Hierarchical and Shared Access Control

被引:56
|
作者
Castiglione, Arcangelo [1 ]
De Santis, Alfredo [1 ]
Masucci, Barbara [1 ]
Palmieri, Francesco [1 ]
Castiglione, Aniello [1 ]
Li, Jin [2 ]
Huang, Xinyi [3 ]
机构
[1] Univ Salerno, Dept Comp Sci, I-84084 Salerno, Italy
[2] Guangzhou Univ, Sch Comp Sci, Guangzhou 510006, Guangdong, Peoples R China
[3] Fujian Normal Univ, Sch Math & Comp Sci, Fujian Prov Key Lab Network Secur & Cryptol, Fuzhou 350117, Peoples R China
基金
中国国家自然科学基金;
关键词
Generalized access control; generalized access model; key assignment; provable security; shared key reconstruction; multiple access structures; KEY MANAGEMENT; SECURITY; CONSTRUCTIONS; SCHEME;
D O I
10.1109/TIFS.2015.2512533
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Access control ensures that only the authorized users of a system are allowed to access certain resources or tasks. Usually, according to their roles and responsibilities, users are organized in hierarchies formed by a certain number of disjoint classes. Such hierarchies are implemented by assigning a key to each class, so that the keys for descendant classes can be efficiently derived from classes higher in the hierarchy. However, pure hierarchical access may represent a limitation in many real-world cases. In fact, sometimes it is necessary to ensure access to a resource or task by considering both its directly responsible user and a group of users possessing certain credentials. In this paper, we first propose a novel model that generalizes the conventional hierarchical access control paradigm, by extending it to certain additional sets of qualified users. Afterward, we propose two constructions for hierarchical key assignment schemes in this new model, which are provably secure with respect to key indistinguishability. In particular, the former construction relies on both symmetric encryption and perfect secret sharing, whereas, the latter is based on public-key threshold broadcast encryption.
引用
收藏
页码:850 / 865
页数:16
相关论文
共 50 条
  • [41] Enforcing Scalable and Dynamic Hierarchical Access Control in Cloud Computing
    Yang, Ran
    Lin, Chuang
    Jiang, Yixin
    [J]. 2012 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2012,
  • [42] Hierarchical Slotted Wireless Random Channel Access with Power Control
    Karouit, Abdelillah
    Orozco Barbosa, Luis
    Ramirez-Mireles, Fernando
    Haqiq, Abdelkrim
    [J]. MATHEMATICAL PROBLEMS IN ENGINEERING, 2015, 2015
  • [43] IHIBE: A Hierarchical and Delegated Access Control Mechanism for IoT Environments
    Purnama, Hari
    Mambo, Masahiro
    [J]. SENSORS, 2024, 24 (03)
  • [44] Cryptographically-enforced hierarchical access control with multiple keys
    Crampton, Jason
    [J]. JOURNAL OF LOGIC AND ALGEBRAIC PROGRAMMING, 2009, 78 (08): : 690 - 700
  • [45] Attacks on a secure group communication scheme with hierarchical access control
    Geiselmann, W
    Steinwandt, R
    [J]. 2004 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY, PROCEEDINGS, 2004, : 14 - 14
  • [46] A novel hierarchical access control scheme in digital broadcasting system
    Koo, Han-Seung
    Song, Yun-Jeong
    Kwon, O-Hyung
    Ra, Sung-Woong
    [J]. ICCE: 2007 DIGEST OF TECHNICAL PAPERS INTERNATIONAL CONFERENCE ON CONSUMER ELECTRONICS, 2007, : 297 - +
  • [47] A key management scheme for hierarchical access control in group communication
    Zhang, Qiong
    Wang, Yuke
    Jue, Jason P.
    [J]. International Journal of Network Security, 2008, 7 (03) : 323 - 334
  • [48] Analysis and design of distributed hierarchical access control for multimedia networks
    Li, RD
    Li, J
    Chen, HH
    [J]. GLOBECOM '05: IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, VOLS 1-6: DISCOVERY PAST AND FUTURE, 2005, : 1852 - 1856
  • [49] Attribute-Based Hierarchical Access Control With Extendable Policy
    Xiao, Meiyan
    Li, Hongbo
    Huang, Qiong
    Yu, Shui
    Susilo, Willy
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2022, 17 : 1868 - 1883
  • [50] A novel decentralized hierarchical access control scheme for the medical scenario
    Eskeland, Sigurd
    Prasad, Neeli R.
    [J]. 2006 THIRD ANNUAL INTERNATIONAL CONFERENCE ON MOBILE AND UBIQUITOUS SYSTEMS: NETWORKING & SERVICES, 2006, : 408 - +