Abstract
In this paper, we follow the line of existing study on cryptographic enforcement of Role-Based Access Control (RBAC). Inspired by the study of the relation between the existing security definitions for such system, we identify two different types of attacks which cannot be captured by the existing ones. Therefore, we propose two new security definitions towards the goal of appropriately modelling cryptographic enforcement of Role-Based Access Control policies and study the relation between our new definitions and the existing ones. In addition, we show that the cost of supporting dynamic policy update is inherently expensive by presenting two lower bounds for such systems which guarantee correctness and secure access.
This work was partially funded by the HARPOCRATES project, Horizon Europe and the Technology Innovation Institute (TII), Abu Dhabi, United Arab Emirates, for the project ARROWSMITH: Living (Securely) on the edge.
Due to the page limit, we leave out the preliminaries, some details of the results and the proofs of the theorems. A full version of this paper can be found on https://eprint.iacr.org/2022/1268.pdf.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Alderman, J., Crampton, J., Farley, N.: A framework for the cryptographic enforcement of information flow policies. In: Proceedings of the 22nd ACM on Symposium on Access Control Models and Technologies, SACMAT 2017, Indianapolis, IN, USA, 21–23 June 2017, pp. 143–154 (2017)
Clear, M., Hughes, A., Tewari, H.: Homomorphic encryption with access policies: characterization and new constructions. In: Youssef, A., Nitaj, A., Hassanien, A.E. (eds.) AFRICACRYPT 2013. LNCS, vol. 7918, pp. 61–87. Springer, Heidelberg (2013). https://doi.org/10.1007/978-3-642-38553-7_4
Ferrara, A.L., Fachsbauer, G., Liu, B., Warinschi, B.: Policy privacy in cryptographic access control. In: IEEE 28th Computer Security Foundations Symposium, CSF 2015, Verona, Italy, 13–17 July 2015, pp. 46–60 (2015)
Ferrara, A.L., Fuchsbauer, G., Warinschi, B.: Cryptographically enforced RBAC. In: 2013 IEEE 26th Computer Security Foundations Symposium, New Orleans, LA, USA, 26–28 June 2013, pp. 115–129 (2013)
Halevi, S., Karger, P.A., Naor, D.: Enforcing confinement in distributed storage and a cryptographic model for access control. IACR Cryptology ePrint Archive, 2005:169 (2005)
Huang, J., Sharaf, M.A., Huang, C.-T.: A hierarchical framework for secure and scalable EHR sharing and access control in multi-cloud. In: 41st International Conference on Parallel Processing Workshops, ICPPW 2012, Pittsburgh, PA, USA, 10–13 September 2012, pp. 279–287 (2012)
Ibraimi, L.: Cryptographically enforced distributed data access control. University of Twente (2011)
Garrison III, W.C., Shull, A., Lee, A.J., Myers, S.: Dynamic and private cryptographic access control for untrusted clouds: costs and constructions (extended version). CoRR, abs/1602.09069 (2016)
Jahid, S., Mittal, P., Borisov, N.: EASiER: encryption-based access control in social networks with efficient revocation. In: Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, ASIACCS 2011, Hong Kong, China, 22–24 March 2011, pp. 411–415 (2011)
Liu, B., Warinschi, B.: Universally composable cryptographic role-based access control. In: Chen, L., Han, J. (eds.) ProvSec 2016. LNCS, vol. 10005, pp. 61–80. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-47422-9_4
Qi, S., Zheng, Y.: Crypt-DAC: cryptographically enforced dynamic access control in the cloud. IEEE Trans. Dependable Secur. Comput. 18(2), 765–779 (2021)
Wang, G., Liu, Q., Wu, J.: Hierarchical attribute-based encryption for fine-grained access control in cloud storage services. In: Proceedings of the 17th ACM Conference on Computer and Communications Security, CCS 2010, Chicago, Illinois, USA, 4–8 October 2010, pp. 735–737 (2010)
Weber, S.G.: Designing a hybrid attribute-based encryption scheme supporting dynamic attributes. IACR Cryptology ePrint Archive, 2013:219 (2013)
Zhu, Y., Ahn, G.-J., Hu, H., Wang, H.: Cryptographic role-based security mechanisms based on role-key hierarchy. In: Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security, ASIACCS 2010, Beijing, China, 13–16 April 2010, pp. 314–319 (2010)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Liu, B., Michalas, A., Warinschi, B. (2022). Cryptographic Role-Based Access Control, Reconsidered. In: Ge, C., Guo, F. (eds) Provable and Practical Security. ProvSec 2022. Lecture Notes in Computer Science, vol 13600. Springer, Cham. https://doi.org/10.1007/978-3-031-20917-8_19
Download citation
DOI: https://doi.org/10.1007/978-3-031-20917-8_19
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-20916-1
Online ISBN: 978-3-031-20917-8
eBook Packages: Computer ScienceComputer Science (R0)