Abstract
Attribute-based Encryption (abe) allows for implementing fine-grained decentralized access control based on properties or attributes a user has. Thus, there is no need for writing detailed, user-based policies in advance. This makes abe in particular interesting for implementing security mechanisms in dynamic environments such as ubiquitous computing, disaster management, or health-care. For supporting the latter two application areas, common abe approaches lack one important feature: break-glass, i. e., the controlled overriding of access control restrictions.
In this paper we present an integration of break-glass into an approach for end-to-end secure information sharing using abe techniques.
Chapter PDF
Similar content being viewed by others
Keywords
References
Break-glass: An approach to granting emergency access to healthcare systems. White paper, Joint NEMA/COCIR/JIRA Security and Privacy Committee (2004)
Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption. In: IEEE Symposium on Security and Privacy, pp. 321–334. IEEE Computer Society Press, Los Alamitos (2007)
Brucker, A.D., Hutter, D.: Information flow in disaster management systems. In: International Conference on Availability, Reliability and Security (ares), IEEE Computer Society Press, Los Alamitos (2010)
Brucker, A.D., Petritsch, H.: Extending access control models with break-glass. In: Carminati, B., Joshi, J. (eds.) ACM symposium on access control models and technologies (sacmat), pp. 197–206. ACM Press, New York (2009)
Ferreira, A., Cruz-Correia, R., Antunes, L., Farinha, P., Oliveira-Palhares, E., Chadwick, D., Costa-Pereira, A.: How to break access control in a controlled manner. In: IEEE International Symposium on Computer-Based Medical Systems (cbms), pp. 847–854 (2006)
Gardner, R.W., Garera, S., Pagano, M.W., Green, M., Rubin, A.D.: Securing medical records on smart phones. In: ACM workshop on Security and privacy in medical and home-care systems (spimacs), pp. 31–40. ACM Press, New York (2009)
Gentry, C.: IBE (Identity-Based Encryption). In: Handbook of Information Security, vol. 2, pp. 575–592. John Wiley & Sons, Chichester (2006)
Huang, D., Verma, M.: aspe: attribute-based secure policy enforcement in vehicular ad hoc networks. Ad Hoc Networks 7(8), 1526–1535 (2009)
Johnson, C.W.: Complexity, structured chaos and the importance of information management for mobile computing in the uk floods of 2007. In: [12], pp. 1–11 (2007)
Lachner, J., Hellwagner, H.: Information and communication systems for mobile emergency response. In: Kaschek, R., Kop, C., Steinberger, C., Fliedl, G. (eds.) Information Systems and e-Business Technologies (uniscon). LNBIP, vol. 5, pp. 213–224. Springer, Heidelberg (1974)
Levin, T.E., Dwoskin, J.S., Bhaskara, G., Nguyen, T.D., Clark, P.C., Lee, R.B., Irvine, C.E., Benzel, T.: Securing the dissemination of emergency response data with an integrated hardware-software architecture. In: Chen, L., Mitchell, C.J., Martin, A. (eds.) Trust 2009. LNCS, vol. 5471, pp. 133–152. Springer, Heidelberg (2009)
Löffler, J., Klann, M. (eds.): Mobile Information Technology for Emergency Response (MobileResponse). LNCS, vol. 5424. Springer, Heidelberg (2009)
Pirretti, M., Traynor, P., McDaniel, P., Waters, B.: Secure attribute-based systems. In: ACM conference on Computer and communications security (ccs), pp. 99–112. ACM Press, New York (2006)
Sahai, A., Waters, B.: Fuzzy identity-based encryption. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 457–473. Springer, Heidelberg (2005)
Weber, S.G.: Securing first response coordination with dynamic attribute-based encryption. In: World Congress on Privacy, Security, Trust and the Management of e-Business (congress), pp. 58–69. IEEE Computer Society Press, Los Alamitos (2009)
Yu, S., Ren, K., Lou, W.: FDAC: Toward fine-grained distributed data access control in wireless sensor networks. In: IEEE Conference on Computer Communications (infocom). IEEE Computer Society Press, Los Alamitos (2009)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 IFIP International Federation for Information Processing
About this paper
Cite this paper
Brucker, A.D., Petritsch, H., Weber, S.G. (2010). Attribute-Based Encryption with Break-Glass. In: Samarati, P., Tunstall, M., Posegga, J., Markantonakis, K., Sauveron, D. (eds) Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices. WISTP 2010. Lecture Notes in Computer Science, vol 6033. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-12368-9_18
Download citation
DOI: https://doi.org/10.1007/978-3-642-12368-9_18
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-12367-2
Online ISBN: 978-3-642-12368-9
eBook Packages: Computer ScienceComputer Science (R0)