Loading...
Search for: access-control-enforcements
0.007 seconds

    Access control aware data retrieval for secret sharing based database outsourcing

    , Article Distributed and Parallel Databases ; Volume 34, Issue 4 , Dec , 2015 , pp 505–534 ; 09268782 (ISSN) Hadavi, M. A ; Jalili, R ; Karimi, L ; Sharif University of Technology
    Kluwer Academic Publishers  2015
    Abstract
    Enforcing dynamic and confidential access control policies is a challenging issue of data outsourcing to external servers due to the lack of trust towards the servers. In this paper, we propose a scalable yet flexible access control enforcement mechanism when the underlying relational data, on which access policies are defined, has been shared through a secret sharing scheme. For sharing values of an attribute in a relation, the attribute is assigned a secret distribution key and its values are split and distributed among data servers according to a Shamir based secret sharing scheme. Given access control policies over attributes of the relation schema, access to distribution keys, used... 

    Access control aware data retrieval for secret sharing based database outsourcing

    , Article Distributed and Parallel Databases ; Volume 34, Issue 4 , 2016 , Pages 505-534 ; 09268782 (ISSN) Hadavi, M. A ; Jalili, R ; Karimi, L ; Sharif University of Technology
    Springer New York LLC  2016
    Abstract
    Enforcing dynamic and confidential access control policies is a challenging issue of data outsourcing to external servers due to the lack of trust towards the servers. In this paper, we propose a scalable yet flexible access control enforcement mechanism when the underlying relational data, on which access policies are defined, has been shared through a secret sharing scheme. For sharing values of an attribute in a relation, the attribute is assigned a secret distribution key and its values are split and distributed among data servers according to a Shamir based secret sharing scheme. Given access control policies over attributes of the relation schema, access to distribution keys, used... 

    Enforcing access control policies over data stored on untrusted server

    , Article 2017 14th International ISC (Iranian Society of Cryptology) Conference on Information Security and Cryptology, ISCISC 2017, 6 September 2017 through 7 September 2017 ; 2018 , Pages 54-57 ; 9781538665602 (ISBN) Soltani, N ; Jalili, R ; Sharif University of Technology
    Abstract
    One of the security issues in data outsourcing scenario is the enforcement of data owner's access control policies. This includes some challenges; namely, the number of keys required to access authorized resources, efficient policy updating, write access control enforcement, user and data owner overhead, and preserving confidentiality of data and policies. Most of the existing solutions address only some of the challenges, while they impose high overhead on both the data owner and users. Though, policy management in the Role-Based Access Control (RBAC) model is easier and more efficient due to the existence of role hierarchical structure and role inheritance; most of the existing solutions...