Title
Privacy enhanced access control by means of policy blinding
Abstract
Traditional techniques of enforcing an access control policy rely on an honest reference monitor to enforce the policy. However, for applications where the resources are sensitive, the access control policy might also be sensitive. As a result, an honest-but-curious reference monitor would glean some interesting information from the requests that it processes. For example if a requestor in a role psychiatrist is granted access to a document, the patient associated with that document probably has a psychiatric problem. The patient would consider this sensitive information, and she might prefer the honest-but-curious reference monitor to remain oblivious of her mental problem. We present a high level framework for querying and enforcing a role based access control policy that identifies where sensitive information might be disclosed. We then propose a construction which enforces a role based access control policy cryptographically, in such a way that the reference monitor learns as little as possible about the policy. (The reference monitor only learns something from repeated queries). We prove the security of our scheme showing that it works in theory, but that it has a practical drawback. However, the practical drawback is common to all cryptographically enforced access policy schemes. We identify several approaches to mitigate the drawback and conclude by arguing that there is an underlying fundamental problem that cannot be solved. We also show why attribute based encryption techniques do not not solve the problem of enforcing policy by an honest but curious reference monitor.
Year
DOI
Venue
2011
10.1007/978-3-642-21031-0_9
ISPEC
Keywords
Field
DocType
access policy scheme,honest reference monitor,privacy enhanced access control,sensitive information,honest-but-curious reference monitor,mental problem,curious reference monitor,access control policy cryptographically,reference monitor,access control policy,policy blinding,practical drawback,attribute based encryption,access control,role based access control
Drawback,Computer access control,Internet privacy,Argument,Computer security,Computer science,Attribute-based encryption,Role-based access control,Access control,Reference monitor,Information sensitivity
Conference
Volume
ISSN
Citations 
6672
0302-9743
1
PageRank 
References 
Authors
0.36
24
4
Name
Order
Citations
PageRank
Saeed Sedghi1644.52
Pieter Hartel21159115.28
Willem Jonker364055.71
Svetla Nikova462445.46