Loading...
Missing a trusted reference monitor: How to enforce confidential and dynamic access policies?
Karimi, L ; Sharif University of Technology
575
Viewed
- Type of Document: Article
- DOI: 10.1007/978-3-319-10903-9_8
- Abstract:
- Popularity of data outsourcing and its consequent access control issues such as dynamism and efficiency is the main motivation of this paper. Existing solutions suffer from the potential unlimited number of user keys, inefficient update of policies, and disclosure of data owner’s access control policies. Using Chinese remainder theorem and proxy re-encryption together, in this paper, we propose an efficient access control enforcement mechanism based on selective encryption that addresses all the shortages. The overall architecture, required algorithms, and access control policy update are discussed. The mechanism is evaluated through simulation and, the given results are satisfactory
- Keywords:
- Access policies ; Chinese remainder theorem ; Proxy re encryptions ; Reference monitors ; Selective encryption ; Access control
- Source: Communications in Computer and Information Science ; Vol. 428, issue , Oct , 2014 , p. 92-104 ; ISSN: 18650929 ; ISBN: 978-3319109022
- URL: http://link.springer.com/chapter/10.1007/978-3-319-10903-9_8