Abstract
An algorithm for the distribution of cryptographic keys is presented, which is based on the hierarchical structure of objects in the system. The performance of the algorithm for some types of the graph of the object hierarchy is substantiated. A mechanism for setting mandatory and discretionary access differentiation is proposed using the algorithm.
Similar content being viewed by others
References
Anitha, R. and Mukherjee, S., Metadata driven efficient CRE based cipher key generation and distribution in cloud security, Int. J. Secur. Appl., 2014, vol. 8, no. 3, pp. 377–392. http://www.sersc.org/journals/IJSIA/vol8_no3_2014/37.pdf.
Heurix, J., Karlinger, M., and Neubauer T., Perimeter, Pseudonymization and personal metadata encryption for privacy-preserving searchable documents, Proc. Int. Conf. Health Syst., 2012, vol. 1, no. 1, pp. 46–57.
Ruj, S., Nayak, A., and Stojmenovic, I., DACC: Distributed Access Control in Clouds, Proc. of IEEE 10th International Conference “Trust, Security and Privacy in Computing and Communications (TrustCom),” 2011, pp. 91–98.
Zukarnain, Z.A. and Khalid, R., Quantum key distribution approach for cloud authentication: Enhance tight finite key, International Conference on Computer Science and Information Systems (ICSIS’2014), Dubai, 2014, pp. 28–33.
Belim, S.V. and Bogachenko, N.F., Construction of role-based security policies on an arbitrary directed graph, Probl. Inf. Bezop., Komp’yut. Sist., 2009, no. 3, pp. 7–17.
Belim, S.V., Bogachenko, N.F., and Rakitskii, Yu.S., A graph-theoretic approach to the problem of combining the role and mandatory security policies, Probl. Inf. Bezop., Komp’yut. Sist., 2010, no. 2, pp. 9–17.
Belim, S.V., Belim, S.Yu., and Bogachenko, N.F., Discretionary access control in systems with a hierarchy of objects, Vopr. Zashch. Inf., 2014, no. 2 (105), pp. 23–28.
Author information
Authors and Affiliations
Corresponding author
Additional information
Original Russian Text © S.V. Belim, N.F. Bogachenko, 2016, published in Problemy Informatsionnoi Bezopasnosti, Komp’yuternye Sistemy.
About this article
Cite this article
Belim, S.V., Bogachenko, N.F. Distribution of cryptographic keys in systems with a hierarchy of objects. Aut. Control Comp. Sci. 50, 777–786 (2016). https://doi.org/10.3103/S0146411616080071
Received:
Published:
Issue Date:
DOI: https://doi.org/10.3103/S0146411616080071