Dynamic permission access control model based on privacy protection

نویسندگان

چکیده

Access control technology is one of the key technologies to ensure safe resource sharing. Identity authentication and authority distribution are two for access restrict unauthorized users from accessing resources, only authorised legal can resources. However, user privacy protection frequent permission changes thorny issues that need be solved urgently by technology. In this paper, a dynamic model based on proposed deal with these problems. Compared existing technologies, main advantages paper as follows: (1) Encrypt hide attributes entities, use attribute-based identity authentication, which not achieves purpose traditional but also ensures entities leaked; (2) Binding permissions entity attributes, dynamically assigning adjusting through in making more fine-grained flexible. Security proof performance analysis show protocol secure under hardness assumption discrete logarithm problem decision bilinear Diffie–Hellman problem. cited references, has low computational complexity, short time, communication overhead.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Privacy Preserving Dynamic Access Control Model with Access Delegation for eHealth

eHealth is the concept of using the stored digital data to achieve clinical, educational, and administrative goals and meet the needs of patients, experts, and medical care providers. Expansion of the utilization of information technology and in particular, the Internet of Things (IoT) in eHealth, raises various challenges, where the most important one is security and access control. In this re...

متن کامل

Conditional Purpose Based Access Control Model for Privacy Protection

This paper presents a model for privacy preserving access control which is based on variety of purposes. Conditional purpose is applied along with allowed purpose and prohibited purpose in the model. It allows users using some data for certain purpose with conditions. The structure of conditional purpose based access control model is defined and investigated through a practical paradigm with ac...

متن کامل

Purpose based access control for privacy protection

Enforcement of the Sticky-policy requirement. Investigation of Fine-grained Access Control. <{G}, {T}> 94037 CA S. F. 9898 First Ave 1003 <{G}, > 46464 IL Chicago 433 State Road 1002 <{G}, {A, M}> 47907 IN W.Lafayette 232 Oval Drive 1001 addr_ip zip state city street c_id <{G}, {T}> [email protected] <{G}, > Jack <{G}, > 1003 <{G}, > [email protected] <{G}, > Paul <{G}, > 1002 <{P, S}, {M}> [email protected] ...

متن کامل

Privacy Protection Data Access Control

For some purposes, such as benefits, requirement-fitted services and management, enterprises regularly ask customers, employees, and business partner to provide relevance data including sensitive personal information. However, transparent information bring the infringement of privacy and threats of living security to the data providers. Recently, enterprises have suffered from the loss of poten...

متن کامل

INSPIRED: Intention-based Privacy-preserving Permission Model

Mobile operating systems adopt permission systems to protect system integrity and user privacy. In this work, we propose INSPIRED, an intention-aware dynamic mediation system for mobile operating systems with privacy preserving capability. When a security or privacy sensitive behavior is triggered, INSPIRED automatically infers the underlying program intention by examining its runtime environme...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Telecommunication Systems

سال: 2022

ISSN: ['1572-9451', '1018-4864']

DOI: https://doi.org/10.1007/s11235-022-00937-8