Abstract
This article aims to introduce a cryptographic solution to enhance the security and reliability of the Attribute-Based Access Control (ABAC) model. Building upon the existing structure of attribute-based encryption, our proposal presents a new encryption model named ‘Chaos-ABAC’. This model relies on the implementation of chaotic algorithms for both transmitted data encryption and decryption. We demonstrate the resilience of this approach against various falsification attempts, ensuring heightened semantic security against attacks aimed at divulging information from plaintext. Moreover, we demonstrate the scalability of this model, allowing us to enhance its cryptographic features beyond those of existing models.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Lipton, R.J., Snyder, L.: A linear time algorithm for deciding subject security. J. ACM 24, 455–464 (1977). https://doi.org/10.1145/322017.322025
McCune, J.M., Jaeger, T., Berger, S., Cáceres, R., Sailer, R.: Shamon: a system for distributed mandatory access control. In: Proceedings of the 2006 22nd Annual Computer Security Applications Conference (ACSAC 2006), Miami Beach, FL, USA, 11–15 December 2006, pp. 23–32 (2006)
Komlenovic, M., Tripunitara, M., Zitouni, T.: An empirical assessment of approaches to distributed enforcement in role-based access control (RBAC). In: Proceedings of the First ACM Conference on Data and Application Security and Privacy, CODASPY 2011, San Antonio, TX, USA, 21–23 February 2011 (2011)
Sharma, N.K., Joshi, A.: Representing attribute based access control policies in OWL. In: Proceedings of the 10th IEEE International Conference on Semantic Computing, pp. 333–336 (2016)
Zhu, Y., Yu, R., Ma, D., Chu, W.C.-C.: Cryptographic attribute-based access control (ABAC) for secure decision making of dynamic policy with multiauthority attribute tokens. IEEE Trans. Reliab. 68(4), 1330–1346 (2019)
BenMbarak, O., Naanaa, A., ElAsmi, S.: New secure access control model for cloud computing based on Chaotic systems. In: International Wireless Communications and Mobile Computing (IWCMC) (2023)
Ruj, S., Nayak, A., Stojmenovic, I.: DACC: distributed access control in clouds. In: Conference on Trust, Security and Privacy in Computing and Communications, pp. 91–98 (2011)
Shen, J., Zhou, T., Chen, X., Li, J., Susilo, W.: Anonymous and traceable group data-sharing in cloud computing. IEEE Trans. Inf. Forensics Secur. 13(4), 912–925 (2018)
Kapse, G.V., Thakare, V.M., Sherekar, S., Kapse, A.V.: Multi-authority data access control for cloud storage system with attribute-based encryption. IOSR J. Comput. Eng. (IOSR-JCE) 53–56 (2019)
Mulwa, O.: Chaos Theory and its Potential for Cryptography, Section Securtity (2022). https://www.section.io/engineering-education/chaos-cryptography/
Rebhi, N., Ben Farah, M.A., Kachouri, A., Samet, M.: Analyse De Sécurité d’une Nouvelle Méthode De Cryptage Chaotique. In: 4th International Conference: Sciences of Electronic, Technologies of Information and Telecommunications, Tunisia, 25–29 March 2007 (2007)
Wang, F., Cui, G.: A new image encryption algorithm based on the logistic chaotic system. In: 3rd International Conference on Computer (2010)
Mell, P., Grance, T.: The NIST definition of cloud computing, Gaithersburg (2011). https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-145.p
Goyal, V., Pandey, O., Sahai, A., Waters, B.: Attribute-based encryption for fine-grained access control of encrypted data. In: Proceedings of the 13th ACM Conference on Computer and Communications Security, pp. 89–98 (2006)
Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption. In: Proceedings of the IEEE Symposium on Security and Privacy, pp. 321–334 (2007)
Chase, M.: Multi-authority attribute based encryption. In: Vadhan, S.P. (ed.) TCC 2007. LNCS, vol. 4392, pp. 515–534. Springer, Heidelberg (2007). https://doi.org/10.1007/978-3-540-70936-7_28
Biryukov, A.: Chosen plaintext attack. In: van Tilborg, H.C.A., Jajodia, S. (eds.) Encyclopedia of Cryptography and Security. Springer, Boston (2011). https://doi.org/10.1007/978-1-4419-5906-5_557
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2024 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
BenMarak, O., Naanaa, A., Elasmi, S. (2024). A Security Evaluation of Chaos Attribute-Based Access Control (ABAC) for Cloud Computing. In: Barolli, L. (eds) Advanced Information Networking and Applications. AINA 2024. Lecture Notes on Data Engineering and Communications Technologies, vol 201. Springer, Cham. https://doi.org/10.1007/978-3-031-57870-0_37
Download citation
DOI: https://doi.org/10.1007/978-3-031-57870-0_37
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-57869-4
Online ISBN: 978-3-031-57870-0
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)