首页> 外文OA文献 >Privacy Preserving Enforcement of Sensitive Policies in Outsourced and Distributed Environments
【2h】

Privacy Preserving Enforcement of Sensitive Policies in Outsourced and Distributed Environments

机译:隐私保护外包和外包中敏感政策的执行   分布式环境

代理获取
本网站仅为用户提供外文OA文献查询和代理获取服务,本网站没有原文。下单后我们将采用程序或人工为您竭诚获取高质量的原文,但由于OA文献来源多样且变更频繁,仍可能出现获取不到、文献不完整或与标题不符等情况,如果获取不到我们将提供退款服务。请知悉。

摘要

The enforcement of sensitive policies in untrusted environments is still anopen challenge for policy-based systems. On the one hand, taking anyappropriate security decision requires access to these policies. On the otherhand, if such access is allowed in an untrusted environment then confidentialinformation might be leaked by the policies. The key challenge is how toenforce sensitive policies and protect content in untrusted environments. Inthe context of untrusted environments, we mainly distinguish between outsourcedand distributed environments. The most attractive paradigms concerningoutsourced and distributed environments are cloud computing and opportunisticnetworks, respectively. In this dissertation, we present the design, technical and implementationdetails of our proposed policy-based access control mechanisms for untrustedenvironments. First of all, we provide full confidentiality of access policiesin outsourced environments, where service providers do not learn privateinformation about policies. We support expressive policies and take intoaccount contextual information. The system entities do not share any encryptionkeys. For complex user management, we offer the full-fledged Role-Based AccessControl (RBAC) policies. In opportunistic networks, we protect content by specifying expressivepolicies. In our proposed approach, brokers match subscriptions againstpolicies associated with content without compromising privacy of subscribers.As a result, unauthorised brokers neither gain access to content nor learnpolicies and authorised nodes gain access only if they satisfy policiesspecified by publishers. Our proposed system provides scalable key managementin which loosely-coupled publishers and subscribers communicate without anyprior contact. Finally, we have developed a prototype of the system that runson real smartphones and analysed its performance.
机译:在不受信任的环境中执行敏感策略仍然是基于策略的系统面临的开放挑战。一方面,做出任何适当的安全决策都需要访问这些策略。另一方面,如果在不受信任的环境中允许此类访问,则策略可能会泄露机密信息。关键的挑战是如何在不可信的环境中实施敏感策略并保护内容。在不受信任的环境中,我们主要区分外包环境和分布式环境。关于外包和分布式环境的最有吸引力的范例分别是云计算和机会网络。本文介绍了我们提出的基于策略的不可信环境访问控制机制的设计,技术和实现细节。首先,我们在外包环境中提供访问策略的完全机密性,在这些环境中,服务提供商不会学习有关策略的私人信息。我们支持表达政策并考虑上下文信息。系统实体不共享任何加密密钥。对于复杂的用户管理,我们提供了成熟的基于角色的访问控制(RBAC)策略。在机会网络中,我们通过指定表达策略来保护内容。在我们提出的方法中,经纪人将订阅与与内容相关的策略进行匹配,而不会损害订户的隐私性,因此,未经授权的经纪人既不会获得对内容的访问权限,也不会获得学习策略,而授权节点只有满足发布者指定的策略才能获得访问权限。我们提出的系统提供了可扩展的密钥管理,使松散耦合的发布者和订阅者之间无需任何事先联系即可进行通信。最后,我们开发了运行真实智能手机的系统原型,并分析了其性能。

著录项

  • 作者

    Asghar, Muhammad Rizwan;

  • 作者单位
  • 年度 2013
  • 总页数
  • 原文格式 PDF
  • 正文语种 {"code":"en","name":"English","id":9}
  • 中图分类

相似文献

  • 外文文献
  • 中文文献
  • 专利

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号