Title
Encryption policies for regulating access to outsourced data
Abstract
Current access control models typically assume that resources are under the strict custody of a trusted party which monitors each access request to verify if it is compliant with the specified access control policy. There are many scenarios where this approach is becoming no longer adequate. Many clear trends in Web technology are creating a need for owners of sensitive information to manage access to it by legitimate users using the services of honest but curious third parties, that is, parties trusted with providing the required service but not authorized to read the actual data content. In this scenario, the data owner encrypts the data before outsourcing and stores them at the server. Only the data owner and users with knowledge of the key will be able to decrypt the data. Possible access authorizations are to be enforced by the owner. In this article, we address the problem of enforcing selective access on outsourced data without need of involving the owner in the access control process. The solution puts forward a novel approach that combines cryptography with authorizations, thus enforcing access control via selective encryption. The article presents a formal model for access control management and illustrates how an authorization policy can be translated into an equivalent encryption policy while minimizing the amount of keys and cryptographic tokens to be managed. The article also introduces a two-layer encryption approach that allows the data owner to outsource, besides the data, the complete management of the authorization policy itself, thus providing efficiency and scalability in dealing with policy updates. We also discuss experimental results showing that our approach is able to efficiently manage complex scenarios.
Year
DOI
Venue
2010
10.1145/1735886.1735891
ACM Trans. Database Syst.
Keywords
Field
DocType
access request,current access control model,data owner,encryption policy,specified access control policy,privacy,Encryption policy,authorization policy,data outsourcing,outsourced data,access control,possible access authorization,selective access,access control process,access control management
Data outsourcing,Computer science,Encryption,Access control,Database
Journal
Volume
Issue
ISSN
35
2
0362-5915
Citations 
PageRank 
References 
62
1.74
36
Authors
5
Name
Order
Citations
PageRank
Sabrina De Capitani Di Vimercati13991350.57
S. Foresti2100464.12
Sushil Jajodia393751839.16
Stefano Paraboschi43590450.24
Pierangela Samarati57152785.82