A Novel Dynamic Role-Based Access Control Scheme in User Hierarchy
نویسندگان
چکیده
Role-based access control is an important mechanism to prevent the unauthorized access in terms of roles. User hierarchy is an efficient structure to express the relations between different roles. The combination between role-based access control and the user hierarchy is required in different context, especially in open internet environment where the published or delegated data are encrypted for privacy. In this paper, we propose a novel role-based access control scheme in user hierarchy, which can implement dynamic access control in open internet environment. Our approach is implemented by using one-way hash function to avoid the leakage of keys from different roles, by using a hashed value as the identifier of a role and by using derivation function to derive keys in the lower hierarchy from the keys in the upper hierarchy. The key generation, identifier computation and key derivation is quite simple, and the parameters remembered by users are fixed.
منابع مشابه
Attribute-based Access Control for Cloud-based Electronic Health Record (EHR) Systems
Electronic health record (EHR) system facilitates integrating patients' medical information and improves service productivity. However, user access to patient data in a privacy-preserving manner is still challenging problem. Many studies concerned with security and privacy in EHR systems. Rezaeibagha and Mu [1] have proposed a hybrid architecture for privacy-preserving accessing patient records...
متن کاملA context-sensitive dynamic role-based access control model for pervasive computing environments
Resources and services are accessible in pervasive computing environments from anywhere and at any time. Also, due to ever-changing nature of such environments, the identity of users is unknown. However, users must be able to access the required resources based on their contexts. These and other similar complexities necessitate dynamic and context-aware access control models for such environmen...
متن کاملAn Efficient and Secure Key Management Scheme for Hierarchical Access Control Based on ECC
In a key management scheme for hierarchy based access control, each security class having higher clearance can derive the cryptographic secret keys of its other security classes having lower clearances. In 2006 Jeng-Wang proposed an efficient scheme on access control in user hierarchy based on elliptic curve cryptosystem. Their scheme provides solution of key management efficiently for dynamic ...
متن کاملA New Cryptographic Key Assignment Scheme using a One-way Hash Function
Access control in a hierarchy plays an important role in today’s communication networks. To guarantee the quality of communication services it is necessary to construct a low-computation dynamic access control scheme for the use to obtain the secure information. Therefore, we propose an efficient identity-based cryptographic key assignment scheme in which the cryptographic key of each user is c...
متن کاملAn Improvement of Novel Cryptographic Key Assignment Scheme for Dynamic Access Control in a Hierarchy
This letter presents a cryptographic key assignment scheme for dynamic access control in a hierarchy. A scheme for extending a previous cryptographic key assignment scheme to reduce the computation required for key generation and derivation algorithms is also proposed.
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2010