XML security protection scheme based on Kerberos authentication and polynomials authorization

With XML becoming a promising standard for data storage, describing, transferring and exchanging information on the Internet, data security and privacy protection of XML become the focus of research in recent years. In order to achieve the authorization of legitimate user and ensure the secure acces...

Full description

Bibliographic Details
Main Authors: Lihong Guo, Jian Wang, Haitao Wu, Najla Al-Nabhan
Format: Article
Language:English
Published: AIMS Press 2020-07-01
Series:Mathematical Biosciences and Engineering
Subjects:
Online Access:https://www.aimspress.com/article/doi/10.3934/mbe.2020254?viewType=HTML
id doaj-25764bf03804489e8c990f1cc036852e
record_format Article
spelling doaj-25764bf03804489e8c990f1cc036852e2021-09-08T01:46:49ZengAIMS PressMathematical Biosciences and Engineering1551-00182020-07-011754609463010.3934/mbe.2020254XML security protection scheme based on Kerberos authentication and polynomials authorizationLihong Guo0Jian Wang1Haitao Wu 2Najla Al-Nabhan31. College of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics, Nanjing 210016, China 2. Department of Information and Communications Engineering, Nanjing Institute of Technology, Nanjing 211167, China1. College of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics, Nanjing 210016, China2. Department of Information and Communications Engineering, Nanjing Institute of Technology, Nanjing 211167, China3. Department of Computer Science, King Saud University, Riyadh 11564, KSAWith XML becoming a promising standard for data storage, describing, transferring and exchanging information on the Internet, data security and privacy protection of XML become the focus of research in recent years. In order to achieve the authorization of legitimate user and ensure the secure access to sensitive information, in this paper, in the context of cloud storage, with the purpose of sharing sensitive XML information, a polynomial authorization scheme with Kerberos authentication was proposed, which was based on the users' access purpose and privacy policy. In this scheme, first, Kerberos authentication was used to identify the user, and then the polynomial whose coefficients were from the leaf node address was used to complete the authorization of user. For the legitimate user, under the interaction of authorization polynomials and the global structure view, authorization matrix is generated dynamically, its temporary and dynamic characteristics greatly improves the security of the system. Finally, with the help of authorization matrix and auxiliary information tables, security queries were successfully completed. The experimental results show that the scheme not only effectively protects XML sensitive data, but also reduces the server's storage pressure, at the same time it is beneficial to the rapid search and information positioning.https://www.aimspress.com/article/doi/10.3934/mbe.2020254?viewType=HTMLprivacydata securityauthenticationauthorizationpolynomial
collection DOAJ
language English
format Article
sources DOAJ
author Lihong Guo
Jian Wang
Haitao Wu
Najla Al-Nabhan
spellingShingle Lihong Guo
Jian Wang
Haitao Wu
Najla Al-Nabhan
XML security protection scheme based on Kerberos authentication and polynomials authorization
Mathematical Biosciences and Engineering
privacy
data security
authentication
authorization
polynomial
author_facet Lihong Guo
Jian Wang
Haitao Wu
Najla Al-Nabhan
author_sort Lihong Guo
title XML security protection scheme based on Kerberos authentication and polynomials authorization
title_short XML security protection scheme based on Kerberos authentication and polynomials authorization
title_full XML security protection scheme based on Kerberos authentication and polynomials authorization
title_fullStr XML security protection scheme based on Kerberos authentication and polynomials authorization
title_full_unstemmed XML security protection scheme based on Kerberos authentication and polynomials authorization
title_sort xml security protection scheme based on kerberos authentication and polynomials authorization
publisher AIMS Press
series Mathematical Biosciences and Engineering
issn 1551-0018
publishDate 2020-07-01
description With XML becoming a promising standard for data storage, describing, transferring and exchanging information on the Internet, data security and privacy protection of XML become the focus of research in recent years. In order to achieve the authorization of legitimate user and ensure the secure access to sensitive information, in this paper, in the context of cloud storage, with the purpose of sharing sensitive XML information, a polynomial authorization scheme with Kerberos authentication was proposed, which was based on the users' access purpose and privacy policy. In this scheme, first, Kerberos authentication was used to identify the user, and then the polynomial whose coefficients were from the leaf node address was used to complete the authorization of user. For the legitimate user, under the interaction of authorization polynomials and the global structure view, authorization matrix is generated dynamically, its temporary and dynamic characteristics greatly improves the security of the system. Finally, with the help of authorization matrix and auxiliary information tables, security queries were successfully completed. The experimental results show that the scheme not only effectively protects XML sensitive data, but also reduces the server's storage pressure, at the same time it is beneficial to the rapid search and information positioning.
topic privacy
data security
authentication
authorization
polynomial
url https://www.aimspress.com/article/doi/10.3934/mbe.2020254?viewType=HTML
work_keys_str_mv AT lihongguo xmlsecurityprotectionschemebasedonkerberosauthenticationandpolynomialsauthorization
AT jianwang xmlsecurityprotectionschemebasedonkerberosauthenticationandpolynomialsauthorization
AT haitaowu xmlsecurityprotectionschemebasedonkerberosauthenticationandpolynomialsauthorization
AT najlaalnabhan xmlsecurityprotectionschemebasedonkerberosauthenticationandpolynomialsauthorization
_version_ 1717762892495847424