New Attribute-Based Access Control (ABAC) Based on Skew Tent Map for Secure Decision

Read the full article See related articles

Listed in

This article is not in any list yet, why not save it to one of your lists.
Log in to save this article

Abstract

Massive migration and accelerated cloud computing adoption have exacerbated data protection concerns. Most data hosted on the cloud are sensitive, and unauthorized disclosure can lead to identity theft and privacy violations. Traditional access control systems struggle to meet these challenges in the cloud environment, leaving data vulnerable to unauthorized access. Attribute-based access Control (ABAC) models, particularly those defined by NIST, offer enhanced flexibility in access management. However, their implementation often has shortcomings, such as a lack of effective real-time encryption mechanisms and dynamic policies , making them vulnerable to advanced threats. Attribute-based encryption, specifically Ciphertext-Policy Attribute-Based Encryption (CP-ABE), emerges as a promising solution to ensure precise access control and secure data sharing. Nevertheless, CP-ABE must be protected against attacks such as user collusion and attempts at concealment. Furthermore, in the dynamic context of a cloud environment where users are regularly added or removed, it is crucial to ensure the revocation of access rights when users leave the system, preventing them from accessing cloud resources with previously assigned attributes and secret keys. This article presents Chaos-ABAC, a new framework based on a chaotic system that enhances the security and reliability of ABAC models. By integrating dynamic policy authorization and real-time encryption of attribute credentials , Chaos-ABAC ensures existential unforgeability against attacks involving attributes and nonce. A comprehensive security analysis demonstrates that Chaos-ABAC effectively mitigates selective attribute plaintext attacks and preserves user confidentiality. The experimental results further validate its reliability, ease of implementation, and superior performance compared to existing schemes.

Article activity feed