Skip to main content

Comparing the Efficiency of Key Management Hierarchies for Access Control in Cloud

  • Conference paper
  • First Online:
Security in Computing and Communications (SSCC 2015)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 536))

Included in the following conference series:

Abstract

This paper analyses the efficiency of user and resource-based hierarchies for read access control in cloud. It is shown that resource-based hierarchies are more efficient than user-based hierarchies in terms of communication and computation costs, when considering dynamic operations such as extending read authorization and user revocation.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    \(= 1\times ^{|U|}C_1 + 2\times ^{|U|}C_2 + 3\times ^{|U|}C_3 + ... + (|U|-1)\times ^{|U|}C_{|U|-1} + (|U|)\times ^{|U|}C_{|U|} \)

    \(=|U|/0! + |U|(|U|-1)/1! + |U|(|U|-1)(|U|-2)/2! + ... + |U|(|U|-1)/1! + |U|/0!\)

    \(= 2\sum _{i=0}^{|U|/2} \frac{|U|!}{(|U|-i-1)!i!}\) .

References

  1. Akl, S.G., Taylor, P.D.: Cryptographic solution to a problem of access control in a hierarchy. ACM Trans. Comput. Syst. 1(3), 239–248 (1983)

    Article  Google Scholar 

  2. Atallah, M.J., Frikken, K.B., Blanton, M.: Dynamic and efficient key management for access hierarchies. In: ACM Conference on Computer and Communications Security, pp. 190–202 (2005)

    Google Scholar 

  3. Blundo, C., Cimato, S., di Vimercati, S.D.C., Santis, A.D., Foresti, S., Paraboschi, S., Samarati, P.: Managing key hierarchies for access control enforcement: heuristic approaches. Comput. Secur. 29(5), 533–547 (2010)

    Article  Google Scholar 

  4. di Vimercati, S.D.C., Foresti, S., Jajodia, S., Livraga, G., Paraboschi, S., Samarati, P.: Enforcing dynamic write privileges in data outsourcing. Comput. Secur. 39, 47–63 (2013)

    Article  Google Scholar 

  5. di Vimercati, S.D.C., Foresti, S., Samarati, P.: Recent advances in access control. In: Gertz, M., Jajodia, S. (eds.) Handbook of Database Security - Applications and Trends, pp. 1–26. Springer, Heidelberg (2008)

    Chapter  Google Scholar 

  6. Miller, M.S., Yee, K.-P., Shapiro, J.S.: Capability Myths Demolished. Technical Report SRL2003-02, Systems Research Laboratory, Department of Computer Science, Johns Hopkins University, March 2003

    Google Scholar 

  7. National Hospice and Palliative Care Organization. NHPCO Facts and Figures: Hospice Care in America (2013). http://www.nhpco.org/sites/default/files/public/Statistics_Research/2013_Facts_Figures.pdf

  8. Raykova, M., Zhao, H., Bellovin, S.M.: Privacy enhanced access control for outsourced data sharing. In: Keromytis, A.D. (ed.) FC 2012. LNCS, vol. 7397, pp. 223–238. Springer, Heidelberg (2012)

    Chapter  Google Scholar 

  9. Wang, S.-Y., Laih, C.-S.: Efficient key distribution for access control in pay-TV systems. IEEE Trans. Multimedia 10(3), 480–492 (2008)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Naveen Kumar .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Kumar, N., Mathuria, A., Das, M.L. (2015). Comparing the Efficiency of Key Management Hierarchies for Access Control in Cloud . In: Abawajy, J., Mukherjea, S., Thampi, S., Ruiz-Martínez, A. (eds) Security in Computing and Communications. SSCC 2015. Communications in Computer and Information Science, vol 536. Springer, Cham. https://doi.org/10.1007/978-3-319-22915-7_4

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-22915-7_4

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-22914-0

  • Online ISBN: 978-3-319-22915-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics