Hierarchical and Shared Access Control

被引:56
|
作者
Castiglione, Arcangelo [1 ]
De Santis, Alfredo [1 ]
Masucci, Barbara [1 ]
Palmieri, Francesco [1 ]
Castiglione, Aniello [1 ]
Li, Jin [2 ]
Huang, Xinyi [3 ]
机构
[1] Univ Salerno, Dept Comp Sci, I-84084 Salerno, Italy
[2] Guangzhou Univ, Sch Comp Sci, Guangzhou 510006, Guangdong, Peoples R China
[3] Fujian Normal Univ, Sch Math & Comp Sci, Fujian Prov Key Lab Network Secur & Cryptol, Fuzhou 350117, Peoples R China
基金
中国国家自然科学基金;
关键词
Generalized access control; generalized access model; key assignment; provable security; shared key reconstruction; multiple access structures; KEY MANAGEMENT; SECURITY; CONSTRUCTIONS; SCHEME;
D O I
10.1109/TIFS.2015.2512533
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Access control ensures that only the authorized users of a system are allowed to access certain resources or tasks. Usually, according to their roles and responsibilities, users are organized in hierarchies formed by a certain number of disjoint classes. Such hierarchies are implemented by assigning a key to each class, so that the keys for descendant classes can be efficiently derived from classes higher in the hierarchy. However, pure hierarchical access may represent a limitation in many real-world cases. In fact, sometimes it is necessary to ensure access to a resource or task by considering both its directly responsible user and a group of users possessing certain credentials. In this paper, we first propose a novel model that generalizes the conventional hierarchical access control paradigm, by extending it to certain additional sets of qualified users. Afterward, we propose two constructions for hierarchical key assignment schemes in this new model, which are provably secure with respect to key indistinguishability. In particular, the former construction relies on both symmetric encryption and perfect secret sharing, whereas, the latter is based on public-key threshold broadcast encryption.
引用
收藏
页码:850 / 865
页数:16
相关论文
共 50 条
  • [1] Access control for shared resources
    Wilde, Erik
    Nabholz, Nick
    [J]. INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE FOR MODELLING, CONTROL & AUTOMATION JOINTLY WITH INTERNATIONAL CONFERENCE ON INTELLIGENT AGENTS, WEB TECHNOLOGIES & INTERNET COMMERCE, VOL 1, PROCEEDINGS, 2006, : 256 - +
  • [2] Access Control by Testing for Shared Knowledge
    Toomim, Michael
    Zhang, Xianhang
    Fogarty, James
    Landay, James A.
    [J]. CHI 2008: 26TH ANNUAL CHI CONFERENCE ON HUMAN FACTORS IN COMPUTING SYSTEMS VOLS 1 AND 2, CONFERENCE PROCEEDINGS, 2008, : 193 - 196
  • [3] Access Control for Shared Remote Laboratories
    Mateos, Veronica
    Bellidoa, Luis
    Villagra, Victor A.
    Richter, Thomas
    Gallardo, Alberto
    [J]. JOURNAL OF RESEARCH AND PRACTICE IN INFORMATION TECHNOLOGY, 2012, 44 (02): : 111 - 128
  • [4] CONTROL OF THE ACCESS TO A SHARED BUS - ARBITERS
    SECK, JP
    COURVOISIER, M
    GEFFROY, JC
    [J]. RAIRO-AUTOMATIQUE-SYSTEMS ANALYSIS AND CONTROL, 1983, 17 (04): : 359 - 403
  • [5] Hierarchical NoCs for Optimized Access to Shared Memory and IO Resources
    Lankes, Andreas
    Wild, Thomas
    Herkersdorf, Andreas
    [J]. PROCEEDINGS OF THE 2009 12TH EUROMICRO CONFERENCE ON DIGITAL SYSTEM DESIGN, ARCHITECTURES, METHODS AND TOOLS, 2009, : 255 - 262
  • [6] Access control in shared access networks supporting Internet DiffServ
    Angelopoulos, JD
    Leligou, N
    Orphanoudakis, T
    Pikrammenos, G
    Sifnaios, J
    Venieris, IS
    [J]. NEW TRENDS IN OPTICAL NETWORK DESIGN AND MODELING, 2001, 62 : 235 - 246
  • [7] On the performance of shared access control strategy for femtocells
    Magableh, Amer M.
    Radaydeh, Redha M.
    Alouini, Mohamed-Slim
    [J]. TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2013, 24 (02): : 244 - 256
  • [8] Hierarchical control as a shared neurocognitive mechanism for language and music
    Asano, Rie
    Boeckx, Cedric
    Seifert, Uwe
    [J]. COGNITION, 2021, 216
  • [9] A Hierarchical Access Control Technology for Cloud Storage
    Lan, Jiang
    Chunhua, Gu
    [J]. 2013 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCES AND APPLICATIONS (CSA), 2013, : 35 - 40
  • [10] Hierarchical encryption of multimedia contents for access control
    Fujiyoshi, Masaaki
    Saitou, Wataru
    Watanabe, Osamu
    Kiya, Hitoshi
    [J]. 2006 IEEE INTERNATIONAL CONFERENCE ON IMAGE PROCESSING, ICIP 2006, PROCEEDINGS, 2006, : 1977 - +