A fast and simple mandatory authorization for cloud hierarchical organization
碩士 === 淡江大學 === 資訊管理學系碩士班 === 104 === This study proposes a basic mandatory access control in cloud hierarchical structure. It considers not only user''s secret level higher than that of file but also the hierarchy levels that users belong to. In the proposed system, Key Derivation...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | zh-TW |
Published: |
2016
|
Online Access: | http://ndltd.ncl.edu.tw/handle/41239905341425438453 |
id |
ndltd-TW-104TKU05396033 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-TW-104TKU053960332017-09-03T04:25:42Z http://ndltd.ncl.edu.tw/handle/41239905341425438453 A fast and simple mandatory authorization for cloud hierarchical organization 簡易快速的雲端階層授權與強制機制模式之研究 Yuan-Chieh Han 韓元傑 碩士 淡江大學 資訊管理學系碩士班 104 This study proposes a basic mandatory access control in cloud hierarchical structure. It considers not only user''s secret level higher than that of file but also the hierarchy levels that users belong to. In the proposed system, Key Derivation Center (KDC) was used for making the first initial private keys generation and their distribution for each group. After that, a table called RAI (Relation-And-ID) associated with related parameters is open. Users can used RAI and hash function to derive the keys that been authorized. The user are authorized by the two levels of secret attributes(naming the user level and the group hierarchy) . This study proposes a mandatory access control for organization of hierarchical structure, delivers a much fast operation in cloud hierarchical organization, and affects less parameters when the hierarchical structure changes. The proposed mechanism is also compared with AKL, Lo-Hwang-Liu, and Chia-Hsun Tsai. Besides differences in dealing with the comparison among the parameters, the procedure, and the various hierarchical structures, our mechanism use the hash function as a core calculation, while the other three researches use the modular exponentiation operation. As indicated in (BruceSchneier ,1986), hash function, in the same security level, is faster than modular exponentiation operation by thousands of times. Therefore, our system can attains both a fast hierarchical authorized and basic mandatory access control to secure the authorized information in most business organization. Hung-Chang Lee 李鴻璋 2016 學位論文 ; thesis 33 zh-TW |
collection |
NDLTD |
language |
zh-TW |
format |
Others
|
sources |
NDLTD |
description |
碩士 === 淡江大學 === 資訊管理學系碩士班 === 104 === This study proposes a basic mandatory access control in cloud hierarchical structure. It considers not only user''s secret level higher than that of file but also the hierarchy levels that users belong to. In the proposed system, Key Derivation Center (KDC) was used for making the first initial private keys generation and their distribution for each group. After that, a table called RAI (Relation-And-ID) associated with related parameters is open. Users can used RAI and hash function to derive the keys that been authorized.
The user are authorized by the two levels of secret attributes(naming the user level and the group hierarchy) . This study proposes a mandatory access control for organization of hierarchical structure, delivers a much fast operation in cloud hierarchical organization, and affects less parameters when the hierarchical structure changes. The proposed mechanism is also compared with AKL, Lo-Hwang-Liu, and Chia-Hsun Tsai. Besides differences in dealing with the comparison among the parameters, the procedure, and the various hierarchical structures, our mechanism use the hash function as a core calculation, while the other three researches use the modular exponentiation operation. As indicated in (BruceSchneier ,1986), hash function, in the same security level, is faster than modular exponentiation operation by thousands of times. Therefore, our system can attains both a fast hierarchical authorized and basic mandatory access control to secure the authorized information in most business organization.
|
author2 |
Hung-Chang Lee |
author_facet |
Hung-Chang Lee Yuan-Chieh Han 韓元傑 |
author |
Yuan-Chieh Han 韓元傑 |
spellingShingle |
Yuan-Chieh Han 韓元傑 A fast and simple mandatory authorization for cloud hierarchical organization |
author_sort |
Yuan-Chieh Han |
title |
A fast and simple mandatory authorization for cloud hierarchical organization |
title_short |
A fast and simple mandatory authorization for cloud hierarchical organization |
title_full |
A fast and simple mandatory authorization for cloud hierarchical organization |
title_fullStr |
A fast and simple mandatory authorization for cloud hierarchical organization |
title_full_unstemmed |
A fast and simple mandatory authorization for cloud hierarchical organization |
title_sort |
fast and simple mandatory authorization for cloud hierarchical organization |
publishDate |
2016 |
url |
http://ndltd.ncl.edu.tw/handle/41239905341425438453 |
work_keys_str_mv |
AT yuanchiehhan afastandsimplemandatoryauthorizationforcloudhierarchicalorganization AT hányuánjié afastandsimplemandatoryauthorizationforcloudhierarchicalorganization AT yuanchiehhan jiǎnyìkuàisùdeyúnduānjiēcéngshòuquányǔqiángzhìjīzhìmóshìzhīyánjiū AT hányuánjié jiǎnyìkuàisùdeyúnduānjiēcéngshòuquányǔqiángzhìjīzhìmóshìzhīyánjiū AT yuanchiehhan fastandsimplemandatoryauthorizationforcloudhierarchicalorganization AT hányuánjié fastandsimplemandatoryauthorizationforcloudhierarchicalorganization |
_version_ |
1718526635763826688 |