An Improved Key-Management Scheme for Hierarchical Access Control

نویسندگان

  • Wan-Yu Chao
  • Cheng-Yi Tsai
  • Min-Shiang Hwang
چکیده

Now, most institutions share the data through the Internet. With the rapid development of the Internet and the cloud storage, data-sharing becomes so easy that the data was stolen or destroyed easier than before. Therefore, accessing data should strictly control to avoid unauthorized access. In this paper, we propose the more efficient key management scheme for hierarchical access control than Odelu et al.’s scheme.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Enforcing RBAC Policies over Data Stored on Untrusted Server (Extended Version)

One of the security issues in data outsourcing is the enforcement of the data owner’s access control policies. This includes some challenges. The first challenge is preserving confidentiality of data and policies. One of the existing solutions is encrypting data before outsourcing which brings new challenges; namely, the number of keys required to access authorized resources, efficient policy u...

متن کامل

A Key Management Scheme for Hierarchical Access Control in Group Communication

In group communication, users often have different access rights to multiple data streams. Based on the access relation of users and data streams, users can form partially ordered relations, and data streams can form partially ordered relations. In this paper, we propose a key management scheme for hierarchical access control, which considers both partially ordered user relations and partially ...

متن کامل

An Efficient and Secure Key Management Scheme for Hierarchical Access Control Based on ECC

In a key management scheme for hierarchy based access control, each security class having higher clearance can derive the cryptographic secret keys of its other security classes having lower clearances. In 2006 Jeng-Wang proposed an efficient scheme on access control in user hierarchy based on elliptic curve cryptosystem. Their scheme provides solution of key management efficiently for dynamic ...

متن کامل

An ID-based Hierarchical Access Control Scheme with Constant Size Public Parameter

Many ways are proposed to reduce the secret storage space of access control in hierarchy, but no one optimizes the public parameters which are only modified by CA. Length of each public parameter is one important factor for the size and utilization of storage space. The frequent changes on the maximum length of public parameter will be a weakness for stability, in dynamic key management. Number...

متن کامل

Hierarchical Access control in Dynamic Peer Groups using Symmetric Polynomial and Tree based Group Elliptic Curve Diffie Hellman Scheme

Hierarchical Access Control in group communication is an active area of research which is difficult to achieve it. Its primary objective is to allow users of a higher authority group to access information or resource held by lower group users and preventing the lower group users to access information held by higher class users. Large collection of collaborative applications in organizations inh...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • I. J. Network Security

دوره 19  شماره 

صفحات  -

تاریخ انتشار 2017