Skip to main content

A Cryptographic and Time-Constraint Access Control Scheme for Mobile Terminals

  • Conference paper
Network Computing and Information Security (NCIS 2012)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 345))

Included in the following conference series:

  • 1374 Accesses

Abstract

As more and more services and applications are used in the mobile phones, the sensitive data becomes more easily be leaked out. The simplest way is to encrypt the sensitive data, and only the user who has the key can decrypt the data, but, on doing this, the user can exposing the data repeatedly. Hence, we should not only restrict the people who can decrypt the sensitive data, but also restrict the time when the data can be exposed. The mobile phones are devices which have limited resources, their computing ability is limited, the operation on the phones should be simple as far as possible. In this paper, we put forward a cryptographic and time-constraint access control scheme for mobile terminals. We encrypt data with a method which similar to the digital envelopes technology, and it reduces the overload of calculation; use the hierarchical key assignment to reduce the process of key distribution; finally, according to the survival time of the data, the data will be deleted automatically, even the people who has the key, can’t access the data after the survival time.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Geambasu, Kohno, T., Levy, A., Levy, H.M.: Vanish: Increasing data privacy with self-destructing data. In: Proc. of the 18th USENIX Security Symposium (2009)

    Google Scholar 

  2. Kannan, J., Altekar, G., Maniatis, P., Chun, B.-G.: Making Programs Forget Enforcing Lifetime For Sensitive Data. In: Proceeding HotOS’13 Proceedings of the 13th USENIX Conference on Hot Topics in Operating Systems, pp. 23–23. USENIX Association, Berkeley (2011)

    Google Scholar 

  3. Popper, C., Basin, D., Capkun, S., Cremers, C.: Keeping data secret under full compromise using porter devices. In: Computer Security Applications Conference, pp. 241–250 (2010)

    Google Scholar 

  4. Yue, F., Wang, G., Liu, Q.: A Secure Self-Destructing Scheme for Electronic Data. euc. In: 2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing, pp. 651–658 (2010)

    Google Scholar 

  5. Marforio, C.: Timed Data Deletion on Mobile Communication Devices (2010)

    Google Scholar 

  6. Wolchok, S., Hofmann, O.S., Heninger, N., Felten, E.W., Alex Halderman, J., Rossbach, C.J., Waters, B., Witchel, E.: Defeating Vanish with low-cost Sybil attacks against large DHTs. In: Proceedings of the 17th Network and Distributed System Security Symposium (NDSS). ISOC (2010)

    Google Scholar 

  7. Borders, K., Weele, E.V., Lau, B., Prakash, A.: Protecting Confidential Data on Personal Computers with Storage Capsules. In: Proc. Usenix Security (2009)

    Google Scholar 

  8. Chien, H.-Y.: Efficient Time-Bound Hierarchical Key Assignment Scheme. IEEE Trans. Knowledge and Data Eng. 16(10), 1302–1304 (2004)

    MathSciNet  Google Scholar 

  9. Yang, R., Lin, C., Feng, F.: A Time and Mutable Attribute-Based Access Control Model. Journal of Computers 4(6), 510–518 (2009)

    Article  Google Scholar 

  10. Nauman, M., Khan, S., Zhang, X.: Apex: Extending android permission model and enforcement with user-defined runtime constraints. In: ACM Symposium on Information, Computer and Communications Security, ASIACCS (2010)

    Google Scholar 

  11. Turkmen, F., Jung, E., Crispo, B.: Towards run-time verification in access control. In: IEEE International Symposium on Policies for Distributed Systems and Networks. IEEE (2011)

    Google Scholar 

  12. Google, http://www.google.com.hk/

  13. Android, http://www.android.com/

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Dai, J., Zhang, C., Li, Z. (2012). A Cryptographic and Time-Constraint Access Control Scheme for Mobile Terminals. In: Lei, J., Wang, F.L., Li, M., Luo, Y. (eds) Network Computing and Information Security. NCIS 2012. Communications in Computer and Information Science, vol 345. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-35211-9_46

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-35211-9_46

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-35210-2

  • Online ISBN: 978-3-642-35211-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics