XML security protection scheme based on Kerberos authentication and polynomials authorization
With XML becoming a promising standard for data storage, describing, transferring and exchanging information on the Internet, data security and privacy protection of XML become the focus of research in recent years. In order to achieve the authorization of legitimate user and ensure the secure acces...
Main Authors: | , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
AIMS Press
2020-07-01
|
Series: | Mathematical Biosciences and Engineering |
Subjects: | |
Online Access: | https://www.aimspress.com/article/doi/10.3934/mbe.2020254?viewType=HTML |
id |
doaj-25764bf03804489e8c990f1cc036852e |
---|---|
record_format |
Article |
spelling |
doaj-25764bf03804489e8c990f1cc036852e2021-09-08T01:46:49ZengAIMS PressMathematical Biosciences and Engineering1551-00182020-07-011754609463010.3934/mbe.2020254XML security protection scheme based on Kerberos authentication and polynomials authorizationLihong Guo0Jian Wang1Haitao Wu 2Najla Al-Nabhan31. College of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics, Nanjing 210016, China 2. Department of Information and Communications Engineering, Nanjing Institute of Technology, Nanjing 211167, China1. College of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics, Nanjing 210016, China2. Department of Information and Communications Engineering, Nanjing Institute of Technology, Nanjing 211167, China3. Department of Computer Science, King Saud University, Riyadh 11564, KSAWith XML becoming a promising standard for data storage, describing, transferring and exchanging information on the Internet, data security and privacy protection of XML become the focus of research in recent years. In order to achieve the authorization of legitimate user and ensure the secure access to sensitive information, in this paper, in the context of cloud storage, with the purpose of sharing sensitive XML information, a polynomial authorization scheme with Kerberos authentication was proposed, which was based on the users' access purpose and privacy policy. In this scheme, first, Kerberos authentication was used to identify the user, and then the polynomial whose coefficients were from the leaf node address was used to complete the authorization of user. For the legitimate user, under the interaction of authorization polynomials and the global structure view, authorization matrix is generated dynamically, its temporary and dynamic characteristics greatly improves the security of the system. Finally, with the help of authorization matrix and auxiliary information tables, security queries were successfully completed. The experimental results show that the scheme not only effectively protects XML sensitive data, but also reduces the server's storage pressure, at the same time it is beneficial to the rapid search and information positioning.https://www.aimspress.com/article/doi/10.3934/mbe.2020254?viewType=HTMLprivacydata securityauthenticationauthorizationpolynomial |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Lihong Guo Jian Wang Haitao Wu Najla Al-Nabhan |
spellingShingle |
Lihong Guo Jian Wang Haitao Wu Najla Al-Nabhan XML security protection scheme based on Kerberos authentication and polynomials authorization Mathematical Biosciences and Engineering privacy data security authentication authorization polynomial |
author_facet |
Lihong Guo Jian Wang Haitao Wu Najla Al-Nabhan |
author_sort |
Lihong Guo |
title |
XML security protection scheme based on Kerberos authentication and polynomials authorization |
title_short |
XML security protection scheme based on Kerberos authentication and polynomials authorization |
title_full |
XML security protection scheme based on Kerberos authentication and polynomials authorization |
title_fullStr |
XML security protection scheme based on Kerberos authentication and polynomials authorization |
title_full_unstemmed |
XML security protection scheme based on Kerberos authentication and polynomials authorization |
title_sort |
xml security protection scheme based on kerberos authentication and polynomials authorization |
publisher |
AIMS Press |
series |
Mathematical Biosciences and Engineering |
issn |
1551-0018 |
publishDate |
2020-07-01 |
description |
With XML becoming a promising standard for data storage, describing, transferring and exchanging information on the Internet, data security and privacy protection of XML become the focus of research in recent years. In order to achieve the authorization of legitimate user and ensure the secure access to sensitive information, in this paper, in the context of cloud storage, with the purpose of sharing sensitive XML information, a polynomial authorization scheme with Kerberos authentication was proposed, which was based on the users' access purpose and privacy policy. In this scheme, first, Kerberos authentication was used to identify the user, and then the polynomial whose coefficients were from the leaf node address was used to complete the authorization of user. For the legitimate user, under the interaction of authorization polynomials and the global structure view, authorization matrix is generated dynamically, its temporary and dynamic characteristics greatly improves the security of the system. Finally, with the help of authorization matrix and auxiliary information tables, security queries were successfully completed. The experimental results show that the scheme not only effectively protects XML sensitive data, but also reduces the server's storage pressure, at the same time it is beneficial to the rapid search and information positioning. |
topic |
privacy data security authentication authorization polynomial |
url |
https://www.aimspress.com/article/doi/10.3934/mbe.2020254?viewType=HTML |
work_keys_str_mv |
AT lihongguo xmlsecurityprotectionschemebasedonkerberosauthenticationandpolynomialsauthorization AT jianwang xmlsecurityprotectionschemebasedonkerberosauthenticationandpolynomialsauthorization AT haitaowu xmlsecurityprotectionschemebasedonkerberosauthenticationandpolynomialsauthorization AT najlaalnabhan xmlsecurityprotectionschemebasedonkerberosauthenticationandpolynomialsauthorization |
_version_ |
1717762892495847424 |