Extending Expressive Access Policies with Privacy Features

12/05/2022
by   Stefan More, et al.
0

Authentication, authorization, and trust verification are central parts of an access control system. The conditions for granting access in such a system are collected in access policies. Since access conditions are often complex, dedicated languages – policy languages – for defining policies are in use. However, current policy languages are unable to express such conditions having privacy of users in mind. With privacy-preserving technologies, users are enabled to prove information to the access system without revealing it. In this work, we present a generic design for supporting privacy-preserving technologies in policy languages. Our design prevents unnecessary disclosure of sensitive information while still allowing the formulation of expressive rules for access control. For that we make use of zero-knowledge proofs (NIZKs). We demonstrate our design by applying it to the TPL policy language, while using SNARKs. Also, we evaluate the resulting ZK-TPL language and its associated toolchain. Our evaluation shows that for regular-sized credentials communication and verification overhead is negligible.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
07/03/2020

Online publication of court records: circumventing the privacy-transparency trade-off

The open data movement is leading to the massive publishing of court rec...
research
08/16/2019

The Next 700 Policy Miners: A Universal Method for Building Policy Miners

A myriad of access control policy languages have been and continue to be...
research
10/19/2020

Private-Yet-Verifiable Contact Tracing

We propose PrYVeCT, a private-yet-verifiable contact tracing system. PrY...
research
03/23/2019

PML: An Interpreter-Based Access Control Policy Language for Web Services

Access control is an important component for web services such as a clou...
research
11/20/2018

ESTRELA: Automated Policy Enforcement Across Remote APIs

Web applications routinely access sensitive and confidential data of use...
research
02/14/2018

Zero-Knowledge Password Policy Check from Lattices

Passwords are ubiquitous and most commonly used to authenticate users wh...

Please sign up or login with your details

Forgot password? Click here to reset