Comprehensive evaluation of key management hierarchies for outsourced data
Abstract Key management is an essential component of a cryptographic access control system with a large number of resources. It manages the secret keys assigned to the system entities in such a way that only authorized users can access a resource. Read access control allows read access of a resource...
Main Authors: | , |
---|---|
Format: | Article |
Language: | English |
Published: |
SpringerOpen
2019-02-01
|
Series: | Cybersecurity |
Subjects: | |
Online Access: | http://link.springer.com/article/10.1186/s42400-019-0026-y |
id |
doaj-420264924c544bbca879a2b8b33d7c77 |
---|---|
record_format |
Article |
spelling |
doaj-420264924c544bbca879a2b8b33d7c772020-11-25T03:35:17ZengSpringerOpenCybersecurity2523-32462019-02-012111710.1186/s42400-019-0026-yComprehensive evaluation of key management hierarchies for outsourced dataNaveen Kumar0Anish Mathuria1Indian Institute of Information TechnologyDhirubhai Ambani Institute of Information and Communication TechnologyAbstract Key management is an essential component of a cryptographic access control system with a large number of resources. It manages the secret keys assigned to the system entities in such a way that only authorized users can access a resource. Read access control allows read access of a resource by the authorized users and disallows others. An important objective of a key management is to reduce the secret key storage with each authorized user. To this end, there exist two prominent types of key management hierarchy with single key storage per user used for read access control in data outsourcing scenario: user-based and resource-based. In this work, we analyze the two types of hierarchy with respect to static hierarchy characteristics and dynamic operations such as adding or revoking user authorization. Our analysis shows that the resource-based hierarchies can be a better candidate which is not given equal emphasis in the literature. A new heuristic for minimizing the key management hierarchy is introduced that makes it practical in use even for a large number of users and resources. The performance evaluation of dynamic operations such as adding or revoking a user’s read subscription is shown experimentally to support our analytical results.http://link.springer.com/article/10.1186/s42400-019-0026-yKey management hierarchyData outsourcingAccess control |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Naveen Kumar Anish Mathuria |
spellingShingle |
Naveen Kumar Anish Mathuria Comprehensive evaluation of key management hierarchies for outsourced data Cybersecurity Key management hierarchy Data outsourcing Access control |
author_facet |
Naveen Kumar Anish Mathuria |
author_sort |
Naveen Kumar |
title |
Comprehensive evaluation of key management hierarchies for outsourced data |
title_short |
Comprehensive evaluation of key management hierarchies for outsourced data |
title_full |
Comprehensive evaluation of key management hierarchies for outsourced data |
title_fullStr |
Comprehensive evaluation of key management hierarchies for outsourced data |
title_full_unstemmed |
Comprehensive evaluation of key management hierarchies for outsourced data |
title_sort |
comprehensive evaluation of key management hierarchies for outsourced data |
publisher |
SpringerOpen |
series |
Cybersecurity |
issn |
2523-3246 |
publishDate |
2019-02-01 |
description |
Abstract Key management is an essential component of a cryptographic access control system with a large number of resources. It manages the secret keys assigned to the system entities in such a way that only authorized users can access a resource. Read access control allows read access of a resource by the authorized users and disallows others. An important objective of a key management is to reduce the secret key storage with each authorized user. To this end, there exist two prominent types of key management hierarchy with single key storage per user used for read access control in data outsourcing scenario: user-based and resource-based. In this work, we analyze the two types of hierarchy with respect to static hierarchy characteristics and dynamic operations such as adding or revoking user authorization. Our analysis shows that the resource-based hierarchies can be a better candidate which is not given equal emphasis in the literature. A new heuristic for minimizing the key management hierarchy is introduced that makes it practical in use even for a large number of users and resources. The performance evaluation of dynamic operations such as adding or revoking a user’s read subscription is shown experimentally to support our analytical results. |
topic |
Key management hierarchy Data outsourcing Access control |
url |
http://link.springer.com/article/10.1186/s42400-019-0026-y |
work_keys_str_mv |
AT naveenkumar comprehensiveevaluationofkeymanagementhierarchiesforoutsourceddata AT anishmathuria comprehensiveevaluationofkeymanagementhierarchiesforoutsourceddata |
_version_ |
1724555289830621184 |