A cryptographic solution to implement access control in a hierarchy and more

  • Authors:
  • Indrakshi Ray;Indrajit Ray;Natu Narasimhamurthi

  • Affiliations:
  • Colorado State University, Fort Collins, CO;Colorado State University, Fort Collins, CO;Univ. of Michigan Dearborn, Dearborn, MI

  • Venue:
  • SACMAT '02 Proceedings of the seventh ACM symposium on Access control models and technologies
  • Year:
  • 2002

Quantified Score

Hi-index 0.00

Visualization

Abstract

The need for access control in a hierarchy arises in severaldifferent contexts. One such context is managing the information ofan organization where the users are divided into different securityclasses depending on who has access to what. Several cryptographicsolutions have been proposed to address this problem --- thesolutions are based on generating cryptographic keys for eachsecurity class such that the key for a lower level security classdepends on the key for the security class that is higher up in thehierarchy. Most solutions use complex cryptographic techniques:integrating these into existing systems may not be trivial. Othershave impractical requirement: if a user at a security level wantsto access data at lower levels, then all intermediate nodes must betraversed. Moreover, if there is an access control policy that doesnot conform to the hierarchical structure, such policy cannot behandled by existing solutions. We propose a new solution thatovercomes the above mentioned shortcomings. Our solution not onlyaddresses the problem of access control in a hierarchy but also canbe used for general cases. It is a scheme similar to the RSAcryptosystem and can be easily incorporated in existing systems.