Achieving simple, secure and efficient hierarchical access control in cloud computing


Autoria(s): Tang, Shaohua; Li, Xiaoyu; Huang, Xinyi; Xiang, Yang; Xu, Lingling
Data(s)

01/07/2016

Resumo

Access control is an indispensable security component of cloud computing, and hierarchical access control is of particular interest since in practice one is entitled to different access privileges. This paper presents a hierarchical key assignment scheme based on linear-geometry as the solution of flexible and fine-grained hierarchical access control in cloud computing. In our scheme, the encryption key of each class in the hierarchy is associated with a private vector and a public vector, and the inner product of the private vector of an ancestor class and the public vector of its descendant class can be used to derive the encryption key of that descendant class. The proposed scheme belongs to direct access schemes on hierarchical access control, namely each class at a higher level in the hierarchy can directly derive the encryption key of its descendant class without the need of iterative computation. In addition to this basic hierarchical key derivation, we also give a dynamic key management mechanism to efficiently address potential changes in the hierarchy. Our scheme only needs light computations over finite field and provides strong key indistinguishability under the assumption of pseudorandom functions. Furthermore, the simulation shows that our scheme has an optimized trade-off between computation consumption and storage space.

Identificador

http://hdl.handle.net/10536/DRO/DU:30088966

Idioma(s)

eng

Publicador

IEEE

Relação

http://dro.deakin.edu.au/eserv/DU:30088966/xiang-achievingsimple-2016.pdf

http://www.dx.doi.org/10.1109/TC.2015.2479609

Direitos

2015, IEEE

Palavras-Chave #access control #hierarchical key assignment #linear geometry #pseudorandom function #strong key indistinguishability #Science & Technology #Technology #Computer Science, Hardware & Architecture #Engineering, Electrical & Electronic #Computer Science #Engineering #KEY-MANAGEMENT SCHEME #ELLIPTIC CURVE CRYPTOSYSTEM #USER HIERARCHY #ASSIGNMENT SCHEME
Tipo

Journal Article