Abstract
This paper analyses the efficiency of user and resource-based hierarchies for read access control in cloud. It is shown that resource-based hierarchies are more efficient than user-based hierarchies in terms of communication and computation costs, when considering dynamic operations such as extending read authorization and user revocation.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
\(= 1\times ^{|U|}C_1 + 2\times ^{|U|}C_2 + 3\times ^{|U|}C_3 + ... + (|U|-1)\times ^{|U|}C_{|U|-1} + (|U|)\times ^{|U|}C_{|U|} \)
\(=|U|/0! + |U|(|U|-1)/1! + |U|(|U|-1)(|U|-2)/2! + ... + |U|(|U|-1)/1! + |U|/0!\)
\(= 2\sum _{i=0}^{|U|/2} \frac{|U|!}{(|U|-i-1)!i!}\) .
References
Akl, S.G., Taylor, P.D.: Cryptographic solution to a problem of access control in a hierarchy. ACM Trans. Comput. Syst. 1(3), 239–248 (1983)
Atallah, M.J., Frikken, K.B., Blanton, M.: Dynamic and efficient key management for access hierarchies. In: ACM Conference on Computer and Communications Security, pp. 190–202 (2005)
Blundo, C., Cimato, S., di Vimercati, S.D.C., Santis, A.D., Foresti, S., Paraboschi, S., Samarati, P.: Managing key hierarchies for access control enforcement: heuristic approaches. Comput. Secur. 29(5), 533–547 (2010)
di Vimercati, S.D.C., Foresti, S., Jajodia, S., Livraga, G., Paraboschi, S., Samarati, P.: Enforcing dynamic write privileges in data outsourcing. Comput. Secur. 39, 47–63 (2013)
di Vimercati, S.D.C., Foresti, S., Samarati, P.: Recent advances in access control. In: Gertz, M., Jajodia, S. (eds.) Handbook of Database Security - Applications and Trends, pp. 1–26. Springer, Heidelberg (2008)
Miller, M.S., Yee, K.-P., Shapiro, J.S.: Capability Myths Demolished. Technical Report SRL2003-02, Systems Research Laboratory, Department of Computer Science, Johns Hopkins University, March 2003
National Hospice and Palliative Care Organization. NHPCO Facts and Figures: Hospice Care in America (2013). http://www.nhpco.org/sites/default/files/public/Statistics_Research/2013_Facts_Figures.pdf
Raykova, M., Zhao, H., Bellovin, S.M.: Privacy enhanced access control for outsourced data sharing. In: Keromytis, A.D. (ed.) FC 2012. LNCS, vol. 7397, pp. 223–238. Springer, Heidelberg (2012)
Wang, S.-Y., Laih, C.-S.: Efficient key distribution for access control in pay-TV systems. IEEE Trans. Multimedia 10(3), 480–492 (2008)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this paper
Cite this paper
Kumar, N., Mathuria, A., Das, M.L. (2015). Comparing the Efficiency of Key Management Hierarchies for Access Control in Cloud . In: Abawajy, J., Mukherjea, S., Thampi, S., Ruiz-MartÃnez, A. (eds) Security in Computing and Communications. SSCC 2015. Communications in Computer and Information Science, vol 536. Springer, Cham. https://doi.org/10.1007/978-3-319-22915-7_4
Download citation
DOI: https://doi.org/10.1007/978-3-319-22915-7_4
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-22914-0
Online ISBN: 978-3-319-22915-7
eBook Packages: Computer ScienceComputer Science (R0)