Skip to main content

A Provably Secure Re-encryption-Based Access Control in Hierarchy

  • Conference paper
  • First Online:
Recent Findings in Intelligent Computing Techniques

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 707))

  • 832 Accesses

Abstract

A hierarchical access control mechanism is required when some users of a system have more access privileges than others. A set of users in the system can be divided into subsets called classes which are hierarchically organized in a way that any class can access data meant for the classes lower in the hierarchy but not vice versa. In this paper, we propose a re-encryption-based access control scheme for a hierarchy of security classes in which storage overhead on the users belonging to every security class is constant with public storage requirements being linear in the number of classes in the hierarchy. Direct re-encryption key from a class lower down the hierarchy to the one higher up can be derived using intermediate re-encryption keys available between each pair of adjacent classes. The re-encryption key derivation procedure requires steps of the order of the depth of the class for which the data was initially encrypted. As a result of re-encryption key derivation, just one re-encryption is needed.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Ateniese, G., Fu, K., Green, M., Hohenberger, S.: Improved proxy re-encryption schemes with applications to secure distributed storage. ACM Trans. Inf. Syst. Secur. (TISSEC) 9(1), 1–30 (2006)

    Article  Google Scholar 

  2. Akl, S.G., Taylor, P.D.: Cryptographic solution to a problem of access control in a hierarchy. ACM Trans. Comput. Syst. (TOCS) 1(3), 239–248 (1983)

    Article  Google Scholar 

  3. Chang, C.C., Buehrer, D.J.: Access control in a hierarchy using a one-way trap door function. Comput. Math. Appl. 26(5), 71–6 (1993)

    Article  Google Scholar 

  4. Hui-Min, T., Chin-Chen, C.: A cryptographic implementation for dynamic access control in a user hierarchy. Comput. Secur. 14(2), 159–66 (1995)

    Article  Google Scholar 

  5. He, M., Fan, P., Kaderali, F., Yuan, D.: Access key distribution scheme for level-based hierarchy. In: Fourth International Conference on Parallel and Distributed Computing, Applications and Technologies, pp. 942–945. IEEE (2003)

    Google Scholar 

  6. Sun, Y., Liu, K.R.: Scalable hierarchical access control in secure group communications. In: Twenty-third Annual Joint Conference of the IEEE Computer and Communications Societies, pp. 1296–1306. IEEE (2004)

    Google Scholar 

  7. Lin, C.H.: Hierarchical key assignment without public-key cryptography. Comput. Secur. 20(7), 612–619 (2001)

    Article  Google Scholar 

  8. Atallah, M.J., Blanton, M., Fazio, N., Frikken, K.B.: Dynamic and efficient key management for access hierarchies. ACM Trans. Inf. Syst. Secur. (TISSEC). 12(3), 1–43 (2009)

    Article  Google Scholar 

  9. D’Arco, P., De, Santis, A., Ferrara, A.L., Masucci, B., : Variations on a theme by Akl and taylor: security and tradeoffs. Theor. Comput. Sci. 411(1), 213–27 (2010)

    Article  MathSciNet  Google Scholar 

  10. Freire, E.S., Paterson, K.G., Poettering, B.: Simple, efficient and strongly KI-secure hierarchical key assignment schemes. In: Cryptographers’ Track at the RSA Conference, pp. 101–114. Springer, Berlin, Heidelberg (2013)

    Chapter  Google Scholar 

  11. Tang, S., Li, X., Huang, X., Xiang, Y., Xu, L.: Achieving simple, secure and efficient hierarchical access control in cloud computing. IEEE Trans. Comput. 65(7), 2325–2331 (2016)

    Article  MathSciNet  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Gaurav Pareek .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Pareek, G., Purushothama, B.R. (2019). A Provably Secure Re-encryption-Based Access Control in Hierarchy. In: Sa, P., Bakshi, S., Hatzilygeroudis, I., Sahoo, M. (eds) Recent Findings in Intelligent Computing Techniques . Advances in Intelligent Systems and Computing, vol 707. Springer, Singapore. https://doi.org/10.1007/978-981-10-8639-7_10

Download citation

Publish with us

Policies and ethics