Role-based cryptosystem

A new cryptographic RBAC system based on role-key hierarchy

Yan Zhu, Gail-Joon Ahn, Hongxin Hu, Di Ma, Shanbiao Wang

Research output: Contribution to journalArticle

14 Citations (Scopus)

Abstract

Even though role-based access control (RBAC) can tremendously help us to minimize the complexity in administering users, it still needs to realize the notion of roles at the resource level. In this paper, we propose a practical cryptographic RBAC model, called role-key hierarchy model, to support various security features, including signature, identification, and encryption on role-key hierarchy. In addition, several advanced features, such as role or user revocation, tracing, and anonymity, are implemented as well. With the help of rich algebraic structure of elliptic curves, we introduce a unified and complete construction of role-based cryptosystem to verify the rationality and validity of our proposed model. In addition, a proof-of-concept prototype implementation and performance evaluation is discussed to demonstrate the feasibility and efficiency of our mechanisms.

Original languageEnglish (US)
Article number6650102
Pages (from-to)2138-2153
Number of pages16
JournalIEEE Transactions on Information Forensics and Security
Volume8
Issue number12
DOIs
StatePublished - 2013

Fingerprint

Access control
Cryptography
Control systems

Keywords

  • access control
  • role and user revocation
  • role-based cryptosystem
  • role-key hierarchy
  • Security

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Safety, Risk, Reliability and Quality

Cite this

Role-based cryptosystem : A new cryptographic RBAC system based on role-key hierarchy. / Zhu, Yan; Ahn, Gail-Joon; Hu, Hongxin; Ma, Di; Wang, Shanbiao.

In: IEEE Transactions on Information Forensics and Security, Vol. 8, No. 12, 6650102, 2013, p. 2138-2153.

Research output: Contribution to journalArticle

@article{bf0d2ca4eeda45c7a4bff38fad66aaac,
title = "Role-based cryptosystem: A new cryptographic RBAC system based on role-key hierarchy",
abstract = "Even though role-based access control (RBAC) can tremendously help us to minimize the complexity in administering users, it still needs to realize the notion of roles at the resource level. In this paper, we propose a practical cryptographic RBAC model, called role-key hierarchy model, to support various security features, including signature, identification, and encryption on role-key hierarchy. In addition, several advanced features, such as role or user revocation, tracing, and anonymity, are implemented as well. With the help of rich algebraic structure of elliptic curves, we introduce a unified and complete construction of role-based cryptosystem to verify the rationality and validity of our proposed model. In addition, a proof-of-concept prototype implementation and performance evaluation is discussed to demonstrate the feasibility and efficiency of our mechanisms.",
keywords = "access control, role and user revocation, role-based cryptosystem, role-key hierarchy, Security",
author = "Yan Zhu and Gail-Joon Ahn and Hongxin Hu and Di Ma and Shanbiao Wang",
year = "2013",
doi = "10.1109/TIFS.2013.2287858",
language = "English (US)",
volume = "8",
pages = "2138--2153",
journal = "IEEE Transactions on Information Forensics and Security",
issn = "1556-6013",
publisher = "Institute of Electrical and Electronics Engineers Inc.",
number = "12",

}

TY - JOUR

T1 - Role-based cryptosystem

T2 - A new cryptographic RBAC system based on role-key hierarchy

AU - Zhu, Yan

AU - Ahn, Gail-Joon

AU - Hu, Hongxin

AU - Ma, Di

AU - Wang, Shanbiao

PY - 2013

Y1 - 2013

N2 - Even though role-based access control (RBAC) can tremendously help us to minimize the complexity in administering users, it still needs to realize the notion of roles at the resource level. In this paper, we propose a practical cryptographic RBAC model, called role-key hierarchy model, to support various security features, including signature, identification, and encryption on role-key hierarchy. In addition, several advanced features, such as role or user revocation, tracing, and anonymity, are implemented as well. With the help of rich algebraic structure of elliptic curves, we introduce a unified and complete construction of role-based cryptosystem to verify the rationality and validity of our proposed model. In addition, a proof-of-concept prototype implementation and performance evaluation is discussed to demonstrate the feasibility and efficiency of our mechanisms.

AB - Even though role-based access control (RBAC) can tremendously help us to minimize the complexity in administering users, it still needs to realize the notion of roles at the resource level. In this paper, we propose a practical cryptographic RBAC model, called role-key hierarchy model, to support various security features, including signature, identification, and encryption on role-key hierarchy. In addition, several advanced features, such as role or user revocation, tracing, and anonymity, are implemented as well. With the help of rich algebraic structure of elliptic curves, we introduce a unified and complete construction of role-based cryptosystem to verify the rationality and validity of our proposed model. In addition, a proof-of-concept prototype implementation and performance evaluation is discussed to demonstrate the feasibility and efficiency of our mechanisms.

KW - access control

KW - role and user revocation

KW - role-based cryptosystem

KW - role-key hierarchy

KW - Security

UR - http://www.scopus.com/inward/record.url?scp=84888635711&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84888635711&partnerID=8YFLogxK

U2 - 10.1109/TIFS.2013.2287858

DO - 10.1109/TIFS.2013.2287858

M3 - Article

VL - 8

SP - 2138

EP - 2153

JO - IEEE Transactions on Information Forensics and Security

JF - IEEE Transactions on Information Forensics and Security

SN - 1556-6013

IS - 12

M1 - 6650102

ER -