Novel Authentication & Authorization Management for Sensitive Information Privacy Protection Using Dynamic Key Based Group Key Management
نویسندگان
چکیده
This paper presents a secure authentication and authorization management mechanism for protecting privacy in sensitive information systems. It allows involved individuals and group participants to achieve high security levels and tight authorization control. The need of sharing long term secrets to authenticate individuals and group users is eradicated in the proposed protocol by dynamic keys. It overcomes the secrets compromising during authentication via open networks. Furthermore, it also offers an ability allowing information owners to have fine-gained control of their critical information. Finally, the paper gives a formal analysis to demonstrate how secure the proposed work together with discussions of security issues. It is argued that the proposed work achieves strong authentication and authorization, and solves the involved participants’ plausible deniability issues.
منابع مشابه
A novel key management scheme for heterogeneous sensor networks based on the position of nodes
Wireless sensor networks (WSNs) have many applications in the areas of commercial, military and environmental requirements. Regarding the deployment of low cost sensor nodes with restricted energy resources, these networks face a lot of security challenges. A basic approach for preparing a secure wireless communication in WSNs, is to propose an efficient cryptographic key management protocol be...
متن کاملA Novel TTP with Checksum Row Authorization Algorithm for Access Control and Data Protection in Collaborative Mobile Computing Environment
: With the introduction of smart phones with wide range of applications, the modern business world gains the advantage of all in-one gadgets with roaming work place. The collaborative computing applications found in smart phones helps in performing group work with colleagues even out of the office as all the normal computer functions are possible with the smart phones. Such applications support...
متن کاملA Study based on the Trust Management
Trust plays a vital role in human life. It is the key to the door of other people’s minds. It cannot be judge easily. The user may trust on an insecure channel for communication of sensitive information which may get leaked. In multimedia the authentication and authorization is related with Trust management. Applications where a more dynamic trust management is advantageous may have a quickly v...
متن کاملPolicy Based Framework for Trust Management and Evolution of Peer to Peer Groups
Peer to peer collaborative groups are becoming increasingly popular for collaborative applications like video/audio conferencing, IP telephony, file sharing, collaborative work spaces, and multi-user games. The decentralized nature of these groups gives rise to the need of a secure group layer which integrates authentication, admission control, authorization, access control and key management. ...
متن کاملToward an energy efficient PKC-based key management system for wireless sensor networks
Due to wireless nature and hostile environment, providing of security is a critical and vital task in wireless sensor networks (WSNs). It is known that key management is an integral part of a secure network. Unfortunately, in most of the previous methods, security is compromised in favor of reducing energy consumption. Consequently, they lack perfect resilience and are not fit for applications ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- IJCSA
دوره 6 شماره
صفحات -
تاریخ انتشار 2009