containers technology. Furthermore, we conducted
a thorough performance evaluation of CryptoAC to
demonstrate its scalability and efficiency. COER-
CIVE is available online as open-source software.
32
Future Directions. We are implementing further
functionalities of CryptoAC, like multi-administrator
support and tree-based file sharing. Moreover, we
are working on the secure management of crypto-
graphic material (e.g., users’ private keys) to seam-
lessly support solutions like Trusted Execution Envi-
ronments. To extend the applicability of COERCIVE,
we are planning to integrate CryptoAC with Hyper-
ledger Fabric to replace the cloud with a decentralized
solution. Finally, in this paper we analyzed the per-
formance of CryptoAC with respect to scalability and
asymptotic behaviours, which may be unlikely in real-
world scenarios. To further study the performance of
CryptoAC, we are developing a dedicated simulator to
evaluate CryptoAC on arbitrary AC policies through
real-world workflows (i.e., sequences of operations).
ACKNOWLEDGMENTS
The authors were supported in part by the Integrated
Framework for Predictive and Collaborative Secu-
rity of Financial Infrastructures (FINSEC) project and
the 5G-CARMEN project that received funding from
the European Union’s Horizon 2020 Research and
Innovation Programme under grant agreements no.
786727 and no. 825012, respectively.
REFERENCES
Bacis, E., De Capitani di Vimercati, S., Foresti, S.,
Paraboschi, S., Rosa, M., and Samarati, P. (2016).
Mix&slice: Efficient access revocation in the cloud. In
Proceedings of the 2016 ACM SIGSAC Conference on
Computer and Communications Security, pages 217–
228. ACM.
Berlato, S., Carbone, R., Lee, A. J., and Ranise, S. (2020).
Exploring architectures for cryptographic access con-
trol enforcement in the cloud for fun and optimiza-
tion. In 15th ACM ASIA Conference on Computer and
Communications Security (ASIACCS 2020). ACM.
Cai, F., Zhu, N., He, J., Mu, P., Li, W., and Yu, Y. (2019).
Survey of access control models and technologies for
cloud computing. Cluster Computing, 22:6111–6122.
Djoko, J. B., Lange, J., and Lee, A. J. (2019). NeXUS:
Practical and secure access control on untrusted stor-
age platforms using client-side SGX. In 2019 49th
Annual IEEE/IFIP International Conference on De-
32
https://github.com/stfbk/CryptoAC
pendable Systems and Networks (DSN), pages 401–
413. IEEE.
Domingo-Ferrer, J., Farr
`
as, O., Ribes-Gonz
´
alez, J., and
S
´
anchez, D. (2019). Privacy-preserving cloud com-
puting on sensitive data: A survey of methods, prod-
ucts and challenges. Computer Communications, 140-
141:38–60.
Garrison, W. C., Shull, A., Myers, S., and Lee, A. J. (2016).
On the practicality of cryptographically enforcing dy-
namic access control policies in the cloud. In 2016
IEEE Symposium on Security and Privacy (SP), pages
819–838. IEEE.
Ghita, V., Costea, S., and Tapus, N. (2017). Implementation
of cryptographically enforced rbac. The Scientific Bul-
letin - University Politehnica of Bucharest, 79(2):9–3–
102.
Horandner, F., Krenn, S., Migliavacca, A., Thiemer, F., and
Zwattendorfer, B. (2016). CREDENTIAL: A Frame-
work for Privacy-Preserving Cloud-Based Data Shar-
ing. In 2016 11th International Conference on Avail-
ability, Reliability and Security (ARES), pages 742–
749, Salzburg, Austria. IEEE.
Jang-Jaccard, J. (2018). A Practical Client Application
Based on Attribute Based Access Control for Un-
trusted Cloud Storage. In Computer Science & In-
formation Technology, pages 01–15. Academy & In-
dustry Research Collaboration Center (AIRCC).
Premarathne, U., Abuadbba, A., Alabdulatif, A., Khalil, I.,
Tari, Z., Zomaya, A., and Buyya, R. (2016). Hybrid
Cryptographic Access Control for Cloud-Based EHR
Systems. IEEE Cloud Computing, 3(4):58–64.
Qi, S. and Zheng, Y. (2019). Crypt-DAC: Cryptographically
Enforced Dynamic Access Control in the Cloud. IEEE
Transactions on Dependable and Secure Computing,
pages 1–1.
Rezaeibagha, F. and Mu, Y. (2016). Distributed clinical data
sharing via dynamic access-control policy transforma-
tion. International Journal of Medical Informatics,
89:25–31.
Samarati, P. and de Capitani di Vimercati, S. (2000). Access
control: Policies, models, and mechanisms. In Fo-
cardi, R. and Gorrieri, R., editors, Foundations of Se-
curity Analysis and Design, volume 2171, pages 137–
196. Springer Berlin Heidelberg.
Sato, H. and Fugkeaw, S. (2015). Design and Implementa-
tion of Collaborative Ciphertext-Policy Attribute-Role
based Encryption for Data Access Control in Cloud.
Journal of Information Security Research, 6(3):71–
84.
Tang, Y., Lee, P. P., Lui, J. C., and Perlman, R. (2012). Fade:
Secure overlay cloud storage with file assured dele-
tion. IEEE Transactions on Dependable and Secure
Computing, 9(6):903–916.
Zarandioon, S., Yao, D., and Ganapathy, V. (2012). K2c:
Cryptographic Cloud Storage with Lazy Revocation
and Anonymous Access. In Rajarajan, M., Piper, F.,
Wang, H., and Kesidis, G., editors, Security and Pri-
vacy in Communication Networks, volume 96, pages
59–76. Springer Berlin Heidelberg, Berlin, Heidel-
berg.
Zhou, L., Varadharajan, V., and Hitchens, M. (2013).
Achieving Secure Role-Based Access Control on En-
crypted Data in Cloud Storage. IEEE Transactions
on Information Forensics and Security, 8(12):1947–
1960.
Cryptographic Enforcement of Access Control Policies in the Cloud: Implementation and Experimental Assessment
381