A secure solution on hierarchical access control
نویسندگان
چکیده
Hierarchical access control is an important and traditional problem in information security. In 2001, Wu et.al. proposed an elegant solution for hierarchical access control by the secure-filter. Jeng and Wang presented an improvement of Wu et. al.’s method by the ECC cryptosystem. However, secure-filter method is insecure in dynaminc access control. Lie, Hsu and Tripathy, Paul pointed out some secure leaks on the secure-filter and presented some improvements to eliminate these secure flaws. In this paper, we revise the secure-filter in Jeng-Wang method and propose another secure solutions in hierarchical access control problem. CA is a super security class (user) in our proposed method and the secure-filter of ui in our solutions is a polynomial of degree ni + 1 in Z ∗ p, fi(x) = (x− hi)(x− a1) · · · (x− ani) +Lli(Ki). Although the degree of our secure-filter is larger than others solutions, our solution is secure and efficient in dynamics access control.
منابع مشابه
A secure solution on dynamic and hierarchical access controls
Hierarchical access control is an important and traditional problem in information security. In 2001, Wu et.al. proposed an elegant solution for hierarchical access control by the secure-filter. Jeng and Wang presented an improvement of Wu et. al.’s method by the ECC cryptosystem. However, secure-filter method is insecure in dynaminc access control. Lie, Hsu and Tripathy, Paul pointed out some ...
متن کاملEnforcing RBAC Policies over Data Stored on Untrusted Server (Extended Version)
One of the security issues in data outsourcing is the enforcement of the data owner’s access control policies. This includes some challenges. The first challenge is preserving confidentiality of data and policies. One of the existing solutions is encrypting data before outsourcing which brings new challenges; namely, the number of keys required to access authorized resources, efficient policy u...
متن کاملA Cryptographic Solution for General Access Control
As one of the most popular information safeguarding mechanisms, access control is widely deployed in information systems. However, access control approach suffers from a tough problem, i.e. system administrators must be unconditionally trusted. Cryptographic substitutes have been developed to solve the above problem. In particular, hierarchical encryption, as an alternate solution of access con...
متن کاملKey Management in Hierarchical Access Control Systems
Blanton, Marina V. Ph.D., Purdue University, August, 2007. Key Management in Hierarchical Access Control Systems. Major Professor: Mikhail J. Atallah. In a hierarchical access control system, users are partitioned into a number of classes – called security classes – which are organized in a hierarchy. Hierarchies arise in systems where some users have higher privileges than others and a securit...
متن کاملAnalysis of Attribute Set-Based Encryption Solution for Access Control in Cloud Computing
Cloud computing is one of the most influential domain in the information technology. Encryption scheme perform sequence implicit operation on the plaintext by processing the original text which supports all the operations increases the storage capacity and provides the secure data transfer. In order to realize scalable, flexible, and fine-grained access control of outsourced data in cloud compu...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- CoRR
دوره abs/1111.7209 شماره
صفحات -
تاریخ انتشار 2011