CryptographicallyEnforced
|
|
|
- Dennis Francis
- 10 years ago
- Views:
Transcription
1 Cryptographically CryptographicallyEnforced Enforced RBAC RBAC Georg Fuchsbauer (IST Austria) 27 June 2013, CSF joint work with Anna Lisa Ferrara and Bogdan Warinschi (University of Bristol)
2 Overview Cryptographically enforced access control concentrate on Role-Based Access Control for file system Formal model, security definitions Soundness theorem for enforcing policies Implementation using Attribute-Based Encryption
3 Access Control Access control by low-level mechanisms enforcement by design absolute semantics
4 Access Control Access control by low-level mechanisms enforcement by design absolute semantics using cryptography key management only probabilistic guarantees
5 Previous Work Cryptographic sealing [Gifford'82] Cryptographic model (UC) for access control [Halevi,Karger,Naor'05] Access control for XML documents [Abadi,Warinschi'08]
6 Previous Work Cryptographic sealing [Gifford'82] Cryptographic model (UC) for access control [Halevi,Karger,Naor'05] Access control for XML documents [Abadi,Warinschi'08] GAP between semantics associated to polices and cryptographic guarantees (previously: simple polices, simple primitives)
7 RBAC for Hospital Doctor Nurse Patient Receptionist
8 RBAC for Hospital Medical records List of doctors List of appointments
9 RBAC for Hospital
10 RBAC for Hospital
11 RBAC - The Model R... set of roles (fixed) U... universe of users U U... set of users P... universe of permissions P P... set of permissions UA U R... user-role assignment relation PA P R... permission-role assignment relation State of the system: S = (U, P, UA, PA)
12 Hospital Example
13 Hospital Example R U UA P PA n
14 RBAC Commands U U {u} AddUser(u) DeleteUser(u) AddObject(p) DeleteObject(p) AssignUser(u,r) UA UA {(u,r)} DeassignUser(u,r) UA UA \ {(u,r)} GrantPermission(p,r) PA PA {(p,r)} RevokePermission(p,r) PA PA \ {(p,r)} U U \ {u}, UA UA \ {(u,r) UA r R} P P {p} P P \ {p}, PA PA \ {(p,r) PA r R}
15 RBAC Semantics System evolves via commands (U, P, UA, PA) (U', P', UA', PA') RBAC command Trace: sequence of commands:...
16 RBAC Semantics System evolves via commands (U, P, UA, PA) (U', P', UA', PA') RBAC command Trace: sequence of commands: Semantic: User u has access to p:... HasAccess(u,p) r R: (u,r) UA (p,r) PA
17 Security Policies... express limits on access Separation of Duty:... models conflict of interest between r, r' : no user can hold both roles Privilege Escalation:... lower-rank roles cannot access resources for higerrank roles
18 Security Policies... express limits on access Separation of Duty:... models conflict of interest between r, r' : no user can hold both roles Privilege Escalation:... lower-rank roles cannot access resources for higerrank roles Example: Doctor Receptionist
19 Security Policies Security policy for RBAC is a formula u U p P: Cond(u,p) HasAccess(u,p)
20 Security Policies Security policy for RBAC is a formula u U p P: Cond(u,p) HasAccess(u,p) interpreted over a state S = (U, P, UA, PA) A policy should hold over any execution trace.
21 Security Policies Security policy for RBAC is a formula u U p P: Cond(u,p) HasAccess(u,p) interpreted over a state S = (U, P, UA, PA) A policy should hold over any execution trace. Example: Privilege escalation from role r to role r': Cond(u,p) [(u,r) UA (p,r') PA]
22 Security Policies Security policy for RBAC is a formula u U p P: Cond(u,p) HasAccess(u,p) interpreted over a state S = (U, P, UA, PA) A policy should hold over any execution trace. Example: Privilege escalation from role r to role r': Cond(u,p) Multiple policies: [(u,r) UA (p,r') PA] C1,..., Cn C1... Cn
23 Cryptographic RBAC
24 Cryptographic RBAC Permission = read access for file p in file system FS Manager Users
25 Cryptographic RBAC Permission = read access for file p in file system FS Manager write read Users have unrestricted access to FS
26 Cryptographic RBAC Permission = read access for file p in file system FS Manager write MPC Users have unrestricted access to FS read
27 Cryptographic RBAC Non-interactive protocol: Manager write runs command locally writes to FS sends update msgs to users Users read
28 Cryptographic RBAC Non-interactive protocol: Manager write runs command locally writes to FS sends update msgs to users Users update their states when receiving msg read
29 crbac Algorithms Init AddUser DelUser AddObject DelObject AssignUser DeassignUser GrantPerm RevokePerm RBAC commands, run by manager input: statem, FS, args output: state'm, FS', {msgu}
30 crbac Algorithms Init AddUser DelUser AddObject DelObject AssignUser DeassignUser GrantPerm RevokePerm Write Read Update run by manager, input: p, m run by users, input: stateu RBAC commands, run by manager input: statem, FS, args output: state'm, FS', {msgu}
31 Properties of crbac Correctness: After any executions of commands, if HasAccess(u,p) then Read(stu, p, FS) outputs content of p
32 Properties of crbac Correctness: After any executions of commands, if HasAccess(u,p) then Read(stu, p, FS) outputs content of p Security: No information on content of p is leaked to u when HasAccess(u,p) Adversary can make manager execute RBAC cmds corrupt users (not manager) ask for challenges
33 Security Security game: Expind(λ) b $ {0,1} (stm, FS, {st[u]}u U ) λ,r) Init(1 $ b' $ A (1λ,FS : O ) Return (b' = b) Advind(λ) := Pr [Expind(λ) true] - 1/2 Oracles O : Oracles for RBAC commands CorruptU(u), Challenge(p,m0,m1)
34 Security Security game: Expind(λ) b $ {0,1}; Cr,Ch (stm, FS, {st[u]}u U ) $ Init(1λ,R) b' $ A (1λ,FS : O ) Return (b' = b) Advind(λ) := Pr [Expind(λ) true] - 1/2 Oracles O : Oracles for RBAC commands CorruptU(u), Challenge(p,m0,m1) Game ensures that at all time: u Cr p Ch: HasAccess(u,p)
35 Secure Policy Enforcement Policy Φ defined by Cond s.t. whenever Cond(u,p) then HasAccess(u,p) ( i.e. r R: (u,r) UA (p,r) PA )
36 Secure Policy Enforcement Policy Φ defined by Cond s.t. whenever Cond(u,p) then HasAccess(u,p) ( i.e. r R: (u,r) UA (p,r) PA ) crbac enforces Φ if whenever Cond(u,p) then u does not have access to p in reality
37 Secure Policy Enforcement Policy Φ defined by Cond s.t. whenever Cond(u,p) then HasAccess(u,p) ( i.e. r R: (u,r) UA (p,r) PA ) crbac enforces Φ if whenever Cond(u,p) then u does not have access to p in reality Ind-based definition: Manager enforces Φ symbolically A impersonates u, for Cond(u,p)... must distinguish content of p
38 Secure Policy Enforcement Theorem: If CRBAC is secure then it enforces any policy Computational soundness: Policies that are satisfied symbolically are also satisfied computationally.
39 Implementation
40 Attribute-Based Encryption Attribute-Based Encryption Encryption w.r.t. set of attributes from universe A Keys associated to policies over attributes... decrypt ciphertexts whose attributes satisfy policy
41 Attribute-Based Encryption Attribute-Based Encryption Encryption w.r.t. set of attributes from universe A Keys associated to policies over attributes... decrypt ciphertexts whose attributes satisfy policy Only need weak form of ABE: Policies: Disjunction of attributes ψ = a1 a2... an
42 Attribute-Based Encryption Attribute-Based Encryption Encryption w.r.t. set of attributes from universe A Keys associated to policies over attributes... decrypt ciphertexts whose attributes satisfy policy Only need weak form of ABE: Policies: Disjunction of attributes ψ = a1 a2... an key ~ x A ciphertext ~ y A y x
43 Implementation of crbac RBAC ABE roles attributes objects ciphertexts
44 Implementation of crbac RBAC ABE roles attributes objects ciphertexts File p is encrypted w.r.t. roles (attributes) associated to it (according to PA) Write Encrypt User u receive keys corresponding to their roles (according to UA) Read Decrypt
45 Revocation and Deassignment AssignUser(u,r)... issue new key for user u's extended set of roles GrantPerm(p,r)... re-encrypt content of p w.r.t. extended set of roles RevokePerm(p,r)... re-encrypt content of p w.r.t. reduced set of roles
46 Revocation and Deassignment AssignUser(u,r)... issue new key for user u's extended set of roles GrantPerm(p,r)... re-encrypt content of p w.r.t. extended set of roles RevokePerm(p,r)... re-encrypt content of p w.r.t. reduced set of roles DeassignUser(u,r)...?
47 Revocation and Deassignment AssignUser(u,r)... issue new key for user u's extended set of roles GrantPerm(p,r)... re-encrypt content of p w.r.t. extended set of roles RevokePerm(p,r)... re-encrypt content of p w.r.t. reduced set of roles DeassignUser(u,r) associate role r with a new attribute a re-encrypt files p with (p,r) PA re-issue keys to users u' with (u',r) UA
48 Security Not secure. Why? Consider: (u,r) UA, (p,r) PA HasAcc(u,p)
49 Security Not secure. Why? Consider: (u,r) UA, (p,r) PA HasAcc(u,p) RevokePerm(p,r) HasAcc(u,p)
50 Security Not secure. Why? Consider: (u,r) UA, (p,r) PA HasAcc(u,p) RevokePerm(p,r) HasAcc(u,p) AssignUser(u,r) HasAcc(u,p)
51 Security Not secure. Why? Consider: (u,r) UA, (p,r) PA HasAcc(u,p) c sk RevokePerm(p,r) HasAcc(u,p) c' sk AssignUser(u,r) HasAcc(u,p) c' sk'
52 Security Not secure. Why? Consider: (u,r) UA, (p,r) PA HasAcc(u,p) c sk RevokePerm(p,r) HasAcc(u,p) c' sk AssignUser(u,r) HasAcc(u,p) c' sk'
53 Security Not secure. Why? Consider: (u,r) UA, (p,r) PA HasAcc(u,p) c sk RevokePerm(p,r) HasAcc(u,p) c' sk AssignUser(u,r) HasAcc(u,p) c' sk' New attribute for role r also when RevokePerm(p,r)!
54 Security Not secure. Why? Consider: (u,r) UA, (p,r) PA HasAcc(u,p) c sk RevokePerm(p,r) HasAcc(u,p) c' sk AssignUser(u,r) HasAcc(u,p) c' sk' New attribute for role r also when RevokePerm(p,r)! Theorem: If ABE satisfies indistinguishability then CRBAC [ABE ] is a secure implementation
55 Conclusion Defined syntax & security for cryptographic access control Soundness theorem for policies Provably secure implementation using weak ABE
56 Conclusion Defined syntax & security for cryptographic access control Soundness theorem for policies Provably secure implementation using weak ABE Future work Hierarchical RBAC, attribute-based RBAC More general framework for abstract notions of symbolic & computational access-control enforcement
MESSAGE AUTHENTICATION IN AN IDENTITY-BASED ENCRYPTION SCHEME: 1-KEY-ENCRYPT-THEN-MAC
MESSAGE AUTHENTICATION IN AN IDENTITY-BASED ENCRYPTION SCHEME: 1-KEY-ENCRYPT-THEN-MAC by Brittanney Jaclyn Amento A Thesis Submitted to the Faculty of The Charles E. Schmidt College of Science in Partial
Keywords: Authentication, Third party audit, cloud storage, cloud service provider, Access control.
Volume 5, Issue 3, March 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Identity Based
Secure Role-Based Access Control on Encrypted Data in Cloud Storage using Raspberry PI
Volume: 2, Issue: 7, 20-27 July 2015 www.allsubjectjournal.com e-issn: 2349-4182 p-issn: 2349-5979 Impact Factor: 3.762 Miss Rohini Vidhate Savitribai Phule Pune University. Mr. V. D. Shinde Savitribai
Security Aspects of. Database Outsourcing. Vahid Khodabakhshi Hadi Halvachi. Dec, 2012
Security Aspects of Database Outsourcing Dec, 2012 Vahid Khodabakhshi Hadi Halvachi Security Aspects of Database Outsourcing Security Aspects of Database Outsourcing 2 Outline Introduction to Database
Non-interactive and Reusable Non-malleable Commitment Schemes
Non-interactive and Reusable Non-malleable Commitment Schemes Ivan Damgård a Jens Groth b June 16, 2003 Abstract We consider non-malleable (NM) and universally composable (UC) commitment schemes in the
Verifiable Outsourced Computations Outsourcing Computations to Untrusted Servers
Outsourcing Computations to Untrusted Servers Security of Symmetric Ciphers in Network Protocols ICMS, May 26, 2015, Edinburgh Problem Motivation Problem Motivation Problem Motivation Problem Motivation
Computational Soundness of Symbolic Security and Implicit Complexity
Computational Soundness of Symbolic Security and Implicit Complexity Bruce Kapron Computer Science Department University of Victoria Victoria, British Columbia NII Shonan Meeting, November 3-7, 2013 Overview
MACs Message authentication and integrity. Table of contents
MACs Message authentication and integrity Foundations of Cryptography Computer Science Department Wellesley College Table of contents Introduction MACs Constructing Secure MACs Secure communication and
Expressive, Efficient, and Revocable Data Access Control for Multi-Authority Cloud Storage
Expressive, Efficient, and Revocable Data Access Control for Multi-Authority Cloud Storage Abstract: Cloud computing is one of the emerge technologies. To protect the data and privacy of users the access
Advanced Cryptography
Family Name:... First Name:... Section:... Advanced Cryptography Final Exam July 18 th, 2006 Start at 9:15, End at 12:00 This document consists of 12 pages. Instructions Electronic devices are not allowed.
Role Based Encryption with Efficient Access Control in Cloud Storage
Role Based Encryption with Efficient Access Control in Cloud Storage G. V. Bandewar 1, R. H. Borhade 2 1 Department of Information Technology, Sinhgad Technical Education Society s SKNCOE, Pune, India
Certificate Based Signature Schemes without Pairings or Random Oracles
Certificate Based Signature Schemes without Pairings or Random Oracles p. 1/2 Certificate Based Signature Schemes without Pairings or Random Oracles Joseph K. Liu, Joonsang Baek, Willy Susilo and Jianying
Chapter 23. Database Security. Security Issues. Database Security
Chapter 23 Database Security Security Issues Legal and ethical issues Policy issues System-related issues The need to identify multiple security levels 2 Database Security A DBMS typically includes a database
Authenticated Encryption: Relations among Notions and Analysis of the Generic Composition Paradigm By Mihir Bellare and Chanathip Namprempre
Authenticated Encryption: Relations among Notions and Analysis of the Generic Composition Paradigm By Mihir Bellare and Chanathip Namprempre Some slides were also taken from Chanathip Namprempre's defense
Lecture 1: Introduction. CS 6903: Modern Cryptography Spring 2009. Nitesh Saxena Polytechnic University
Lecture 1: Introduction CS 6903: Modern Cryptography Spring 2009 Nitesh Saxena Polytechnic University Outline Administrative Stuff Introductory Technical Stuff Some Pointers Course Web Page http://isis.poly.edu/courses/cs6903-s10
Victor Shoup Avi Rubin. fshoup,[email protected]. Abstract
Session Key Distribution Using Smart Cards Victor Shoup Avi Rubin Bellcore, 445 South St., Morristown, NJ 07960 fshoup,[email protected] Abstract In this paper, we investigate a method by which smart
Data Sharing on Untrusted Storage with Attribute-Based Encryption
Data Sharing on Untrusted Storage with Attribute-Based Encryption by Shucheng Yu A Dissertation Submitted to the Faculty of the WORCESTER POLYTECHNIC INSTITUTE In partial fulfillment of the requirements
Risk-Aware Role-Based Access Control
Risk-Aware Role-Based Access Control Liang Chen Jason Crampton Information Security Group, Royal Holloway, University of London 7th International Workshop on Security and Trust Management Risk-Aware RBAC
Categorical Heuristic for Attribute Based Encryption in the Cloud Server
Categorical Heuristic for Attribute Based Encryption in the Cloud Server R. Brindha 1, R. Rajagopal 2 1( M.E, Dept of CSE, Vivekanandha Institutes of Engineering and Technology for Women, Tiruchengode,
Secure and Verifiable Policy Update Outsourcing for Big Data Access Control in the Cloud
1 Secure and Verifiable Policy Update Outsourcing for Big Data Access Control in the Cloud Kan Yang Associate Member IEEE Xiaohua Jia Fellow IEEE Kui Ren Senior Member IEEE Abstract Due to the high volume
Distributed Attribute Based Encryption for Patient Health Record Security under Clouds
Distributed Attribute Based Encryption for Patient Health Record Security under Clouds SHILPA ELSA ABRAHAM II ME (CSE) Nandha Engineering College Erode Abstract-Patient Health Records (PHR) is maintained
CS377: Database Systems Data Security and Privacy. Li Xiong Department of Mathematics and Computer Science Emory University
CS377: Database Systems Data Security and Privacy Li Xiong Department of Mathematics and Computer Science Emory University 1 Principles of Data Security CIA Confidentiality Triad Prevent the disclosure
Identity-based Encryption with Post-Challenge Auxiliary Inputs for Secure Cloud Applications and Sensor Networks
Identity-based Encryption with Post-Challenge Auxiliary Inputs for Secure Cloud Applications and Sensor Networks Tsz Hon Yuen - Huawei, Singapore Ye Zhang - Pennsylvania State University, USA Siu Ming
Cryptography and Network Security: Summary
Cryptography and Network Security: Summary Timo Karvi 12.2013 Timo Karvi () Cryptography and Network Security: Summary 12.2013 1 / 17 Summary of the Requirements for the exam The advices are valid for
SECURE RE-ENCRYPTION IN UNRELIABLE CLOUD USINGSYNCHRONOUS CLOCK
International Journal of Advance Research In Science And Engineering IJARSE, Vol. No.4, Issue No.01, January 2015 http:// SECURE RE-ENCRYPTION IN UNRELIABLE CLOUD USINGSYNCHRONOUS CLOCK Arudra Gopala Rao
Secure Attribute Based Mechanism through Access cipher policy in Outsourced Cloud Data
Secure Attribute Based Mechanism through Access cipher policy in Outsourced Cloud Data V.Abinaya PG Scholar Kalasalingam Institute of Technology Krishnankoil. V.Ramesh Assistant professor Kalasalingam
Introduction. Digital Signature
Introduction Electronic transactions and activities taken place over Internet need to be protected against all kinds of interference, accidental or malicious. The general task of the information technology
A logical approach to role-based access control in a distributed environment
A logical approach to role-based access control in a distributed environment Université Paul Sabatier, IRIT COPS - February 2008 Motivation Express access control policies in distributed systems. Take
Role Based Access Control
Role Based Access Control Role-Based Access Control Models. By R.S. Sandhu, E.J. Coyne, H.L. Feinstein, and C.E. Youman, IEEE Computer, vol 29(2):38--47, February 1996. The most cited paper in access control!
Electronic Voting Protocol Analysis with the Inductive Method
Electronic Voting Protocol Analysis with the Inductive Method Introduction E-voting use is spreading quickly in the EU and elsewhere Sensitive, need for formal guarantees Inductive Method: protocol verification
Time-Based Proxy Re-encryption Scheme for Secure Data Sharing in a Cloud Environment
Time-Based Proxy Re-encryption Scheme for Secure Data Sharing in a Cloud Environment Qin Liu a,b, Guojun Wang a,, Jie Wu b a School of Information Science and Engineering Central South Uversity Changsha,
How to prove security of communication protocols?
1/37 Introduction on security protocols Modeling Verification Towards cryptographic guarantees How to prove security of communication protocols? Véronique Cortier, LORIA - CNRS, Nancy Colloquium Morgenstern,
Ch.9 Cryptography. The Graduate Center, CUNY.! CSc 75010 Theoretical Computer Science Konstantinos Vamvourellis
Ch.9 Cryptography The Graduate Center, CUNY! CSc 75010 Theoretical Computer Science Konstantinos Vamvourellis Why is Modern Cryptography part of a Complexity course? Short answer:! Because Modern Cryptography
An Efficient and Secure Data Sharing Framework using Homomorphic Encryption in the Cloud
An Efficient and Secure Data Sharing Framework using Homomorphic Encryption in the Cloud Sanjay Madria Professor and Site Director for NSF I/UCRC Center on Net-Centric Software and Systems Missouri University
1 Message Authentication
Theoretical Foundations of Cryptography Lecture Georgia Tech, Spring 200 Message Authentication Message Authentication Instructor: Chris Peikert Scribe: Daniel Dadush We start with some simple questions
1 Construction of CCA-secure encryption
CSCI 5440: Cryptography Lecture 5 The Chinese University of Hong Kong 10 October 2012 1 Construction of -secure encryption We now show how the MAC can be applied to obtain a -secure encryption scheme.
Lecture 10: CPA Encryption, MACs, Hash Functions. 2 Recap of last lecture - PRGs for one time pads
CS 7880 Graduate Cryptography October 15, 2015 Lecture 10: CPA Encryption, MACs, Hash Functions Lecturer: Daniel Wichs Scribe: Matthew Dippel 1 Topic Covered Chosen plaintext attack model of security MACs
1 Signatures vs. MACs
CS 120/ E-177: Introduction to Cryptography Salil Vadhan and Alon Rosen Nov. 22, 2006 Lecture Notes 17: Digital Signatures Recommended Reading. Katz-Lindell 10 1 Signatures vs. MACs Digital signatures
Towards Provably-Secure Remote Memory Attestation
Towards Provably-Secure Remote Memory Attestation ALEXANDRA BOLDYREVA TAESOO KIM RICHARD LIPTON BOGDAN WARINSCHI Abstract We initiate the study of provably secure remote memory attestation. We present
CHAPTER 7 GENERAL PROOF SYSTEMS
CHAPTER 7 GENERAL PROOF SYSTEMS 1 Introduction Proof systems are built to prove statements. They can be thought as an inference machine with special statements, called provable statements, or sometimes
Formal Methods in Security Protocols Analysis
Formal Methods in Security Protocols Analysis Li Zhiwei Aidong Lu Weichao Wang Department of Computer Science Department of Software and Information Systems University of North Carolina at Charlotte Big
An Overview of Common Adversary Models
An Overview of Common Adversary Karl Palmskog [email protected] 2012-03-29 Introduction Requirements of Software Systems 1 Functional Correctness: partial, termination, liveness, safety,... 2 Nonfunctional
KEY-POLICY ATTRIBUTE BASED ENCRYPTION TO SECURE DATA STORED IN CLOUD
KEY-POLICY ATTRIBUTE BASED ENCRYPTION TO SECURE DATA STORED IN CLOUD C.Vinoth 1, G.R.Anantha Raman 2 1 Computer Science and Engineering,ACE Hosur(India) 2 Assistant Professor, Computer Science and Engineering,
Advanced Topics in Cryptography and Network Security
Advanced Topics in Cryptography and Network Security Breno de Medeiros Department of Computer Science Florida State University Advanced Topics in Cryptography and Network Security p.1 Class Reference Sheet
Database Security. The Need for Database Security
Database Security Public domain NASA image L-1957-00989 of people working with an IBM type 704 electronic data processing machine. 1 The Need for Database Security Because databases play such an important
CIS 6930 Emerging Topics in Network Security. Topic 2. Network Security Primitives
CIS 6930 Emerging Topics in Network Security Topic 2. Network Security Primitives 1 Outline Absolute basics Encryption/Decryption; Digital signatures; D-H key exchange; Hash functions; Application of hash
Practical Yet Universally Composable Two-Server Password-Authenticated Secret Sharing
Practical Yet Universally Composable Two-Server Password-Authenticated Secret Sharing Jan Camenisch IBM Research Zurich [email protected] Anna Lysyanskaya Brown University [email protected] Gregory Neven
How To Verify A Bluetooth Device Pairing With A Human Eye Oracle
Formal Analysis of Authentication in Bluetooth Device Pairing Richard Chang and Vitaly Shmatikov The University of Texas at Austin Abstract. Bluetooth is a popular standard for short-range wireless communications.
Post-Quantum Cryptography #4
Post-Quantum Cryptography #4 Prof. Claude Crépeau McGill University http://crypto.cs.mcgill.ca/~crepeau/waterloo 185 ( 186 Attack scenarios Ciphertext-only attack: This is the most basic type of attack
Lecture 17: Re-encryption
600.641 Special Topics in Theoretical Cryptography April 2, 2007 Instructor: Susan Hohenberger Lecture 17: Re-encryption Scribe: Zachary Scott Today s lecture was given by Matt Green. 1 Motivation Proxy
Application Based Access Control on Cloud Networks for Data Security
Application Based Access Control on Cloud Networks for Data Security Ms. Smitha P M.Tech in DCN, Department of ECE GSSSIETW, Mysuru Karnataka, India Smitha.21sn @gmail.com Mrs. Manjula G Associate. Proffesor,
Chapter 11. Asymmetric Encryption. 11.1 Asymmetric encryption schemes
Chapter 11 Asymmetric Encryption The setting of public-key cryptography is also called the asymmetric setting due to the asymmetry in key information held by the parties. Namely one party has a secret
Adversary Modelling 1
Adversary Modelling 1 Evaluating the Feasibility of a Symbolic Adversary Model on Smart Transport Ticketing Systems Authors Arthur Sheung Chi Chan, MSc (Royal Holloway, 2014) Keith Mayes, ISG, Royal Holloway
Entangled Encodings and Data Entanglement
An extended abstract of this paper is published in the proceedings of the 3rd International Workshop on Security in Cloud Computing SCC@AsiaCCS 2015. This is the full version. Entangled Encodings and Data
Proposed NIST Standard for Role-Based Access Control
Proposed NIST Standard for Role-Based Access Control DAVID F. FERRAIOLO National Institute of Standards and Technology RAVI SANDHU SingleSign On. Net and George Mason University, [email protected] or www.list.gmu.edu
Attributed-based Access Control for Multi-Authority Systems in Cloud Storage
2012 32nd IEEE International Conference on Distributed Computing Systems Attributed-based Access Control for Multi-Authority Systems in Cloud Storage Kan Yang Department of Computer Science City University
Chosen-Ciphertext Security from Identity-Based Encryption
Chosen-Ciphertext Security from Identity-Based Encryption Dan Boneh Ran Canetti Shai Halevi Jonathan Katz June 13, 2006 Abstract We propose simple and efficient CCA-secure public-key encryption schemes
Data Security Using Reliable Re-Encryption in Unreliable Cloud
ISSN (Online): 2277-5420 www.ijcsn.org Data Security Using Reliable Re-Encryption in Unreliable Cloud 328 1 Ajinkya Adhau, 2 Payal Bobade, 3 Priyanka Zilpe, 4 Yashodhara Fulmali 1, 2, 3, 4 Student, Department
A Survey and Analysis of Solutions to the. Oblivious Memory Access Problem. Erin Elizabeth Chapman
A Survey and Analysis of Solutions to the Oblivious Memory Access Problem by Erin Elizabeth Chapman A thesis submitted in partial fulfillment of the requirements for the degree of Master of Science in
Talk announcement please consider attending!
Talk announcement please consider attending! Where: Maurer School of Law, Room 335 When: Thursday, Feb 5, 12PM 1:30PM Speaker: Rafael Pass, Associate Professor, Cornell University, Topic: Reasoning Cryptographically
The Order of Encryption and Authentication for Protecting Communications (Or: How Secure is SSL?)
The Order of Encryption and Authentication for Protecting Communications (Or: How Secure is SSL?) Hugo Krawczyk Abstract. We study the question of how to generically compose symmetric encryption and authentication
Secure Sharing of Health Records in Cloud Using ABE
Secure Sharing of Health Records in Cloud Using ABE Nithya.E, TousifAhamed Nadaf Abstract In recent years, Personal health record (PHR) has emerged as a patient-centric model of health information exchange.
YALE UNIVERSITY DEPARTMENT OF COMPUTER SCIENCE
YALE UNIVERSITY DEPARTMENT OF COMPUTER SCIENCE CPSC 467a: Cryptography and Computer Security Notes 1 (rev. 1) Professor M. J. Fischer September 3, 2008 1 Course Overview Lecture Notes 1 This course is
IMPLEMENTATION OF NETWORK SECURITY MODEL IN CLOUD COMPUTING USING ENCRYPTION TECHNIQUE
IMPLEMENTATION OF NETWORK SECURITY MODEL IN CLOUD COMPUTING USING ENCRYPTION TECHNIQUE 1 Rajesh L Gaikwad, 2 Dhananjay M Dakhane, 3 Ravindra L Pardhi M.E Student, Associate Professor, Assistant Professor,
AN ENHANCED ATTRIBUTE BASED ENCRYPTION WITH MULTI PARTIES ACCESS IN CLOUD AREA
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 1, January 2014,
Security/Privacy Models for "Internet of things": What should be studied from RFID schemes? Daisuke Moriyama and Shin ichiro Matsuo NICT, Japan
Security/Privacy Models for "Internet of things": What should be studied from RFID schemes? Daisuke Moriyama and Shin ichiro Matsuo NICT, Japan 1 Internet of Things (IoT) CASAGRAS defined that: A global
Data management using Virtualization in Cloud Computing
Data management using Virtualization in Cloud Computing A.S.R. Krishna Kanth M.Tech (CST), Department of Computer Science & Systems Engineering, Andhra University, India. M.Sitha Ram Research Scholar Department
Policy Analysis for Administrative Role Based Access Control
Policy Analysis for Administrative Role Based Access Control Amit Sasturkar Ping Yang Scott D. Stoller C.R. Ramakrishnan Department of Computer Science, Stony Brook University, Stony Brook, NY, 11794,
CPSC 467b: Cryptography and Computer Security
CPSC 467b: Cryptography and Computer Security Michael J. Fischer Lecture 1 January 9, 2012 CPSC 467b, Lecture 1 1/22 Course Overview Symmetric Cryptography CPSC 467b, Lecture 1 2/22 Course Overview CPSC
Overview. SSL Cryptography Overview CHAPTER 1
CHAPTER 1 Note The information in this chapter applies to both the ACE module and the ACE appliance unless otherwise noted. The features in this chapter apply to IPv4 and IPv6 unless otherwise noted. Secure
EFFICIENT AND SECURE ATTRIBUTE REVOCATION OF DATA IN MULTI-AUTHORITY CLOUD STORAGE
EFFICIENT AND SECURE ATTRIBUTE REVOCATION OF DATA IN MULTI-AUTHORITY CLOUD STORAGE Reshma Mary Abraham and P. Sriramya Computer Science Engineering, Saveetha University, Chennai, India E-Mail: [email protected]
Security Analysis of the PACE Key-Agreement Protocol
A preliminary version appears in ISC 2009, Lecture Notes in Computer Science, Springer-Verlag, 2009. This version is dated December 18, 2009. Security Analysis of the PACE Key-Agreement Protocol Jens Bender
Cryptography and Network Security Department of Computer Science and Engineering Indian Institute of Technology Kharagpur
Cryptography and Network Security Department of Computer Science and Engineering Indian Institute of Technology Kharagpur Module No. # 01 Lecture No. # 05 Classic Cryptosystems (Refer Slide Time: 00:42)
Secure Attribute-Based Systems
Secure Attribute-Based Systems Matthew Pirretti, Patrick Traynor, and Patrick McDaniel SIIS Laboratory, CSE, Pennsylvania State University {pirretti, traynor, mcdaniel}@cse.psu.edu ABSTRACT Attributes
Lecture 9 - Message Authentication Codes
Lecture 9 - Message Authentication Codes Boaz Barak March 1, 2010 Reading: Boneh-Shoup chapter 6, Sections 9.1 9.3. Data integrity Until now we ve only been interested in protecting secrecy of data. However,
Security Analysis for Order Preserving Encryption Schemes
Security Analysis for Order Preserving Encryption Schemes Liangliang Xiao University of Texas at Dallas Email: [email protected] Osbert Bastani Harvard University Email: [email protected] I-Ling
IMPLEMENTATION OF RESPONSIBLE DATA STORAGE IN CONSISTENT CLOUD ENVIRONMENT
IJRRECS/November 2014/Volume-2/Issue-11/3699-3703 ISSN 2321-5461 INTERNATIONAL JOURNAL OF REVIEWS ON RECENT ELECTRONICS AND COMPUTER SCIENCE IMPLEMENTATION OF RESPONSIBLE DATA STORAGE IN CONSISTENT CLOUD
OpenHRE Security Architecture. (DRAFT v0.5)
OpenHRE Security Architecture (DRAFT v0.5) Table of Contents Introduction -----------------------------------------------------------------------------------------------------------------------2 Assumptions----------------------------------------------------------------------------------------------------------------------2
Chosen-Ciphertext Security from Identity-Based Encryption
Chosen-Ciphertext Security from Identity-Based Encryption Dan Boneh Ran Canetti Shai Halevi Jonathan Katz Abstract We propose simple and efficient CCA-secure public-key encryption schemes (i.e., schemes
