Dynamic permission access control model based on privacy protection

被引:0
作者
Qikun Zhang
Liang Zhu
Kunyuan Zhao
Yimeng Wu
Baohua Jin
Jianyong Li
Yinghui Meng
Sikang Hu
机构
[1] Zhengzhou University of Light Industry,School of Computer and Communication Engineering
[2] School of Architecture and Environmental Engineering Zhengzhou Technical College,School of Computer Science and Technology
[3] Beijing Institute of Technology,undefined
来源
Telecommunication Systems | 2022年 / 81卷
关键词
Privacy protection; Access control; Attribute-based encryption; Information security; Hidden attribute authentication;
D O I
暂无
中图分类号
学科分类号
摘要
Access control technology is one of the key technologies to ensure safe resource sharing. Identity authentication and authority distribution are two key technologies for access control technology to restrict unauthorized users from accessing resources, and only authorised legal users can access resources. However, user privacy protection and frequent permission changes are two thorny issues that need to be solved urgently by access control technology. In this paper, a dynamic access control model based on privacy protection is proposed to deal with these problems. Compared with existing access control technologies, the main advantages of this paper are as follows: (1) Encrypt and hide the attributes of entities, and use attribute-based identity authentication technology for identity authentication, which not only achieves the purpose of traditional identity authentication, but also ensures the attributes and privacy of entities are not leaked; (2) Binding resource access permissions with entity attributes, dynamically assigning and adjusting resource access control permissions through changes in entity attributes, making resource access control more fine-grained and more flexible. Security proof and performance analysis show that the proposed protocol is secure under the hardness assumption of the discrete logarithm problem and the decision bilinear Diffie–Hellman problem. Compared with the cited references, this model has the advantages of low computational complexity, short computational time, and low communication overhead.
引用
收藏
页码:191 / 205
页数:14
相关论文
共 142 条
[1]  
Ding S(2019)A novel attribute-based access control scheme using blockchain for IoT IEEE Access 7 38431-38441
[2]  
Cao J(2021)A group key agreement protocol for intelligent internet of things system International Journal of Intelligent Systems 37 1-24
[3]  
Li C(2018)Multi-authority attribute-based encryption access control scheme with policy hidden for cloud storage Soft Computing 22 243-251
[4]  
Fan K(2020)An efficient privacy-enhanced attribute-based access control mechanism Concurrency and Computation: Practice and Experience 32 1-14
[5]  
Li H(2021)Opponent portrait for multiagent reinforcement learning in competitive environment International Journal of Intelligent Systems 36 34051-34074
[6]  
Zhang Q(2018)Secure multi-authority data access control scheme in cloud storage system based on attribute-based signcryption IEEE Access 6 1-20
[7]  
Zhu L(2021)Group key agreement protocol among terminals of the intelligent information system for mobile edge computing International Journal of Intelligent Systems 2021 45-56
[8]  
Li Y(2020)Anonymous decentralized attribute-based access control for cloud-assisted IoT Future Generation Computer Systems 110 1330-1346
[9]  
Ma Z(2019)Cryptographic attribute-based access control (ABAC) for secure decision making of dynamic policy with multiauthority attribute tokens IEEE Transactions on Reliability 68 25-36
[10]  
Yuan J(2019)Efficient decentralized multi-authority attribute based encryption for mobile cloud data storage Journal of Network and Computer Applications 129 1053-1068