Abstract
As more and more services and applications are used in the mobile phones, the sensitive data becomes more easily be leaked out. The simplest way is to encrypt the sensitive data, and only the user who has the key can decrypt the data, but, on doing this, the user can exposing the data repeatedly. Hence, we should not only restrict the people who can decrypt the sensitive data, but also restrict the time when the data can be exposed. The mobile phones are devices which have limited resources, their computing ability is limited, the operation on the phones should be simple as far as possible. In this paper, we put forward a cryptographic and time-constraint access control scheme for mobile terminals. We encrypt data with a method which similar to the digital envelopes technology, and it reduces the overload of calculation; use the hierarchical key assignment to reduce the process of key distribution; finally, according to the survival time of the data, the data will be deleted automatically, even the people who has the key, can’t access the data after the survival time.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Geambasu, Kohno, T., Levy, A., Levy, H.M.: Vanish: Increasing data privacy with self-destructing data. In: Proc. of the 18th USENIX Security Symposium (2009)
Kannan, J., Altekar, G., Maniatis, P., Chun, B.-G.: Making Programs Forget Enforcing Lifetime For Sensitive Data. In: Proceeding HotOS’13 Proceedings of the 13th USENIX Conference on Hot Topics in Operating Systems, pp. 23–23. USENIX Association, Berkeley (2011)
Popper, C., Basin, D., Capkun, S., Cremers, C.: Keeping data secret under full compromise using porter devices. In: Computer Security Applications Conference, pp. 241–250 (2010)
Yue, F., Wang, G., Liu, Q.: A Secure Self-Destructing Scheme for Electronic Data. euc. In: 2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing, pp. 651–658 (2010)
Marforio, C.: Timed Data Deletion on Mobile Communication Devices (2010)
Wolchok, S., Hofmann, O.S., Heninger, N., Felten, E.W., Alex Halderman, J., Rossbach, C.J., Waters, B., Witchel, E.: Defeating Vanish with low-cost Sybil attacks against large DHTs. In: Proceedings of the 17th Network and Distributed System Security Symposium (NDSS). ISOC (2010)
Borders, K., Weele, E.V., Lau, B., Prakash, A.: Protecting Confidential Data on Personal Computers with Storage Capsules. In: Proc. Usenix Security (2009)
Chien, H.-Y.: Efficient Time-Bound Hierarchical Key Assignment Scheme. IEEE Trans. Knowledge and Data Eng. 16(10), 1302–1304 (2004)
Yang, R., Lin, C., Feng, F.: A Time and Mutable Attribute-Based Access Control Model. Journal of Computers 4(6), 510–518 (2009)
Nauman, M., Khan, S., Zhang, X.: Apex: Extending android permission model and enforcement with user-defined runtime constraints. In: ACM Symposium on Information, Computer and Communications Security, ASIACCS (2010)
Turkmen, F., Jung, E., Crispo, B.: Towards run-time verification in access control. In: IEEE International Symposium on Policies for Distributed Systems and Networks. IEEE (2011)
Google, http://www.google.com.hk/
Android, http://www.android.com/
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Dai, J., Zhang, C., Li, Z. (2012). A Cryptographic and Time-Constraint Access Control Scheme for Mobile Terminals. In: Lei, J., Wang, F.L., Li, M., Luo, Y. (eds) Network Computing and Information Security. NCIS 2012. Communications in Computer and Information Science, vol 345. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-35211-9_46
Download citation
DOI: https://doi.org/10.1007/978-3-642-35211-9_46
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-35210-2
Online ISBN: 978-3-642-35211-9
eBook Packages: Computer ScienceComputer Science (R0)