Tree-Based Cryptographic Access Control

被引:7
|
作者
Alderman, James [1 ]
Farley, Naomi [1 ]
Crampton, Jason [1 ]
机构
[1] Royal Holloway Univ London, Egham TW20 0EX, Surrey, England
来源
基金
欧盟地平线“2020”; 英国工程与自然科学研究理事会;
关键词
KEY; ENFORCEMENT;
D O I
10.1007/978-3-319-66402-6_5
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As more and more data is outsourced to third party servers, the enforcement of access control policies using cryptographic techniques becomes increasingly important. Enforcement schemes based on symmetric cryptography typically issue users a small amount of secret material which, in conjunction with public information, allows the derivation of decryption keys for all data objects for which they are authorized. We generalize the design of prior enforcement schemes by mapping access control policies to a graph-based structure. Unlike prior work, we envisage that this structure may be defined independently of the policy to target different efficiency goals; the key issue then is how best to map policies to such structures. To exemplify this approach, we design a space-efficient KAS based on a binary tree which imposes a logarithmic bound on the required number of derivations whilst eliminating public information. In the worst case, users may require more cryptographic material than in prior schemes; we mitigate this by designing heuristic optimizations of the mapping and show through experimental results that our scheme performs well compared to existing schemes.
引用
收藏
页码:47 / 64
页数:18
相关论文
共 50 条
  • [21] Tree-based access methods for spatial databases: Implementation and performance evaluation
    Gunther, Oliver
    Bilmes, Jeff
    [J]. IEEE Transactions on Knowledge and Data Engineering, 1991, 3 (03) : 342 - 356
  • [22] A tree-based Mergesort
    Moffat, A
    Petersson, O
    Wormald, NC
    [J]. ACTA INFORMATICA, 1998, 35 (09) : 775 - 793
  • [23] A cryptographic credential based access control mechanism for industrial control system
    Shi, Sha
    Wen, Qiaoyan
    [J]. International Journal of Advancements in Computing Technology, 2012, 4 (07) : 152 - 158
  • [24] A Tree-based Mergesort
    Alistair Moffat
    Ola Petersson
    Nicholas C. Wormald
    [J]. Acta Informatica, 1998, 35 : 775 - 793
  • [25] Comparing performance of non–tree-based and tree-based association mapping methods
    Katherine L. Thompson
    David W. Fardo
    [J]. BMC Proceedings, 10 (Suppl 7)
  • [26] Universally Composable Cryptographic Role-Based Access Control
    Liu, Bin
    Warinschi, Bogdan
    [J]. PROVABLE SECURITY, (PROVSEC 2016), 2016, 10005 : 61 - 80
  • [27] A congestion control algorithm for tree-based reliable multicast protocols
    Chiu, DM
    Kadansky, M
    Provino, J
    Wesley, J
    Bischof, HP
    Zhu, HF
    [J]. IEEE INFOCOM 2002: THE CONFERENCE ON COMPUTER COMMUNICATIONS, VOLS 1-3, PROCEEDINGS, 2002, : 1209 - 1217
  • [28] Tree-based admission control for Mobile QoS in DiffServ networks
    Moon, JY
    Yun, MY
    Lee, SH
    [J]. 8TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY, VOLS 1-3: TOWARD THE ERA OF UBIQUITOUS NETWORKS AND SOCIETIES, 2006, : U1302 - U1305
  • [29] Tree-based Model Predictive Control Strategy for Software Rejuvenation
    Arauz, T.
    Maestre, J. M.
    Quevedo, D.
    Camacho, E. F.
    [J]. 2022 IEEE 61ST CONFERENCE ON DECISION AND CONTROL (CDC), 2022, : 1124 - 1129
  • [30] Speculative Multi-Level Access in LSM Tree-Based KV Store
    Park, Jongwon
    Jeong, Jinkyu
    [J]. IEEE COMPUTER ARCHITECTURE LETTERS, 2022, 21 (02) : 145 - 148