Abstract
A hierarchical access control mechanism is required when some users of a system have more access privileges than others. A set of users in the system can be divided into subsets called classes which are hierarchically organized in a way that any class can access data meant for the classes lower in the hierarchy but not vice versa. In this paper, we propose a re-encryption-based access control scheme for a hierarchy of security classes in which storage overhead on the users belonging to every security class is constant with public storage requirements being linear in the number of classes in the hierarchy. Direct re-encryption key from a class lower down the hierarchy to the one higher up can be derived using intermediate re-encryption keys available between each pair of adjacent classes. The re-encryption key derivation procedure requires steps of the order of the depth of the class for which the data was initially encrypted. As a result of re-encryption key derivation, just one re-encryption is needed.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Ateniese, G., Fu, K., Green, M., Hohenberger, S.: Improved proxy re-encryption schemes with applications to secure distributed storage. ACM Trans. Inf. Syst. Secur. (TISSEC) 9(1), 1–30 (2006)
Akl, S.G., Taylor, P.D.: Cryptographic solution to a problem of access control in a hierarchy. ACM Trans. Comput. Syst. (TOCS) 1(3), 239–248 (1983)
Chang, C.C., Buehrer, D.J.: Access control in a hierarchy using a one-way trap door function. Comput. Math. Appl. 26(5), 71–6 (1993)
Hui-Min, T., Chin-Chen, C.: A cryptographic implementation for dynamic access control in a user hierarchy. Comput. Secur. 14(2), 159–66 (1995)
He, M., Fan, P., Kaderali, F., Yuan, D.: Access key distribution scheme for level-based hierarchy. In: Fourth International Conference on Parallel and Distributed Computing, Applications and Technologies, pp. 942–945. IEEE (2003)
Sun, Y., Liu, K.R.: Scalable hierarchical access control in secure group communications. In: Twenty-third Annual Joint Conference of the IEEE Computer and Communications Societies, pp. 1296–1306. IEEE (2004)
Lin, C.H.: Hierarchical key assignment without public-key cryptography. Comput. Secur. 20(7), 612–619 (2001)
Atallah, M.J., Blanton, M., Fazio, N., Frikken, K.B.: Dynamic and efficient key management for access hierarchies. ACM Trans. Inf. Syst. Secur. (TISSEC). 12(3), 1–43 (2009)
D’Arco, P., De, Santis, A., Ferrara, A.L., Masucci, B., : Variations on a theme by Akl and taylor: security and tradeoffs. Theor. Comput. Sci. 411(1), 213–27 (2010)
Freire, E.S., Paterson, K.G., Poettering, B.: Simple, efficient and strongly KI-secure hierarchical key assignment schemes. In: Cryptographers’ Track at the RSA Conference, pp. 101–114. Springer, Berlin, Heidelberg (2013)
Tang, S., Li, X., Huang, X., Xiang, Y., Xu, L.: Achieving simple, secure and efficient hierarchical access control in cloud computing. IEEE Trans. Comput. 65(7), 2325–2331 (2016)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Pareek, G., Purushothama, B.R. (2019). A Provably Secure Re-encryption-Based Access Control in Hierarchy. In: Sa, P., Bakshi, S., Hatzilygeroudis, I., Sahoo, M. (eds) Recent Findings in Intelligent Computing Techniques . Advances in Intelligent Systems and Computing, vol 707. Springer, Singapore. https://doi.org/10.1007/978-981-10-8639-7_10
Download citation
DOI: https://doi.org/10.1007/978-981-10-8639-7_10
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-8638-0
Online ISBN: 978-981-10-8639-7
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)