Skip to main content
Log in

Distribution of cryptographic keys in systems with a hierarchy of objects

  • Published:
Automatic Control and Computer Sciences Aims and scope Submit manuscript

Abstract

An algorithm for the distribution of cryptographic keys is presented, which is based on the hierarchical structure of objects in the system. The performance of the algorithm for some types of the graph of the object hierarchy is substantiated. A mechanism for setting mandatory and discretionary access differentiation is proposed using the algorithm.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Anitha, R. and Mukherjee, S., Metadata driven efficient CRE based cipher key generation and distribution in cloud security, Int. J. Secur. Appl., 2014, vol. 8, no. 3, pp. 377–392. http://www.sersc.org/journals/IJSIA/vol8_no3_2014/37.pdf.

    Google Scholar 

  2. Heurix, J., Karlinger, M., and Neubauer T., Perimeter, Pseudonymization and personal metadata encryption for privacy-preserving searchable documents, Proc. Int. Conf. Health Syst., 2012, vol. 1, no. 1, pp. 46–57.

    Google Scholar 

  3. Ruj, S., Nayak, A., and Stojmenovic, I., DACC: Distributed Access Control in Clouds, Proc. of IEEE 10th International Conference “Trust, Security and Privacy in Computing and Communications (TrustCom),” 2011, pp. 91–98.

    Google Scholar 

  4. Zukarnain, Z.A. and Khalid, R., Quantum key distribution approach for cloud authentication: Enhance tight finite key, International Conference on Computer Science and Information Systems (ICSIS’2014), Dubai, 2014, pp. 28–33.

    Google Scholar 

  5. Belim, S.V. and Bogachenko, N.F., Construction of role-based security policies on an arbitrary directed graph, Probl. Inf. Bezop., Komp’yut. Sist., 2009, no. 3, pp. 7–17.

    MATH  Google Scholar 

  6. Belim, S.V., Bogachenko, N.F., and Rakitskii, Yu.S., A graph-theoretic approach to the problem of combining the role and mandatory security policies, Probl. Inf. Bezop., Komp’yut. Sist., 2010, no. 2, pp. 9–17.

    Google Scholar 

  7. Belim, S.V., Belim, S.Yu., and Bogachenko, N.F., Discretionary access control in systems with a hierarchy of objects, Vopr. Zashch. Inf., 2014, no. 2 (105), pp. 23–28.

    MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to S. V. Belim.

Additional information

Original Russian Text © S.V. Belim, N.F. Bogachenko, 2016, published in Problemy Informatsionnoi Bezopasnosti, Komp’yuternye Sistemy.

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Belim, S.V., Bogachenko, N.F. Distribution of cryptographic keys in systems with a hierarchy of objects. Aut. Control Comp. Sci. 50, 777–786 (2016). https://doi.org/10.3103/S0146411616080071

Download citation

  • Received:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.3103/S0146411616080071

Keywords

Navigation