Key hierarchies for hierarchical access control in secure group communications

被引:7
|
作者
Yan, Junzhi [1 ]
Ma, Jianfeng [1 ]
Liu, Hongyue [1 ]
机构
[1] Xidian Univ, Minist Educ, Key Lab Comp Networks & Informat Secur, Xian 710071, Peoples R China
基金
中国国家自然科学基金; 国家高技术研究发展计划(863计划);
关键词
Hierarchical access control; Key hierarchy; Key assignment; Secure group communication; MANAGEMENT;
D O I
10.1016/j.comnet.2008.10.011
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The problem of hierarchical access control in secure group communications has elicited much interest in the literatures. However, most of the researches to date on hierarchical access control pay more attention to the particular encryption techniques, but considered little about the features of key hierarchies. In hierarchical access control systems, keys are usually organized hierarchically. We analyze the user-based, resource-based and unified key hierarchies in this paper. The first two hierarchies are established from the access matrix. By unifying these two hierarchies, we get the unified key hierarchy. Furthermore, we introduce the explicit accessible set and the explicit dominating set to describe the key distributions for these hierarchies, and prove that the unified key hierarchy can be formed from the explicit dominating sets in the user-based key hierarchy or the explicit accessible sets in the resource-based key hierarchy. To evaluate the efficiency of the described key hierarchies, we combine these hierarchies with the existing key assignment models and analyze their storage and rekey overheads. These overheads can be derived from the access matrix, and the derivation procedure is described. The conclusions of this paper can help to establish a suitable key hierarchy so as to make the key assignment scheme more efficient in practical applications. (C) 2008 Elsevier B.V. All rights reserved.
引用
收藏
页码:353 / 364
页数:12
相关论文
共 50 条
  • [1] Distributed hierarchical access control for secure group communications
    Li, RD
    Li, J
    Kameda, H
    [J]. NETWORKING AND MOBILE COMPUTING, PROCEEDINGS, 2005, 3619 : 539 - 548
  • [2] Scalable hierarchical access control in secure group communications
    Sun, Y
    Liu, KJR
    [J]. IEEE INFOCOM 2004: THE CONFERENCE ON COMPUTER COMMUNICATIONS, VOLS 1-4, PROCEEDINGS, 2004, : 1296 - 1306
  • [3] Hierarchical group access control for secure multicast communications
    Sun, Yan
    Liu, K. J. Ray
    [J]. IEEE-ACM TRANSACTIONS ON NETWORKING, 2007, 15 (06) : 1514 - 1526
  • [4] Group and hierarchical key management for secure communications in internet of things
    Karrothu, Aravind
    Norman, Jasmine
    [J]. INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2020, 33 (13)
  • [5] Hierarchical access control for secure group communication
    Song, Zong-Yu
    Chen, Chen
    Jin, Zhang
    [J]. 7TH INTERNATIONAL CONFERENCE ON COMPUTER-AIDED INDUSTRIAL DESIGN & CONCEPTUAL DESIGN, 2006, : 215 - +
  • [6] A secure and robust group key distribution and authentication protocol with efficient rekey mechanism for dynamic access control in secure group communications
    Kumar, Vinod
    Kumar, Rajendra
    Pandey, Santosh K.
    [J]. INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2020, 33 (14)
  • [7] Attacks on a secure group communication scheme with hierarchical access control
    Geiselmann, W
    Steinwandt, R
    [J]. 2004 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY, PROCEEDINGS, 2004, : 14 - 14
  • [8] Secure key agreement for group communications
    Yang, Wen-Her
    Shieh, Shiuh-Pyng
    [J]. International Journal of Network Management, 2001, 11 (06) : 365 - 374
  • [9] A Secure Key Management Scheme for Hierarchical Access Control with Secret Key Validity Checking
    Abi-Char, Pierre E.
    Nader, Patrick
    Mahfouz, Sandy
    [J]. 2021 44TH INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS AND SIGNAL PROCESSING (TSP), 2021, : 27 - 33
  • [10] Reactive key management scheme for access control in group communications
    Kim, Heeyoul
    Lee, Younho
    Park, Yongsu
    Yoon, Hyunsoo
    [J]. IEICE TRANSACTIONS ON COMMUNICATIONS, 2007, E90B (04) : 982 - 986