首页> 外文会议>2012 Tenth Annual International Conference on Privacy, Security and Trust >Towards privacy-preserving access control with hidden policies, hidden credentials and hidden decisions
【24h】

Towards privacy-preserving access control with hidden policies, hidden credentials and hidden decisions

机译:通过隐藏的策略,隐藏的凭据和隐藏的决策来实现隐私保护访问控制

获取原文
获取原文并翻译 | 示例

摘要

The growing adoption of cloud technology in sensitive application domains, such as medicine, gives rise to new problems in maintaining the privacy of the involved parties during authorisation. In such domains, an honest but curious service provider can derive sensitive information purely from the authorisation process. In this paper, we present a detailed discussion of this rising problem including a concrete example and argue the need for the combination of hidden credentials, hidden policies and hidden decisions. We then show that mechanisms explored in previous work only cover individual aspects of this problem, but do not achieve a comprehensive solution without making restrictive assumptions on the resources, policies or subjects to be protected. As a first step towards solving this problem, we introduce an abstract foundation for using homomorphic cryptography to provide the required combination of privacy as a wrapper for other access control (AC) mechanisms. We achieve hidden policies, hidden credentials and even hidden access control decisions, so that the subject of an AC request only learns whether or not access was granted. Meanwhile, the provider of a resource learns nothing at the policy decision point and only access frequencies for individual resources at the policy enforcement point. We postulate that this is the maximum achievable level of protection in the authorisation process, without making restrictive assumptions on the resources, policies or subjects to be protected. Once homomorphic cryptography achieves satisfactory performance, our model can be used to transparently add this protection to other access control models.
机译:在诸如医学之类的敏感应用领域中,云技术的日益普及为授权期间维护相关方的隐私带来了新问题。在这样的领域中,诚实但好奇的服务提供商可以纯粹从授权过程中获取敏感信息。在本文中,我们将对这个日益严重的问题进行详细的讨论,包括一个具体示例,并提出将隐藏凭据,隐藏策略和隐藏决策结合起来的必要性。然后,我们表明,以前的工作中探索的机制仅涵盖了该问题的各个方面,但是如果不对要保护的资源,政策或主题做出限制性假设,就无法实现全面的解决方案。作为解决此问题的第一步,我们介绍了一个使用同态密码学提供抽象的基础,以提供所需的隐私组合作为其他访问控制(AC)机制的包装。我们实现了隐藏的策略,隐藏的凭据甚至隐藏的访问控制决策,因此AC请求的主题仅了解是否授予访问权限。同时,资源提供者在策略决策点不了解任何信息,而在策略执行点仅学习单个资源的访问频率。我们假定这是授权过程中可实现的最大保护级别,而无需对要保护的资源,策略或主题进行限制性假设。一旦同态密码学达到令人满意的性能,我们的模型就可以用于将这种保护透明地添加到其他访问控制模型中。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号