DocumentCode
73426
Title
Role-Based Cryptosystem: A New Cryptographic RBAC System Based on Role-Key Hierarchy
Author
Zhu, Yujia ; Ahn, Gail-Joon ; Hu, Haibo ; Ma, Dongsheng ; Wang, Shuhui
Author_Institution
School of Computer and Communication Engineering, University of Science and Technology Beijing, Beijing, China
Volume
8
Issue
12
fYear
2013
fDate
Dec. 2013
Firstpage
2138
Lastpage
2153
Abstract
Even though role-based access control (RBAC) can tremendously help us to minimize the complexity in administering users, it still needs to realize the notion of roles at the resource level. In this paper, we propose a practical cryptographic RBAC model, called role-key hierarchy model, to support various security features, including signature, identification, and encryption on role-key hierarchy. In addition, several advanced features, such as role or user revocation, tracing, and anonymity, are implemented as well. With the help of rich algebraic structure of elliptic curves, we introduce a unified and complete construction of role-based cryptosystem to verify the rationality and validity of our proposed model. In addition, a proof-of-concept prototype implementation and performance evaluation is discussed to demonstrate the feasibility and efficiency of our mechanisms.
Keywords
Access control; Elliptic curve cryptography; Encryption; Security; Security; access control; role and user revocation; role-based cryptosystem; role-key hierarchy;
fLanguage
English
Journal_Title
Information Forensics and Security, IEEE Transactions on
Publisher
ieee
ISSN
1556-6013
Type
jour
DOI
10.1109/TIFS.2013.2287858
Filename
6650102
Link To Document