Skip to main content

A Security Evaluation of Chaos Attribute-Based Access Control (ABAC) for Cloud Computing

  • Conference paper
  • First Online:
Advanced Information Networking and Applications (AINA 2024)

Abstract

This article aims to introduce a cryptographic solution to enhance the security and reliability of the Attribute-Based Access Control (ABAC) model. Building upon the existing structure of attribute-based encryption, our proposal presents a new encryption model named ‘Chaos-ABAC’. This model relies on the implementation of chaotic algorithms for both transmitted data encryption and decryption. We demonstrate the resilience of this approach against various falsification attempts, ensuring heightened semantic security against attacks aimed at divulging information from plaintext. Moreover, we demonstrate the scalability of this model, allowing us to enhance its cryptographic features beyond those of existing models.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 249.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Lipton, R.J., Snyder, L.: A linear time algorithm for deciding subject security. J. ACM 24, 455–464 (1977). https://doi.org/10.1145/322017.322025

    Article  MathSciNet  Google Scholar 

  2. McCune, J.M., Jaeger, T., Berger, S., Cáceres, R., Sailer, R.: Shamon: a system for distributed mandatory access control. In: Proceedings of the 2006 22nd Annual Computer Security Applications Conference (ACSAC 2006), Miami Beach, FL, USA, 11–15 December 2006, pp. 23–32 (2006)

    Google Scholar 

  3. Komlenovic, M., Tripunitara, M., Zitouni, T.: An empirical assessment of approaches to distributed enforcement in role-based access control (RBAC). In: Proceedings of the First ACM Conference on Data and Application Security and Privacy, CODASPY 2011, San Antonio, TX, USA, 21–23 February 2011 (2011)

    Google Scholar 

  4. Sharma, N.K., Joshi, A.: Representing attribute based access control policies in OWL. In: Proceedings of the 10th IEEE International Conference on Semantic Computing, pp. 333–336 (2016)

    Google Scholar 

  5. Zhu, Y., Yu, R., Ma, D., Chu, W.C.-C.: Cryptographic attribute-based access control (ABAC) for secure decision making of dynamic policy with multiauthority attribute tokens. IEEE Trans. Reliab. 68(4), 1330–1346 (2019)

    Article  Google Scholar 

  6. BenMbarak, O., Naanaa, A., ElAsmi, S.: New secure access control model for cloud computing based on Chaotic systems. In: International Wireless Communications and Mobile Computing (IWCMC) (2023)

    Google Scholar 

  7. Ruj, S., Nayak, A., Stojmenovic, I.: DACC: distributed access control in clouds. In: Conference on Trust, Security and Privacy in Computing and Communications, pp. 91–98 (2011)

    Google Scholar 

  8. Shen, J., Zhou, T., Chen, X., Li, J., Susilo, W.: Anonymous and traceable group data-sharing in cloud computing. IEEE Trans. Inf. Forensics Secur. 13(4), 912–925 (2018)

    Article  Google Scholar 

  9. Kapse, G.V., Thakare, V.M., Sherekar, S., Kapse, A.V.: Multi-authority data access control for cloud storage system with attribute-based encryption. IOSR J. Comput. Eng. (IOSR-JCE) 53–56 (2019)

    Google Scholar 

  10. Mulwa, O.: Chaos Theory and its Potential for Cryptography, Section Securtity (2022). https://www.section.io/engineering-education/chaos-cryptography/

  11. Rebhi, N., Ben Farah, M.A., Kachouri, A., Samet, M.: Analyse De Sécurité d’une Nouvelle Méthode De Cryptage Chaotique. In: 4th International Conference: Sciences of Electronic, Technologies of Information and Telecommunications, Tunisia, 25–29 March 2007 (2007)

    Google Scholar 

  12. Wang, F., Cui, G.: A new image encryption algorithm based on the logistic chaotic system. In: 3rd International Conference on Computer (2010)

    Google Scholar 

  13. Mell, P., Grance, T.: The NIST definition of cloud computing, Gaithersburg (2011). https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-145.p

  14. Goyal, V., Pandey, O., Sahai, A., Waters, B.: Attribute-based encryption for fine-grained access control of encrypted data. In: Proceedings of the 13th ACM Conference on Computer and Communications Security, pp. 89–98 (2006)

    Google Scholar 

  15. Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption. In: Proceedings of the IEEE Symposium on Security and Privacy, pp. 321–334 (2007)

    Google Scholar 

  16. Chase, M.: Multi-authority attribute based encryption. In: Vadhan, S.P. (ed.) TCC 2007. LNCS, vol. 4392, pp. 515–534. Springer, Heidelberg (2007). https://doi.org/10.1007/978-3-540-70936-7_28

    Chapter  Google Scholar 

  17. Biryukov, A.: Chosen plaintext attack. In: van Tilborg, H.C.A., Jajodia, S. (eds.) Encyclopedia of Cryptography and Security. Springer, Boston (2011). https://doi.org/10.1007/978-1-4419-5906-5_557

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Omessead BenMarak .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2024 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

BenMarak, O., Naanaa, A., Elasmi, S. (2024). A Security Evaluation of Chaos Attribute-Based Access Control (ABAC) for Cloud Computing. In: Barolli, L. (eds) Advanced Information Networking and Applications. AINA 2024. Lecture Notes on Data Engineering and Communications Technologies, vol 201. Springer, Cham. https://doi.org/10.1007/978-3-031-57870-0_37

Download citation

Publish with us

Policies and ethics