Tree-Based Cryptographic Access Control

被引:7
|
作者
Alderman, James [1 ]
Farley, Naomi [1 ]
Crampton, Jason [1 ]
机构
[1] Royal Holloway Univ London, Egham TW20 0EX, Surrey, England
来源
基金
欧盟地平线“2020”; 英国工程与自然科学研究理事会;
关键词
KEY; ENFORCEMENT;
D O I
10.1007/978-3-319-66402-6_5
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As more and more data is outsourced to third party servers, the enforcement of access control policies using cryptographic techniques becomes increasingly important. Enforcement schemes based on symmetric cryptography typically issue users a small amount of secret material which, in conjunction with public information, allows the derivation of decryption keys for all data objects for which they are authorized. We generalize the design of prior enforcement schemes by mapping access control policies to a graph-based structure. Unlike prior work, we envisage that this structure may be defined independently of the policy to target different efficiency goals; the key issue then is how best to map policies to such structures. To exemplify this approach, we design a space-efficient KAS based on a binary tree which imposes a logarithmic bound on the required number of derivations whilst eliminating public information. In the worst case, users may require more cryptographic material than in prior schemes; we mitigate this by designing heuristic optimizations of the mapping and show through experimental results that our scheme performs well compared to existing schemes.
引用
收藏
页码:47 / 64
页数:18
相关论文
共 50 条
  • [1] The Research of Role Tree-Based Access Control Model
    陆虹
    夏天
    [J]. Journal of Donghua University(English Edition), 2010, 27 (02) : 274 - 276
  • [2] TBAC: tree-based access control approach for secure access of PHR in cloud
    Athena, J.
    Sumathy, V
    [J]. INTERNATIONAL JOURNAL OF BIOMEDICAL ENGINEERING AND TECHNOLOGY, 2019, 29 (03) : 246 - 272
  • [3] CRYPTOGRAPHIC IMPLEMENTATION OF A TREE HIERARCHY FOR ACCESS-CONTROL
    SANDHU, RS
    [J]. INFORMATION PROCESSING LETTERS, 1988, 27 (02) : 95 - 98
  • [4] Key escrow with tree-based access structure
    Schaffer, M
    Schartner, P
    [J]. COMPUTER NETWORK SECURITY, PROCEEDINGS, 2005, 3685 : 454 - 459
  • [5] Medium Access Control for a Tree-Based Wireless Sensor Network: Synchronization Management
    Chalhoub, Gerard
    Guitton, Alexandre
    Jacquet, Frederique
    Freitas, Antonio
    Misson, Michel
    [J]. 2008 1ST IFIP WIRELESS DAYS (WD), 2008, : 55 - 59
  • [6] Tree-based Disaster Recovery Multihop Access Network
    Quang Tran Minh
    Kien Nguyen
    Kamioka, Eiji
    Yamada, Shigeki
    [J]. 2013 19TH ASIA-PACIFIC CONFERENCE ON COMMUNICATIONS (APCC): SMART COMMUNICATIONS TO ENHANCE THE QUALITY OF LIFE, 2013, : 409 - 414
  • [7] Isogeny-Based Cryptographic Access Control
    Aleksandrova, E. B.
    Shtyrkina, A. A.
    Yarmak, A., V
    [J]. AUTOMATIC CONTROL AND COMPUTER SCIENCES, 2020, 54 (08) : 803 - 812
  • [8] Isogeny-Based Cryptographic Access Control
    E. B. Aleksandrova
    A. A. Shtyrkina
    A. V. Yarmak
    [J]. Automatic Control and Computer Sciences, 2020, 54 : 803 - 812
  • [9] Tree-Based Concurrency Control in Distributed Groupware
    Mihail Ionescu
    Ivan Marsic
    [J]. Computer Supported Cooperative Work (CSCW), 2003, 12 (3): : 329 - 350
  • [10] COMPLEXITY ISSUES IN TREE-BASED VERSION CONTROL
    NISHIMURA, N
    [J]. LECTURE NOTES IN COMPUTER SCIENCE, 1989, 382 : 472 - 486