LHSC: An effective dynamic key management scheme for linear hierarchical access control

Several key management schemes for access control in a user hierarchy have been proposed in the recent years. However, most of them have dealt with key management issues for tree structured hierarchies, which result overheads when they are applied to the linear hierarchies. Linear hierarchy comprises a particularly interesting type of hierarchies, and it appears in a wide range of applications such as secure communications within security corporations and multi-layered data streaming. In this paper, we propose an effective key management scheme for linear hierarchies. Compared to the recently proposed Hassen et al.'s scheme, our scheme reduces the storage overhead of each class significantly. Further, use of symmetric-key cryptosystem (Advanced Encryption Standard algorithm) makes the key sizes for security classes to reduce in our scheme. In addition, our scheme is secure against possible attacks required for a linear hierarchy access control scheme. Security along with low storage and computational overheads make our scheme to be much suitable for practical applications for linear hierarchies.

[1]  William Stallings,et al.  Cryptography and network security - principles and practice (3. ed.) , 2014 .

[2]  Cheng-Chi Lee,et al.  A Novel Key Management Scheme for Dynamic Access Control in a Hierarchy , 2011, Int. J. Netw. Secur..

[3]  Zhen Wang,et al.  Group key management based on information flow policy for multi-privileged groups , 2010, 2010 IEEE International Conference on Information Theory and Information Security.

[4]  Byrav Ramamurthy,et al.  Chinese Remainder Theorem Based Hierarchical Access Control for Secure Group Communication , 2001, ICICS.

[5]  Victor R. L. Shen,et al.  A Novel Key Management Scheme Based on Discrete Logarithms and Polynomial Interpolations , 2002, Comput. Secur..

[6]  Vanga Odelu,et al.  An Effective and Secure Key-Management Scheme for Hierarchical Access Control in E-Medicine System , 2012, Journal of Medical Systems.

[7]  Morteza Nikooghadam,et al.  Secure Communication of Medical Information Using Mobile Agents , 2012, Journal of Medical Systems.

[8]  Thomas Hardjono,et al.  Sibling Intractable Function Families and Their Applications (Extended Abstract) , 1991, ASIACRYPT.

[9]  Guangliang Liu,et al.  A hierarchical key management scheme in role-based access control , 2010, 2010 International Conference On Computer Design and Applications.

[10]  Jennifer Seberry,et al.  New Solutions to the Problem of Access Control in a Hierarchy , 1993 .

[11]  Kefei Chen,et al.  An Efficient Key-Management Scheme for Hierarchical Access Control in E-Medicine System , 2012, Journal of Medical Systems.

[12]  Yacine Challal,et al.  Key management for content access control in a hierarchy , 2007, Comput. Networks.

[13]  Mohamed G. Gouda,et al.  Secure group communications using key graphs , 1998, SIGCOMM '98.

[14]  Tang Ming . Wei Lian. Si Tuo Lin Si,et al.  Cryptography and Network Security - Principles and Practice , 2015 .

[15]  R. S. Sandhu,et al.  On some cryptographic solutions for access control in a tree hierarchy , 1987, FJCC.

[16]  Ashok Kumar Das,et al.  Cryptanalysis and improvement of an access control in user hierarchy based on elliptic curve cryptosystem , 2012, Inf. Sci..

[17]  Indrajit Ray,et al.  A cryptographic solution to implement access control in a hierarchy and more , 2002, SACMAT '02.

[18]  Ehud Gudes The Design of a Cryptography Based Secure File System , 1980, IEEE Transactions on Software Engineering.

[19]  Celia Li,et al.  Access control in a hierarchy using one-way hash functions , 2004, Comput. Secur..

[20]  Marina Blanton,et al.  Dynamic and Efficient Key Management for Access Hierarchies , 2009, TSEC.

[21]  Yu-Fang Chung,et al.  Access control in user hierarchy based on elliptic curve cryptosystem , 2008, Inf. Sci..

[22]  Morteza Nikooghadam,et al.  Efficient utilization of elliptic curve cryptosystem for hierarchical access control , 2010, J. Syst. Softw..

[23]  Yacine Challal,et al.  An efficient key management scheme for content access control for linear hierarchies , 2012, Comput. Networks.

[24]  Ravi S. Sandhu,et al.  Cryptographic Implementation of a Tree Hierarchy for Access Control , 1988, Inf. Process. Lett..

[25]  尚弘 島影 National Institute of Standards and Technologyにおける超伝導研究及び生活 , 2001 .

[26]  Chee-Onn Chow,et al.  A Novel Secure Key Management Module for Hierarchical Clustering Wireless Sensor Networks , 2011, 2011 Third International Conference on Computational Intelligence, Modelling & Simulation.

[27]  Vanga Odelu,et al.  A Novel Key Management Mechanism for Dynamic Hierarchical Access Control Based on Linear Polynomials , 2012, SNDS.

[28]  Selim G. Akl,et al.  Cryptographic solution to a problem of access control in a hierarchy , 1983, TOCS.

[29]  Zhong-hua He,et al.  Dynamic key management in a user hierarchy , 2008, 2008 2nd International Conference on Anti-counterfeiting, Security and Identification.

[30]  Jianmin Zhang,et al.  An Efficient Key Management Scheme for Access Control in a User Hierarchy , 2009, 2009 International Conference on Information Technology and Computer Science.