【24h】

Who Is Touching My Cloud

机译:谁在抚摸我的云

获取原文

摘要

Advanced access controls have been proposed to secure sensitive data maintained by a third party. A subtle issue in such systems is that some access credentials may be leaked due to various reasons, which could severely damage data security. In this paper, we investigate leakage tracing enabled access control over outsourced data, so that one can revoke the suspected leaked credentials or prepare judicial evidences for legal procedure if necessary. Specifically, we propose a leaked access credential tracing (LACT) framework to secure data outsourced to clouds and formalize its security model. Following the framework, we construct a concrete LACT scheme that is provably secure. The proposed scheme offers fine-grained access control over outsourced data, by which the data owner can specify an access policy to ensure that the data is only accessible to the users meeting the policy. In case of suspectable illegal access to outsourced data with leaked credentials, a tracing procedure can be invoked to tracing in a black-box manner at least one of the users who leaked their access credentials. The tracing procedure can run without the cloud service provider being disturbed. Analysis shows that the introduction of tracing access credential leakage incurs little additional cost to either data outsourcing or access procedure.
机译:已经提出了高级访问控制来保护第三方维护的敏感数据。这种系统中的一个细微问题是,由于各种原因,某些访问凭据可能会泄漏,从而可能严重损害数据安全性。在本文中,我们调查了对外包数据启用泄漏跟踪的访问控制,以便可以撤消怀疑的泄漏凭据或在必要时准备司法证据以进行法律程序。具体来说,我们提出了一个泄漏访问凭证跟踪(LACT)框架,以保护外包给云的数据并对其安全模型进行形式化。根据该框架,我们构建了一个可证明是安全的具体LACT方案。提议的方案提供了对外包数据的细粒度访问控制,数据所有者可以通过该访问控制指定访问策略,以确保只有符合该策略的用户才能访问该数据。如果怀疑使用泄露的凭据对外包数据进行非法访问,则可以调用跟踪程序以黑盒方式跟踪泄露他们的访问凭据的至少一个用户。跟踪过程可以在不干扰云服务提供商的情况下运行。分析表明,引入跟踪访问凭证泄漏不会给数据外包或访问过程带来多少额外成本。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号