About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
Security and Privacy in New Computing Environments. Second EAI International Conference, SPNCE 2019, Tianjin, China, April 13–14, 2019, Proceedings

Research Article

A RBAC Model Based on Identity-Based Cryptosystem in Cloud Storage

Download(Requires a free EAI acccount)
141 downloads
Cite
BibTeX Plain Text
  • @INPROCEEDINGS{10.1007/978-3-030-21373-2_28,
        author={Jian Xu and Yanbo Yu and Qingyu Meng and Qiyu Wu and Fucai Zhou},
        title={A RBAC Model Based on Identity-Based Cryptosystem in Cloud Storage},
        proceedings={Security and Privacy in New Computing Environments. Second EAI International Conference, SPNCE 2019, Tianjin, China, April 13--14, 2019, Proceedings},
        proceedings_a={SPNCE},
        year={2019},
        month={6},
        keywords={Access control RBAC Identity-based cryptosystem Cloud storage},
        doi={10.1007/978-3-030-21373-2_28}
    }
    
  • Jian Xu
    Yanbo Yu
    Qingyu Meng
    Qiyu Wu
    Fucai Zhou
    Year: 2019
    A RBAC Model Based on Identity-Based Cryptosystem in Cloud Storage
    SPNCE
    Springer
    DOI: 10.1007/978-3-030-21373-2_28
Jian Xu1,*, Yanbo Yu1, Qingyu Meng1, Qiyu Wu1, Fucai Zhou1
  • 1: Northeastern University
*Contact email: xuj@mail.neu.edu.cn

Abstract

Aiming at the shortcomings of most of existing ciphertext access control scheme in cloud storage does not support dynamic update of access control strategy, has large computational overhead ,combine identity-based cryptosystem and role based access control model (using RBAC1 model of the RBAC96 model family), build RBAC model based on identity-based cryptosystem in cloud storage. This paper presents a formal definition of the scheme, a detailed description of four tuple used to represent access control strategy, the hybrid encryption strategy and Re-encrypt when writing strategy in order to improve the efficiency of the system, detailed steps of system initialization, add and delete users, add and delete permissions, add and delete roles, add and delete role inheritance, assign and remove user, assign and remove permission, read and write file algorithm.

Keywords
Access control RBAC Identity-based cryptosystem Cloud storage
Published
2019-06-10
Appears in
SpringerLink
http://dx.doi.org/10.1007/978-3-030-21373-2_28
Copyright © 2019–2025 ICST
EBSCOProQuestDBLPDOAJPortico
EAI Logo

About EAI

  • Who We Are
  • Leadership
  • Research Areas
  • Partners
  • Media Center

Community

  • Membership
  • Conference
  • Recognition
  • Sponsor Us

Publish with EAI

  • Publishing
  • Journals
  • Proceedings
  • Books
  • EUDL