2017 IEEE International Conference on Edge Computing (EDGE) (2017)
Honolulu, Hawaii, United States
June 25, 2017 to June 30, 2017
Securing their critical documents on the cloud from data threats is a major challenge faced by organizations today. Controlling and limiting access to such documents requires a robust and trustworthy access control mechanism. In this paper, we propose a semantically rich access control system that employs an access broker module to evaluate access decisions based on rules generated using the organizations confidentiality policies. The proposed system analyzes the multi-valued attributes of the user making the request and the requested document that is stored on a cloud service platform, before making an access decision. Furthermore, our system guarantees an end-to-end oblivious data transaction between the organization and the cloud service provider using oblivious storage techniques. Thus, an organization can use our system to secure their documents as well as obscure their access pattern details from an untrusted cloud service provider.
Access control, Cloud computing, Organizations, Encryption, OWL, Computational modeling
M. Joshi, S. Mittal, K. P. Joshi and T. Finin, "Semantically Rich, Oblivious Access Control Using ABAC for Secure Cloud Storage," 2017 IEEE International Conference on Edge Computing (EDGE), Honolulu, Hawaii, United States, 2017, pp. 142-149.