On Supporting Secure Information Distribution in Heterogeneous Systems Using Standard Technologies

被引:0
作者
Aziz S. Mousas
Angelos-Christos G. Anadiotis
Georgios V. Lioudakis
John P. Papanis
Panagiotis K. Gkonis
Dimitra I. Kaklamani
Iakovos S. Venieris
机构
[1] National Technical University of Athens,School of Electrical and Computer Engineering
来源
Wireless Personal Communications | 2014年 / 76卷
关键词
MPEG-21; Access control; Rights Expression Language; MPEG middleware; Attribute-Based Encryption;
D O I
暂无
中图分类号
学科分类号
摘要
This paper presents an integrated security architecture for heterogeneous distributed systems. Based on the MPEG-21 standard data structures and the MPEG-M standard services, the proposed architecture provides a unified, fine-grained solution for protecting each information unit circulated in the system. In this context, a novel scheme for translating the access control rules, initially expressed by means of the standard MPEG-21 Rights Expression Language, into Ciphertext-Policy Attribute-Based Encryption access trees is introduced, thereby enabling offline authorization based on the users’ attributes, also encapsulated and certified using MPEG-21 licenses. The proposed framework provides a detailed approach in all the steps of the information protection process, from attribute acquisition to data encryption and decryption.
引用
收藏
页码:99 / 119
页数:20
相关论文
共 59 条
[1]  
Akyildiz I(2002)A survey on sensor networks IEEE Communications Magazine 40 102-114
[2]  
Su W(2010)The internet of things: A survey Computer Networks 54 2787-2805
[3]  
Sankarasubramaniam Y(2009)Persona: An online social network with user-defined privacy SIGCOMM Computer Communication Review 39 135-146
[4]  
Cayirci E(2008)Modeling contextual security policies International Journal of Information Security 7 285-305
[5]  
Atzori L(2003)The many faces of publish/subscribe ACM Computing Surveys 35 114-131
[6]  
Iera A(2001)Proposed NIST standard for role-based access control ACM Transactions on Information and System Security 4 224-274
[7]  
Morabito G(2013)Free global ID against collusion attack on multi-authority attribute-based encryption Security and Communication Networks 6 1143-1152
[8]  
Baden R(2009)ASPE: Attribute-based secure policy enforcement in vehicular ad hoc networks Ad Hoc Networks 7 1526-1535
[9]  
Bender A(2009)Security architecture for virtual organizations of business web services Journal of Systems Architecture 55 224-232
[10]  
Spring N(2008)Taking the “long view” on the Fourth Amendment: Stored records and the sanctity of the home Stanford Technology Law Review 3 1-13