Comprehensive evaluation of key management hierarchies for outsourced data

Abstract Key management is an essential component of a cryptographic access control system with a large number of resources. It manages the secret keys assigned to the system entities in such a way that only authorized users can access a resource. Read access control allows read access of a resource...

Full description

Bibliographic Details
Main Authors: Naveen Kumar, Anish Mathuria
Format: Article
Language:English
Published: SpringerOpen 2019-02-01
Series:Cybersecurity
Subjects:
Online Access:http://link.springer.com/article/10.1186/s42400-019-0026-y
id doaj-420264924c544bbca879a2b8b33d7c77
record_format Article
spelling doaj-420264924c544bbca879a2b8b33d7c772020-11-25T03:35:17ZengSpringerOpenCybersecurity2523-32462019-02-012111710.1186/s42400-019-0026-yComprehensive evaluation of key management hierarchies for outsourced dataNaveen Kumar0Anish Mathuria1Indian Institute of Information TechnologyDhirubhai Ambani Institute of Information and Communication TechnologyAbstract Key management is an essential component of a cryptographic access control system with a large number of resources. It manages the secret keys assigned to the system entities in such a way that only authorized users can access a resource. Read access control allows read access of a resource by the authorized users and disallows others. An important objective of a key management is to reduce the secret key storage with each authorized user. To this end, there exist two prominent types of key management hierarchy with single key storage per user used for read access control in data outsourcing scenario: user-based and resource-based. In this work, we analyze the two types of hierarchy with respect to static hierarchy characteristics and dynamic operations such as adding or revoking user authorization. Our analysis shows that the resource-based hierarchies can be a better candidate which is not given equal emphasis in the literature. A new heuristic for minimizing the key management hierarchy is introduced that makes it practical in use even for a large number of users and resources. The performance evaluation of dynamic operations such as adding or revoking a user’s read subscription is shown experimentally to support our analytical results.http://link.springer.com/article/10.1186/s42400-019-0026-yKey management hierarchyData outsourcingAccess control
collection DOAJ
language English
format Article
sources DOAJ
author Naveen Kumar
Anish Mathuria
spellingShingle Naveen Kumar
Anish Mathuria
Comprehensive evaluation of key management hierarchies for outsourced data
Cybersecurity
Key management hierarchy
Data outsourcing
Access control
author_facet Naveen Kumar
Anish Mathuria
author_sort Naveen Kumar
title Comprehensive evaluation of key management hierarchies for outsourced data
title_short Comprehensive evaluation of key management hierarchies for outsourced data
title_full Comprehensive evaluation of key management hierarchies for outsourced data
title_fullStr Comprehensive evaluation of key management hierarchies for outsourced data
title_full_unstemmed Comprehensive evaluation of key management hierarchies for outsourced data
title_sort comprehensive evaluation of key management hierarchies for outsourced data
publisher SpringerOpen
series Cybersecurity
issn 2523-3246
publishDate 2019-02-01
description Abstract Key management is an essential component of a cryptographic access control system with a large number of resources. It manages the secret keys assigned to the system entities in such a way that only authorized users can access a resource. Read access control allows read access of a resource by the authorized users and disallows others. An important objective of a key management is to reduce the secret key storage with each authorized user. To this end, there exist two prominent types of key management hierarchy with single key storage per user used for read access control in data outsourcing scenario: user-based and resource-based. In this work, we analyze the two types of hierarchy with respect to static hierarchy characteristics and dynamic operations such as adding or revoking user authorization. Our analysis shows that the resource-based hierarchies can be a better candidate which is not given equal emphasis in the literature. A new heuristic for minimizing the key management hierarchy is introduced that makes it practical in use even for a large number of users and resources. The performance evaluation of dynamic operations such as adding or revoking a user’s read subscription is shown experimentally to support our analytical results.
topic Key management hierarchy
Data outsourcing
Access control
url http://link.springer.com/article/10.1186/s42400-019-0026-y
work_keys_str_mv AT naveenkumar comprehensiveevaluationofkeymanagementhierarchiesforoutsourceddata
AT anishmathuria comprehensiveevaluationofkeymanagementhierarchiesforoutsourceddata
_version_ 1724555289830621184