Distributed Hierarchical Access Control for Secure Group Communications

نویسندگان

  • Ruidong Li
  • Jie Li
  • Hisao Kameda
چکیده

Hierarchical access control to ensure multiple levels of access privilege for group members is required in many environments, such as hierarchically managed organizations and multimedia applications. In this paper, to efficiently and effectively achieve this goal, we propose a distributed key management scheme whereby each SG (Service Group) maintains an SG server. This server is utilized to manage the key tree and provide the related session keys for all the users in this SG. Compared with the already existing method employing an integrated key graph to the hierarchical access control problem, there is no complex merging key tree algorithm needed in the proposed scheme, and thus the communication overhead can be greatly reduced. Also the trust and communication burden on one centralized server, KDC (Key Distribution Center), is scattered, and thus better scalability when the number of users increases can be achieved.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Secure hierarchy-based access control in distributed environments

Access control is a fundamental concern in any system that manages resources, e.g., operating systems, file systems, databases and communications systems. The problem we address is how to specify, enforce, and implement access control in distributed environments. Starting from an access relation between users and resources, we derive a user hierarchy, a resource hierarchy, and a unified hierarc...

متن کامل

Secure group communication protocol for distributed systems

Group communication among multiple entities is required in distributed applications like groupware systems. In addition to conventional wide-area networks, local area networks (LANs) and radio networks are available to realize the applications. The LANs and radio networks provide broadcast communication at the media access control (MAC) layer, that is, every communication entity, i.e. station c...

متن کامل

Secure Hierarchical Temporal Access Control in Cloud Computing

Cloud computing is a heavy appropriated registering standard. In spite of the fact that, distributed computing is a persuasive standard, access control is one of the principle security issues in distributed computing. Various methodologies for secure access control of outsourced information in distributed computing oblige figure content arrangement trait based encryption (CP-ABE), key-approach ...

متن کامل

Hierarchical Access control in Dynamic Peer Groups using Symmetric Polynomial and Tree based Group Elliptic Curve Diffie Hellman Scheme

Hierarchical Access Control in group communication is an active area of research which is difficult to achieve it. Its primary objective is to allow users of a higher authority group to access information or resource held by lower group users and preventing the lower group users to access information held by higher class users. Large collection of collaborative applications in organizations inh...

متن کامل

Chinese Remainder Theorem Based Hierarchical Access Control for Secure Group Communication

Secure group communication with hierarchical access control refers to a scenario where a group of members is divided into a number of subgroups located at different privilege levels and a high-level subgroup can receive and decrypt messages within any of its descendant lower-level subgroups; but the converse is not allowed. In this paper, we propose a new scheme CRTHACS, which is based on the C...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2005