灵活的密码访问控制,通过代理在组之间重新加密

Gaurav Pareek, B. Purushothama
{"title":"灵活的密码访问控制,通过代理在组之间重新加密","authors":"Gaurav Pareek, B. Purushothama","doi":"10.1145/3288599.3299722","DOIUrl":null,"url":null,"abstract":"A cryptographic access control scheme enforces access control policy of the data owner on his encrypted data. Most widely used cryptographic access control mechanism is hierarchical access control. Set of users for which access of data is to be managed/controlled, is divided into disjoint partitions called \"security classes\" or simply \"classes\". A hierarchical key assignment scheme (HKAS) assigns encryption keys of the data items in such a way that a class can only access data intended for class(es) lower down in the hierarchy [1]. So, we say each class has \"designated access\" to data intended for class(es) lower in the hierarchy. Suppose a class Ci, not having designated access to another class Cj, wishes to temporarily have access to data intended for Cj for a finite duration of time and Cj agrees for the same. However, consider that Cj does not wish to share its designated access with Ci. That is, Cj wishes to allow Ci to access data intended directly for Cj but not the one intended for any of the classes to which Cj has designated access and Ci does not. This flexibility requirement has various practical applications. In health-care services for instance, it may be desired that patient's data accessible directly to a doctor is securely delegated to another doctor in another service center for a finite period of time for expert consultation. However, it may be desired that the two doctors do not share information of any other patient.","PeriodicalId":346177,"journal":{"name":"Proceedings of the 20th International Conference on Distributed Computing and Networking","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2019-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Flexible cryptographic access control through proxy re-encryption between groups\",\"authors\":\"Gaurav Pareek, B. Purushothama\",\"doi\":\"10.1145/3288599.3299722\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"A cryptographic access control scheme enforces access control policy of the data owner on his encrypted data. Most widely used cryptographic access control mechanism is hierarchical access control. Set of users for which access of data is to be managed/controlled, is divided into disjoint partitions called \\\"security classes\\\" or simply \\\"classes\\\". A hierarchical key assignment scheme (HKAS) assigns encryption keys of the data items in such a way that a class can only access data intended for class(es) lower down in the hierarchy [1]. So, we say each class has \\\"designated access\\\" to data intended for class(es) lower in the hierarchy. Suppose a class Ci, not having designated access to another class Cj, wishes to temporarily have access to data intended for Cj for a finite duration of time and Cj agrees for the same. However, consider that Cj does not wish to share its designated access with Ci. That is, Cj wishes to allow Ci to access data intended directly for Cj but not the one intended for any of the classes to which Cj has designated access and Ci does not. This flexibility requirement has various practical applications. In health-care services for instance, it may be desired that patient's data accessible directly to a doctor is securely delegated to another doctor in another service center for a finite period of time for expert consultation. However, it may be desired that the two doctors do not share information of any other patient.\",\"PeriodicalId\":346177,\"journal\":{\"name\":\"Proceedings of the 20th International Conference on Distributed Computing and Networking\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2019-01-04\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceedings of the 20th International Conference on Distributed Computing and Networking\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1145/3288599.3299722\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 20th International Conference on Distributed Computing and Networking","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3288599.3299722","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2

摘要

加密访问控制方案是数据所有者对其加密数据的访问控制策略。应用最广泛的密码访问控制机制是分层访问控制。需要管理/控制其数据访问的一组用户被划分为不相连的分区,称为“安全类”或简称为“类”。分级密钥分配方案(HKAS)以一种方式分配数据项的加密密钥,使一个类别只能访问层级[1]中较低类别的数据。因此,我们说每个类对层次结构中较低的类的数据具有“指定访问”。假设一个类Ci没有对另一个类Cj的指定访问权,它希望在有限的时间内临时访问为Cj准备的数据,Cj也同意这样做。但是,考虑到Cj不希望与Ci共享其指定的访问。也就是说,Cj希望允许Ci访问直接为Cj准备的数据,而不是为Cj指定访问权限而Ci没有指定访问权限的任何类准备的数据。这种灵活性要求有各种实际应用。例如,在保健服务中,可能希望医生可以直接访问的患者数据在有限的时间内安全地委托给另一个服务中心的另一名医生进行专家咨询。然而,可能希望两位医生不共享任何其他患者的信息。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Flexible cryptographic access control through proxy re-encryption between groups
A cryptographic access control scheme enforces access control policy of the data owner on his encrypted data. Most widely used cryptographic access control mechanism is hierarchical access control. Set of users for which access of data is to be managed/controlled, is divided into disjoint partitions called "security classes" or simply "classes". A hierarchical key assignment scheme (HKAS) assigns encryption keys of the data items in such a way that a class can only access data intended for class(es) lower down in the hierarchy [1]. So, we say each class has "designated access" to data intended for class(es) lower in the hierarchy. Suppose a class Ci, not having designated access to another class Cj, wishes to temporarily have access to data intended for Cj for a finite duration of time and Cj agrees for the same. However, consider that Cj does not wish to share its designated access with Ci. That is, Cj wishes to allow Ci to access data intended directly for Cj but not the one intended for any of the classes to which Cj has designated access and Ci does not. This flexibility requirement has various practical applications. In health-care services for instance, it may be desired that patient's data accessible directly to a doctor is securely delegated to another doctor in another service center for a finite period of time for expert consultation. However, it may be desired that the two doctors do not share information of any other patient.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信