A Hierarchical Access Control Scheme Based on Lagrange Interpolation and ELGamal Algorithm with Numerical Experiments

2013 ◽  
Vol 385-386 ◽  
pp. 1705-1707
Author(s):  
Tzer Long Chen ◽  
Yu Fang Chung ◽  
Jian Mao Hong ◽  
Jeng Hong Jhong ◽  
Chin Sheng Chen ◽  
...  

It is important to notice that the access control mechanism has been widely applied in various areas, such as on-line video systems, wireless network, and electronic documents. We propose an access control mechanism which is constructed based on two mathematical fundamentals: Lagrange interpolation and ElGamal algorithm. We conduct performance analysis to compare the efficiency of our proposed scheme with that of several related published schemes in both key generation phase and key derivation phase. Our new scheme is proven to be more efficient. It is shown, as expected, a more efficient scheme provides relatively less security and a more secure scheme is relatively less efficient for private keys of the same size.

2014 ◽  
Vol 696 ◽  
pp. 157-160
Author(s):  
Bao Hua Zhao ◽  
Xiao Ping Wang

In this paper, combining the existing dynamic access control model based on trust with the dynamic measurement technique, we propose a dynamic access control scheme based on credibility. By the simulation test, the mechanism can prevent the malicious behavior of malicious nodes.


Kybernetes ◽  
2014 ◽  
Vol 43 (2) ◽  
pp. 325-340 ◽  
Author(s):  
Chi-Lun Liu

Purpose – This work empirically evaluates the effectiveness of the novel ontology-based access-control mechanism and the common password-protected access-control mechanism for social blogs. The paper aims to discuss these issues. Design/methodology/approach – The ontology-based access-control scheme is designed to fit two characteristics of blog activities: social relationships and tags. A laboratory experiment is conducted to assess the perceived privacy benefit and perceived ease of use of the two mechanisms. Findings – Analytical results indicate that, with the ontology-based access-control scheme, users perceive more privacy benefit than with the password-protected access-control scheme. The perceived ease of use with the ontology-based and password-protected access-control systems did not differ significantly. Research limitations/implications – Cross-boundary collaborations need an appropriate approach to control communication access. Further study is required to evaluate the ontology-based access-control scheme applied in cross-organizational and cross-departmental collaborations. Practical implications – From a knowledge management perspective, blogs can store personal and organizational knowledge and experiences. The ontology-based access-control scheme encourages knowledge sharing for appropriate persons. Originality/value – The new ontology-based access-control mechanism can help online users keep secrets from selected people to gain more privacy benefits than the existing password-protected access-control mechanism.


10.28945/3374 ◽  
2009 ◽  
Author(s):  
Adesina Sodiya ◽  
Adebukola Onashoga

Ensuring adequate security of information has been a growing concern of individuals and organizations. There is then the need to provide suitable access control mechanism for preventing insider abuses and ensuring appropriate use of resources. This paper presents an access control scheme that adopts the techniques of Role-Based Access Control (RBAC), Purpose-Based Access Control (PBAC), Time-Based Access Control (TBAC) and History-Based Access Control (HBAC) as components to form an integrated Components-based Access Control Architecture (CACA). In CACA, an Access Control Score (ACS) is computed from the combined access control techniques. CACA also combines ACS with the sensitivity nature of system resources before a level of access is granted. The architecture was implemented within a payroll system developed using JAVA and SQL. Using usability testing, the evaluation of CACA showed 92% reduction in insider abuses and misuse of privileges. This shows that CACA can provide higher level of security access as against what used to exist.


Sign in / Sign up

Export Citation Format

Share Document