A Two - Key Access Control Scheme Based on Binary Access Mode
نویسندگان
چکیده
A two-key access control scheme is proposed for implementing the access control matrix. The proposed scheme is based on binary form of access rights and time stamp concept. In this scheme each user is assigned one key and each file is also assigned one key. The key of a user or file can be used to derive the access rights to the files depending on the value of time stamp number. The scheme achieves full dynamism. That means, it can easily handle the dynamic access control problem, such as changing access right, adding a user or file and deleting a user or file.
منابع مشابه
Attribute-based Access Control for Cloud-based Electronic Health Record (EHR) Systems
Electronic health record (EHR) system facilitates integrating patients' medical information and improves service productivity. However, user access to patient data in a privacy-preserving manner is still challenging problem. Many studies concerned with security and privacy in EHR systems. Rezaeibagha and Mu [1] have proposed a hybrid architecture for privacy-preserving accessing patient records...
متن کاملTowards Secure Data Retrieval for Multi-Tenant Architecture Using Attribute-Based Key Word Search
Searchable encryption mechanism and attribute-based encryption (ABE) are two effective tools for providing fine-grained data access control in the cloud. Researchers have also taken their advantages to present searchable encryption schemes based on ABE and have achieved significant results. However, most of the existing key word search schemes based on ABE lack the properties of key exposure pr...
متن کاملEnforcing RBAC Policies over Data Stored on Untrusted Server (Extended Version)
One of the security issues in data outsourcing is the enforcement of the data owner’s access control policies. This includes some challenges. The first challenge is preserving confidentiality of data and policies. One of the existing solutions is encrypting data before outsourcing which brings new challenges; namely, the number of keys required to access authorized resources, efficient policy u...
متن کاملA Cryptographic Key Assignment Scheme with Adaptable Time- token Constraint in a Hierarchy
A scheme, which uses flexible cryptographic key management upon adaptable time-token constraint for a user hierarchy access control (UHAC) scheme, is proposed in this paper. For adapting the changeability in a UHAC system, we propose a technique of assigning independent time-token which is distributed by a trusted agency server to reply an authorized user for once secure access request. The key...
متن کاملOptimized Ciphertext-Policy Attribute-Based Encryption with Efficient Revocation
In this work, we design a method for efficient revocation within Ciphertext-Policy Attribute-Based Encryption scheme. Our main technical innovation is based on linear secret sharing and binary tree techniques, every user in system is assigned with both a set of attributes and a unique identifier. Any user can also be efficiently revoked by using this identifier. Furthermore, this technique resu...
متن کامل