Secure Key Management Scheme for Dynamic Hierarchical Access Control Based on ECC
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2017, Vol 5, Issue 5
Abstract
Access control is an indispensable security component of cloud computing, and hierarchical access control is of particular interest since in practice one is entitled to different access privileges. This paper presents a hierarchical key assignment scheme based on linear geometry as the solution of flexible and fine grained hierarchical access control in cloud computing. In our scheme, the encryption key of each class in the hierarchy is associated with a private vector and a public vector, and the inner product of the private vector of an class and the public vector of its descendant class can be used to derive the encryption key that descendant class. The proposed scheme belongs to direct access schemes on hierarchical access control, namely each class at a higher level in the hierarchy can directly derive the encryption key of its descendant class without the need of iterative computation. In addition to this basic hierarchical key derivation, we also give a dynamic key management mechanism to efficiently address potential changes in the hierarchy. Our scheme only needs light computations over finite field and provides strong key to distinguishability under the assumption of pseudorandom functions. Furthermore, the simulation shows that our scheme has an optimized trade-off between computations consumption storage space.
Authors and Affiliations
Abinaya M, T Sivakumar
Detection of Foreground Object for Video Surveillance Applications
This paper describes the simplest and efficient method to find the foreground objects in less computation time. Initially the video is converted into frames. Those frames are compressed by eliminating the redundant fram...
Fabrication And Analsys Of Metal Cutting Chop Saw
A chop saw is a power tool used to make accurate cuts in wood, plastic, and metals. It has a fixed blade, attached to a moving arm that spins over a small worktable. Chop saws are used to create a rough, initial abrasiv...
slugStatus of composting in India with emphasis on Delhi
The present waste handling techniques in the States of India were examined. Results indicated that around 7% of waste is being composted in India at present. The cities having composting facilities have grown from 22 in...
slugIs your website protected: a quick study to know “unknown doors to your websites?”
Website and its related technology started to play a vital role in our life. Infect it has become most important representative of business and provide significant improvements in business operations, banking system, ed...
A Fuzzy Logic-Based Decentralized Clustering Algorithm for WSN to Extend the Network Lifetime
Low Energy Adaptive Clustering Hierarchy (LEACH) is the most famous hierarchical routing protocol, where the Cluster Head (CH) is elected in revolution basis based on a probabilistic threshold value and only CH are allo...