Efficient enforcement of dynamic cryptographic access control policies for outsourced data
Kayem, Anne V.D.M., Patrick Martin and Selim G. Akl (2011) Efficient enforcement of dynamic cryptographic access control policies for outsourced data . In Proceedings 10th Information Security South Africa (ISSA), 2011 , pages 1-8, Johanesburg, South Africa.
Outsourcing of their data to third-party service providers is a cost-effective data management strategy for many organizations. Outsourcing, however, introduces new challenges with respect to ensuring the security and the privacy of the data. In addition to the need for standard access control policies, organizations must now be concerned with the privacy of their data and so hiding the data from the service provider is important. Simply encrypting the data before it is transmitted to the service provider is inefficient and vulnerable to security attacks when the access control policies change. Approaches based on two layers of encryption alleviate the privacy concern but still require re-encryption of the data when policies change. This paper presents a novel and efficient solution that employs two layers of encryption of the data and an encrypted data object containing the second access key. Changes to the access control policies are handled by re-encrypting the object containing the affected key, which is an efficient operation. The paper presents our key management approach, a security analysis of our approach, and an evaluation of the performance of a proof of concept implementation of our approach.
|EPrint Type:||Conference Paper|
|Keywords:||Access control , Encryption , Cryptographic Key Management, Outsourcing , Standards organizations , data encapsulation , data privacy|
|Subjects:||E Data: E.3 DATA ENCRYPTION|
C Computer Systems Organization: C.4 PERFORMANCE OF SYSTEMS
|Deposited By:||Kayem, AVDM|
|Deposited On:||18 November 2011|