The Low-Cost Secure Sessions of Access Control Model for Distributed Applications by Public Personal Smart Cards
The secure requirement of modern information systems is increasing significantly nowadays, especially in cloud computing with distributed applications. Among secure mechanisms of an organization, the access control (AC) is a foundation for modern information systems. In order to reach an effective a...
Saved in:
Published in | 2011 IEEE 17th International Conference on Parallel and Distributed Systems pp. 894 - 899 |
---|---|
Main Authors | , , |
Format | Conference Proceeding |
Language | English |
Published |
IEEE
01.12.2011
|
Subjects | |
Online Access | Get full text |
ISBN | 1457718758 9781457718755 |
ISSN | 1521-9097 |
DOI | 10.1109/ICPADS.2011.136 |
Cover
Abstract | The secure requirement of modern information systems is increasing significantly nowadays, especially in cloud computing with distributed applications. Among secure mechanisms of an organization, the access control (AC) is a foundation for modern information systems. In order to reach an effective and flexible approach of access control, the Role-based Access Control (RBAC) models are widely deployed in organizations. Comparing with traditional discretionary access control (DAC) and mandatory access control (MAC), the user-role-subject mapping of a RBAC model provides effective permissions assignments for access control of an organization. However, the RBAC sessions could be stretched over multiple distributed servers in cloud computing. The traversed sessions between servers could be modified, monitored and attacked by modern hacker techniques, and become secure leaks in RBAC models. In order to ensure secure sessions in cloud computing, various encryption approaches are used. Among these encryption approaches, the use of digital certificates by asymmetric encryption methods could be an appropriate solution to ensure the security of RBAC sessions. However, the cost of public/private keys management and issuing an appropriate certificate tokens for each member in organizations could be very expensive. The high cost might block the deployment of secure RBAC sessions, and then reduce the secure level of organizations. In order to improve this issue, a low-cost approach of secure sessions for RBAC models is proposed in this paper. The personal smart cards can be used as a certificate tokens in RBAC models to reach effective user authentications. Moreover, each session of RBAC models, including user-role-subject assignments and content-based accesses, can be protected by digital certificates which is generated by user own smart cards. Thus the security of RBAC sessions can be improved significantly. It is worth noting that personal smart cards are issued by public departments, thus the expense of tokens issuing and key management could be minimized. Therefore, the session security of a RBAC model could be ensured with user own smart cards without additional cost. |
---|---|
AbstractList | The secure requirement of modern information systems is increasing significantly nowadays, especially in cloud computing with distributed applications. Among secure mechanisms of an organization, the access control (AC) is a foundation for modern information systems. In order to reach an effective and flexible approach of access control, the Role-based Access Control (RBAC) models are widely deployed in organizations. Comparing with traditional discretionary access control (DAC) and mandatory access control (MAC), the user-role-subject mapping of a RBAC model provides effective permissions assignments for access control of an organization. However, the RBAC sessions could be stretched over multiple distributed servers in cloud computing. The traversed sessions between servers could be modified, monitored and attacked by modern hacker techniques, and become secure leaks in RBAC models. In order to ensure secure sessions in cloud computing, various encryption approaches are used. Among these encryption approaches, the use of digital certificates by asymmetric encryption methods could be an appropriate solution to ensure the security of RBAC sessions. However, the cost of public/private keys management and issuing an appropriate certificate tokens for each member in organizations could be very expensive. The high cost might block the deployment of secure RBAC sessions, and then reduce the secure level of organizations. In order to improve this issue, a low-cost approach of secure sessions for RBAC models is proposed in this paper. The personal smart cards can be used as a certificate tokens in RBAC models to reach effective user authentications. Moreover, each session of RBAC models, including user-role-subject assignments and content-based accesses, can be protected by digital certificates which is generated by user own smart cards. Thus the security of RBAC sessions can be improved significantly. It is worth noting that personal smart cards are issued by public departments, thus the expense of tokens issuing and key management could be minimized. Therefore, the session security of a RBAC model could be ensured with user own smart cards without additional cost. |
Author | Ting-Wei Hou Kuo-Yi Chen Chin-Yang Lin |
Author_xml | – sequence: 1 surname: Kuo-Yi Chen fullname: Kuo-Yi Chen email: kuoyichen@gmail.com organization: Inst. of Inf. Sci., Acad. Sinica, Taipei, Taiwan – sequence: 2 surname: Chin-Yang Lin fullname: Chin-Yang Lin email: cytomy@gmail.com organization: Dept. of Eng. Sci., Nat. Cheng Kung Univ., Tainan, Taiwan – sequence: 3 surname: Ting-Wei Hou fullname: Ting-Wei Hou email: houtw@mail.ncku.edu.tw organization: Dept. of Eng. Sci., Nat. Cheng Kung Univ., Tainan, Taiwan |
BookMark | eNotj0trwzAQhFWaQuM05x560R9wqkdkWUfj9BFIaSC5B1laUxXXMpJCyb-vaAvDznyHXXYKNBv9CAjdU7KilKjHbbtvNocVI5SuKK-u0FLJmshKibXI8xoVNAdJaynqGZpTwWipiJK3qIjxkxBGuCBzNB0_AO_8d9n6mPABzDlAthidHyP2PW6MyYRbP6bgB_zmLQy49wFvXEzBdecEFjfTNDij0-9Sd8H7c5cZ7yFEP-oBH750SLjVwcY7dNPrIcLy3xfo-Px0bF_L3fvLtm12pVMklVxaUWtGjKzBECl4rmm1qK3o-84wY9drIxSHLCIZVNbynomuAqo7y0DwBXr4O-sA4DQFlz-4nCrKKJcV_wGK815h |
ContentType | Conference Proceeding |
DBID | 6IE 6IL CBEJK RIE RIL |
DOI | 10.1109/ICPADS.2011.136 |
DatabaseName | IEEE Electronic Library (IEL) Conference Proceedings IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume IEEE Xplore All Conference Proceedings IEEE Electronic Library (IEL) IEEE Proceedings Order Plans (POP All) 1998-Present |
DatabaseTitleList | |
Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library (IEL) url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Computer Science |
EISBN | 9780769545769 0769545769 |
EndPage | 899 |
ExternalDocumentID | 6121376 |
Genre | orig-research |
GroupedDBID | 23M 29O 6IE 6IF 6IH 6IK 6IL 6IM 6IN AAJGR AAWTH ABLEC ADZIZ ALMA_UNASSIGNED_HOLDINGS BEFXN BFFAM BGNUA BKEBE BPEOZ CBEJK CHZPO IEGSK IPLJI OCL RIE RIL RNS |
ID | FETCH-LOGICAL-i90t-37d58a20c78ec0753011da58d5ffbc2cd44c593e93e072e6dd3f25b6e1abd2e53 |
IEDL.DBID | RIE |
ISBN | 1457718758 9781457718755 |
ISSN | 1521-9097 |
IngestDate | Wed Aug 27 03:46:16 EDT 2025 |
IsPeerReviewed | false |
IsScholarly | true |
Language | English |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-i90t-37d58a20c78ec0753011da58d5ffbc2cd44c593e93e072e6dd3f25b6e1abd2e53 |
PageCount | 6 |
ParticipantIDs | ieee_primary_6121376 |
PublicationCentury | 2000 |
PublicationDate | 2011-Dec. |
PublicationDateYYYYMMDD | 2011-12-01 |
PublicationDate_xml | – month: 12 year: 2011 text: 2011-Dec. |
PublicationDecade | 2010 |
PublicationTitle | 2011 IEEE 17th International Conference on Parallel and Distributed Systems |
PublicationTitleAbbrev | icpads |
PublicationYear | 2011 |
Publisher | IEEE |
Publisher_xml | – name: IEEE |
SSID | ssj0020350 ssib026767514 ssj0000669466 |
Score | 1.8040783 |
Snippet | The secure requirement of modern information systems is increasing significantly nowadays, especially in cloud computing with distributed applications. Among... |
SourceID | ieee |
SourceType | Publisher |
StartPage | 894 |
SubjectTerms | Access control Authentication Authentications distributed applications Encryption Organizations RBAC models Servers Smart cards |
Title | The Low-Cost Secure Sessions of Access Control Model for Distributed Applications by Public Personal Smart Cards |
URI | https://ieeexplore.ieee.org/document/6121376 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LS8NAEF7annqq2opv5uDRtHltHseSWqpYKbRCbyXZnYCoSbEpor_enU1Si3gQAsnmlCyzs9_O4_sYu_YwdQJfmoTcUsNVCNYIYpP0iIUrFXwNU83AN330Jk_u_ZIvG-xm1wuDiLr4DPv0qHP5MhdbCpUNiO1KLYgmayozK3u1atuxNfFYlREsvbBH1Om7wxdl0DR3qi5JIDrAtuVyX7lmhZhr7qdqzCsOIMsMB3fRbDial1yfFhE574mw6D1o3GHT-uvL0pOX_rZI-uLrF7Hjf3_vgPV-uv1gttvHDlkDsyPWqeUeoFr9XbZWJgUP-YcR5ZsCdKAe1Y3KaLMN5CkMtfgiRGX1O5DM2isoUAwjYuclYS2UMNzLmEPyCWXcEGbVoQDmb8qYIaJesB5bjG8X0cSoBBuM59AslK-SPIhtU_gBCgVFyHfImAeSp2kibCFdV_DQQXWZvo2elE5q88RDK06kjdw5Zq0sz_CEgZdaaHnoCycRrlAgNkGujIpcDved2D5lXZq_1bqk5FhVU3f29-tz1tahYF2FcsFaxfsWLxWWKJIrbUTftVDAcQ |
linkProvider | IEEE |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LT8JAEN4gHuSECsa3c_Booa9ty5EUCSgQEjDhRtrdaWJUSqTE6K93Z1uQGA8mTdrtqd3Mzn47j-9j7NbDxAl8aRJySwxXIVgjiEzSIxauVPC1lWgGvuHI6z25DzM-K7G7bS8MIuriM2zQo87ly1SsKVTWJLYrtSD22L7a912ed2ttrMfW1GNFTjD3wx6Rp2-PX5RD0-ypuiiBCAErlst95ZwVZt6wPxVjXrAAWWar2Q_H7c4kZ_u0iMp5R4ZF70LdKhtuvj8vPnlprLO4Ib5-UTv-9wcPWf2n3w_G253siJVwccyqG8EHKNZ_jS2VUcEg_TDCdJWBDtWjulEh7WIFaQJtLb8IYV7_DiS09goKFkOH-HlJWgsltHdy5hB_Qh45hHFxLIDJmzJnCKkbrM6m3ftp2DMKyQbjuWVmyltJHkS2KfwAhQIj5D1kxAPJkyQWtpCuK3jLQXWZvo2elE5i89hDK4qljdw5YeVFusBTBl5ioeWhL5xYuELB2Bi5MityOtx3IvuM1Wj-5suclGNeTN35369v2EFvOhzMB_3R4wWr6MCwrkm5ZOXsfY1XCllk8bU2qG_8ZMO- |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2011+IEEE+17th+International+Conference+on+Parallel+and+Distributed+Systems&rft.atitle=The+Low-Cost+Secure+Sessions+of+Access+Control+Model+for+Distributed+Applications+by+Public+Personal+Smart+Cards&rft.au=Kuo-Yi+Chen&rft.au=Chin-Yang+Lin&rft.au=Ting-Wei+Hou&rft.date=2011-12-01&rft.pub=IEEE&rft.isbn=9781457718755&rft.issn=1521-9097&rft.spage=894&rft.epage=899&rft_id=info:doi/10.1109%2FICPADS.2011.136&rft.externalDocID=6121376 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1521-9097&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1521-9097&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1521-9097&client=summon |