Exploiting hierarchical identity-based encryption for access control to pervasive computing information

被引:15
作者
Hengartner, U [1 ]
Steenkiste, P [1 ]
机构
[1] Carnegie Mellon Univ, Dept Comp Sci, Pittsburgh, PA 15213 USA
来源
FIRST INTERNATIONAL CONFERENCE ON SECURITY AND PRIVACY FOR EMERGING AREAS IN COMMUNICATIONS NETWORKS, PROCEEDINGS | 2005年
关键词
D O I
10.1109/SECURECOMM.2005.18
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Access control to confidential information in pervasive computing environments is challenging for multiple reasons: First, a client requesting access might not know which access rights are necessary in order to be granted access to the requested information. Second, access control must support flexible access rights that include context-sensitive constraints. Third, pervasive computing environments consist of a multitude of information services, which makes simple management of access rights essential. We discuss the shortcomings of existing access-control schemes that rely on either clients presenting a proof of access to a service or services encrypting information before handing the information over to a client. We propose a proof-based access-control architecture that employs hierarchical identity-based encryption in order to enable services to inform clients of the required proof of access in a covert way, without leaking information. Furthermore, we introduce an encryption-based access-control architecture that exploits hierarchical identity-based encryption in order to deal with multiple, hierarchical constraints on access rights. We present an example implementation of our proposed architectures and discuss the performance of this implementation.
引用
收藏
页码:384 / 393
页数:10
相关论文
共 16 条
[1]   CRYPTOGRAPHIC SOLUTION TO A PROBLEM OF ACCESS-CONTROL IN A HIERARCHY [J].
AKL, SG ;
TAYLOR, PD .
ACM TRANSACTIONS ON COMPUTER SYSTEMS, 1983, 1 (03) :239-248
[2]   Controversial medical and agri-food biotechnology: a cultivation analysis [J].
Bauer, MW .
PUBLIC UNDERSTANDING OF SCIENCE, 2002, 11 (02) :93-111
[3]   Identity-based encryption from the Weil pairing [J].
Boneh, D ;
Franklin, M .
SIAM JOURNAL ON COMPUTING, 2003, 32 (03) :586-615
[4]  
Bradshaw R.W., 2004, P 11 ACM C COMP COMM, P146, DOI DOI 10.1145/1030083.1030104
[5]  
Ellison C., 1999, RFC2693
[6]  
GARLAN D., 2002, IEEE PERVAS COMPUT, V1, P2
[7]   Hierarchical ID-based cryptography [J].
Gentry, C ;
Silverberg, A .
ADVANCES IN CRYPTOLOGY - ASIACRYPT 2002, PROCEEDINGS, 2002, 2501 :548-566
[8]  
GROUP SAC, IBE SECURE EMAIL
[9]  
Harn L., 1990, Computers & Security, V9, P539, DOI 10.1016/0167-4048(90)90132-D
[10]  
HENGARTNER U, 2004, CMUCS04174