Semantically Rich, Oblivious Access Control Using ABAC for Secure Cloud Storage
Title | Semantically Rich, Oblivious Access Control Using ABAC for Secure Cloud Storage |
Publication Type | Conference Paper |
Year of Publication | 2017 |
Authors | Joshi, M., Mittal, S., Joshi, K. P., Finin, T. |
Conference Name | 2017 IEEE International Conference on Edge Computing (EDGE) |
Keywords | Access Broker, access broker module, Access Control, authorisation, business data processing, cloud computing, cloud service platform, cloud storage security, composability, Computational modeling, Confidentiality Policy, data threats, document handling, document security, Encryption, end-to-end oblivious data transaction, Oblivious Storage, Ontologies, organization confidentiality policies, Organizations, OWL, pubcrawl, Resiliency, robust access control, semantically rich access control system, storage management, Trusted Computing, trusted platform modules, trustworthy access control |
Abstract | Securing their critical documents on the cloud from data threats is a major challenge faced by organizations today. Controlling and limiting access to such documents requires a robust and trustworthy access control mechanism. In this paper, we propose a semantically rich access control system that employs an access broker module to evaluate access decisions based on rules generated using the organizations confidentiality policies. The proposed system analyzes the multi-valued attributes of the user making the request and the requested document that is stored on a cloud service platform, before making an access decision. Furthermore, our system guarantees an end-to-end oblivious data transaction between the organization and the cloud service provider using oblivious storage techniques. Thus, an organization can use our system to secure their documents as well as obscure their access pattern details from an untrusted cloud service provider. |
URL | http://ieeexplore.ieee.org/document/8029268/ |
DOI | 10.1109/IEEE.EDGE.2017.27 |
Citation Key | joshi_semantically_2017 |
- encryption
- trustworthy access control
- trusted platform modules
- Trusted Computing
- storage management
- semantically rich access control system
- robust access control
- Resiliency
- pubcrawl
- OWL
- Organizations
- organization confidentiality policies
- Ontologies
- Oblivious Storage
- end-to-end oblivious data transaction
- Access Broker
- document security
- document handling
- data threats
- Confidentiality Policy
- Computational modeling
- composability
- cloud storage security
- cloud service platform
- Cloud Computing
- business data processing
- authorisation
- Access Control
- access broker module