Browse > Article
http://dx.doi.org/10.13089/JKIISC.2005.15.3.31

Asymmetric Temporal Privilege Management on Untrusted Storage Server  

Kim, Euh-Mi (OULLIM Information Technology, INC.)
Yoon, Hyo-Jin (ISaC & Dept. of Math., Seoul National University)
Cheon, Jung-Hee (ISaC & Dept. of Math., Seoul National University)
Abstract
We consider a network storage model whose administrator can not be fully trusted. In this model, we assume that all data stored are encrypted for data confidentiality and one owner distributes the decryption key for each time period to users. In this paper, we propose three privilege management schemes. In the first scheme, called Temporal Privilege Management (TPM), we use a symmetric encryption based on one-way function chains for key encapsulation. In the second scheme, called Asymmetric Temporal Privilege Management (ATPM), anyone can encrypt the data using the public key of owner, but only privileged users can decrypt the encrypted data. Finally, we present a scheme to restrict writers' privilege using ID-based signatures in ATPM. In our schemes, the privilege managements are based on the time and the addition of users is efficient. Specially, applying TPM and ATPM, we can solve the back-issue problem.
Keywords
privilege Management; Network Storage; Hierarchical ID-Based Encryption Scheme; ID-Based Signature Scheme;
Citations & Related Records
연도 인용수 순위
  • Reference
1 D. Boneh, B. Lynn and H. Shacham, 'Short Signatures from the Weil Pairing,' in Advances in Cryptology - Asiacrypt 2001, LNCS 2248, pp. 514-532, 2001
2 J. C. Cha and J. H. Cheon, 'An Identity-Based Signature from Gap Diffie-Hellman Groups, ' in PKC 03, LNCS 2567, pp. 18-30, 2003
3 D. Naor, M. Naor, and J. Lotspiech. 'Revocation and Tracing Schemes for Stateless Receivers,' in Advances in Cryptology - Crypto '01, pages 41 {62, Berlin, 2001. Springer-Verlag. Lecture Notes in Computer Science Volume 2139
4 Arvind Narayanan, C. Pandu Rangan, Kwangjo Kim, 'Practical Pay TV Schemes', in ACISP 2003, 192-203, 2003
5 E. Riedel, M. Kallahalla and R. Swaminathan, 'A Framework for Evaluating Storage System Security,' in FAST 02, pp. 15-30, 2002
6 J. Horwitz and B. Lynn, 'Toward Hierarchical Identity-Based Encryption,' in Advances in Cryptology - Eurocrypt 2003, LNCS 2332, pp. 466-481, 2002
7 K. Fu, 'Group Sharing and Random Access in Cryptographic Storage File Systems,' in Master's thesis, MIT, 1999
8 M. Kallahalla, E. Riedel, R. Swaminathan, Q. Wang and K. Fu, 'Plutus : Scalable Secure File Sharing on Untrusted Storage,' in FAST 03, pp. 29-42. 2003
9 Y. Dodis and N. Fazio, 'Public Key Broadcast Encryption for Stateless Receivers', in ACM-DRM, 2002
10 R. Canetti, S. Halevi and J. Katz, 'A Forward-Secure Public-Key Encryption Scheme,' in Advances in Cryptology - Eurocrypt 2003, LNCS 2656, pp. 255-271, 2003
11 C. Gentry and A. Silverberg, 'Hierarchical ID-Based Cryptography,' in Advances in Cryptology - Asiacrypt 2002, LNCS 2501, pp. 548-566, 2002