Extending Expressive Access Policies with Privacy Features

Stefan More, Sebastian Ramacher, Lukas Alber, Marco Herzl

Research output: Chapter in Book/Report/Conference proceedingConference paperpeer-review

Abstract

Authentication, authorization, and trust verification are central parts of an access control system. The conditions for granting access in such a system are collected in access policies. Since access conditions are often complex, dedicated languages – policy languages – for defining policies are in use.However, current policy languages are unable to express such conditions having privacy of users in mind. With privacy-preserving technologies, users are enabled to prove information to the access system without revealing it.In this work, we present a generic design for supporting privacy-preserving technologies in policy languages. Our design prevents unnecessary disclosure of sensitive information while still allowing the formulation of expressive rules for access control. For that we make use of zero-knowledge proofs (NIZKs). We demonstrate our design by applying it to the TPL policy language, while using SNARKs. Also, we evaluate the resulting ZK-TPL language and its associated toolchain. Our evaluation shows that for regular-sized credentials communication and verification overhead is negligible
Original languageEnglish
Title of host publicationThe 21th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2022)
PublisherIEEE Computer Soc.
Pages574-581
Number of pages8
ISBN (Electronic)9781665494250
DOIs
Publication statusPublished - Mar 2023
Event21st IEEE International Conference on Trust, Security and Privacy in Computing and Communications: TrustCom 2022 - Wuhan, Hybrider Event, China
Duration: 9 Dec 202211 Dec 2022
http://www.ieee-hust-ncc.org/2022/TrustCom/

Conference

Conference21st IEEE International Conference on Trust, Security and Privacy in Computing and Communications
Abbreviated titleTrustCom 2022
Country/TerritoryChina
CityHybrider Event
Period9/12/2211/12/22
Internet address

Keywords

  • access control
  • policy languages
  • privacy
  • zero-knowledge proofs

ASJC Scopus subject areas

  • Information Systems and Management
  • Safety, Risk, Reliability and Quality
  • Information Systems
  • Health Informatics
  • Computer Networks and Communications

Fingerprint

Dive into the research topics of 'Extending Expressive Access Policies with Privacy Features'. Together they form a unique fingerprint.

Cite this