Secure Key Management Scheme for Dynamic Hierarchical Access Control Based on ECC
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2017, Vol 5, Issue 5
Abstract
Access control is an indispensable security component of cloud computing, and hierarchical access control is of particular interest since in practice one is entitled to different access privileges. This paper presents a hierarchical key assignment scheme based on linear geometry as the solution of flexible and fine grained hierarchical access control in cloud computing. In our scheme, the encryption key of each class in the hierarchy is associated with a private vector and a public vector, and the inner product of the private vector of an class and the public vector of its descendant class can be used to derive the encryption key that descendant class. The proposed scheme belongs to direct access schemes on hierarchical access control, namely each class at a higher level in the hierarchy can directly derive the encryption key of its descendant class without the need of iterative computation. In addition to this basic hierarchical key derivation, we also give a dynamic key management mechanism to efficiently address potential changes in the hierarchy. Our scheme only needs light computations over finite field and provides strong key to distinguishability under the assumption of pseudorandom functions. Furthermore, the simulation shows that our scheme has an optimized trade-off between computations consumption storage space.
Authors and Affiliations
Abinaya M, T Sivakumar
A Novel Visibility Algorithm for Captured Distorted Road Scenes
The visibility of images of outdoor road scenes will commonly become degraded when captured during inclement storm conditions. Localized light sources often result from activating of street lights and vehicle headlights...
Research Study on Behavior of Composite Stub Column Experimentally and Analytically
The structural behaviour of concrete - filled steel tube (CFST) columns has been investigated using, ANSYS Software, experimental and analytical studies (Rankine’s). The effect of concrete compressive strength, thicknes...
slugComparison between the best online suites
The battle to be the best online suite in the cloud has never been more hotly contested. It’s not as straightforward as it seems either. This paper gives the introduction to Office Software Suite, core feature, cloud i...
Implementation of Left Recursion using C Language
Compiler phases are divided into analysis and synthesis. Analysis phase comprises of lexical, syntax and semantic analysis. In this paper I have focused on removal of left recursion which is a pre requisite for most of...
An Efficient Design of Low Pass Fir Filter Using Kaiser, Parzen and Bartlett Hanning Window Technique
In everyday enhancing field of signal processing has digital filter to play a vital role. Digital filters are widely used in the field of communication and computation purpose. On the other hand a digital finite impulse...