Lobo J, Brodie C, Karat CM, Karat J, Trombeta A (2010) Privacy-aware role-based access control. ACM Trans Inf Syst Secur TISSEC 13(3):24

    Google Scholar 

  • Nali D, Adams C, Miri A (2004) Using mediated identity-based cryptography to support role-based access control. International conference on information security. Springer, Berlin, pp 245–256

  • Pritam D, Chatterjee M (2016) Enforcing role-based access control for secure data storage in cloud using authentication and encryption techniques. J Netw Commun Emerg Technol JNCET 6(4). www.jncet.org

  • Rabin MO (2005) How to exchange secrets with oblivious transfer. IACR Cryptol ePrint Arch 2005:187

    Google Scholar 

  • Selvi MS, Ganesan MR (2016) An efficient access control protocol for cloud data security using hyper elliptic curve cryptography. Trustee 6(4)

  • Vidya K, Alamelu V, Kumar KS, Chandraa LS (2016) Quantum cryptographic approach to decentralized access control and privacy preserving in cloud. Asian J Inf Technol 15(3):578–592

    Google Scholar 

  • Wang Y, Malluhi QM (2016) Privacy preserving computation in cloud using noise-free fully homomorphic encryption (FHE) schemes. European symposium on research in computer security, Springer, pp 301–323

  • Wang Y, Malluhi QM, Khan KM (2016) Garbled computation in cloud. Future Gener Comput Syst 62:54–65

    Article  Google Scholar 

  • Yao A (2012) Protocols for secure computations (extended abstract). In: Proceedings. 23rd IEEE symposium on foundations of computer science, pp 160–164

  • Zhou X, Tang X (2011) Research and implementation of rsa algorithm for encryption and decryption. Strategic Technology (IFOST). 2011 6th International Forum IEEE 2:1118–1121

  • Zhou L, Varadharajan V, Hitchens M (2014) Secure administration of cryptographic role-based access control for large-scale cloud storage systems. J Comput Syst Sci 80(8):1518–1533

    Article  MathSciNet  MATH  Google Scholar 

  • Zhou X, Liu J, Liu W, Wu Q (2015) Anonymous role-based access control on e-health records. In: Proceedings of the 11th ACM on Asia conference on computer and communications security, ACM, pp 559–570

  • Zhou L, Varadharajan V, Hitchens M (2015) Trust enhanced cryptographic role-based access control for secure cloud data storage. IEEE Trans Inf Forensics Secur 10(11):2381–2395

    Article  Google Scholar 

  • Zhang R, Liu L, Xue R (2014) Role-based and time-bound access and management of EHR data. Secur Commun Netw 7(6):994–1015

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Masoom Alam.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Alam, M., Emmanuel, N., Khan, T. et al. Garbled role-based access control in the cloud. J Ambient Intell Human Comput 9, 1153–1166 (2018). https://doi.org/10.1007/s12652-017-0573-6

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12652-017-0573-6

Keywords

Navigation