Reducing Space for Storing Keys in a Single Key Access Control System

نویسندگان

  • J. K. Jan
  • J. C. Lee
  • C. H. Lin
  • Chin-Chen Chang
چکیده

Jan proposed a mechanism that fulfils the requirement of a single key-lock (SKL for short) information protection system. Using Jan’s SKL method, each user is given a key, each file a sequence number, and an operating on the key of a user with the sequence number of a file yields the user’s corresponding access privilege on the file. In Jan’s literature, a formula to compute each user’s key for a given set of assigned sequence numbers and a set of corresponding access privileges is also provided. However, different assignments of sequence numbers to the secured files will yield different keys. In this paper, an efficient way to assign a set of sequence numbers to the set of files such that the maximal key value is minimized is presented.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Efficient key management for cryptographically enforced access control

Available online 8 March 2008 Cryptographic enforcement of access control mechanisms relies on encrypting protected data with the keys stored by authorized users. This approach poses the problem of the distribution of secret keys. In this paper, a key management scheme is presented where each user stores a single key and is capable of efficiently calculating appropriate keys needed to access re...

متن کامل

A Key Management Method for Cryptographically Enforced Access Control

This paper describes a key management method for cryptographically enforced access control. In particular, we propose an algorithm that based on the containment relation transforms an arbitrary access control matrix into a hierarchy, to which public private key pairs are assigned based on the DiffieHellman key generation scheme. Therefore, the users have to store only one key and are capable of...

متن کامل

Encrypted storage of medical data on a grid.

OBJECTIVES In this article we present grids as an architecture for medical image processing and health-care networks. We argue that confidential patient data should not be stored unprotected on a grid and explain why access control systems alone do not offer sufficient protection. The objective of our work is to propose a method that complements access control systems on a grid architecture and...

متن کامل

Ciphertext-Policy Attribute based Data-Sharing with Enhanced Productivity and Security

Online data sharing systems and social networks provides security through the cryptographic solutions. For this, Cipher text Policy Attribute Based Encryption is mostly suitable for distributed data sharing systems since the data owner has full control to put in force access policies and updating the policies. Even if the CP-ABE has various advantages, it has a major drawback known as the Key E...

متن کامل

A New Approach for Fault Tolerant and Secure Distributed Storage

Fault-tolerant and secure data storage is an essential requirement in any dependable system. We consider the case where a fault-tolerant and secure data storage service is provided by a set of storage servers. Fault tolerance / security for such a storage service is characterized by three attributes availability, integrity, and confidentiality. Availability and integrity are achieved by using m...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2004