• Title/Summary/Keyword: Data Access Control

Search Result 1,183, Processing Time 0.032 seconds

Sharing and Privacy in PHRs: Efficient Policy Hiding and Update Attribute-based Encryption

  • Liu, Zhenhua;Ji, Jiaqi;Yin, Fangfang;Wang, Baocang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.1
    • /
    • pp.323-342
    • /
    • 2021
  • Personal health records (PHRs) is an electronic medical system that enables patients to acquire, manage and share their health data. Nevertheless, data confidentiality and user privacy in PHRs have not been handled completely. As a fine-grained access control over health data, ciphertext-policy attribute-based encryption (CP-ABE) has an ability to guarantee data confidentiality. However, existing CP-ABE solutions for PHRs are facing some new challenges in access control, such as policy privacy disclosure and dynamic policy update. In terms of addressing these problems, we propose a privacy protection and dynamic share system (PPADS) based on CP-ABE for PHRs, which supports full policy hiding and flexible access control. In the system, attribute information of access policy is fully hidden by attribute bloom filter. Moreover, data user produces a transforming key for the PHRs Cloud to change access policy dynamically. Furthermore, relied on security analysis, PPADS is selectively secure under standard model. Finally, the performance comparisons and simulation results demonstrate that PPADS is suitable for PHRs.

BACS : An Experimental Study For Access Control System In Public Blockchain (BACS : 퍼블릭 블록체인 접근 통제 시스템에 관한 실험적 연구)

  • Han, Sejin;Lee, Sunjae;Lee, Dohyeon;Park, Sooyoung
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.20 no.1
    • /
    • pp.55-60
    • /
    • 2020
  • In this paper, we propose an access control system using cryptography as a method to protect personal data in public blockchain. The proposed system is designed to encrypt data according to the access policy, store it in the blockchain, and decrypt only the person who satisfy the access policy. In order to improve performance and scalability, an encryption mechanism is implemented outside the blockchain. Therefore, data access performance could be preserved while cryptographic operations executed Furthermore it can also improve the scalability by adding new access control modules while preserving the current configuration of blockchain network. The encryption scheme is based on the attribute-based encryption (ABE). However, unlike the traditional ABE, the "retention period", is incorporated into the access structure to ensure the right to be forgotten. In addition, symmetric key cryptograpic algorithms are used for the performance of ABE. We implemented the proposed system in a public blockchain and conducted the performance evaluation.

A Study on Secure Data Access Control in Mobile Cloud Environment (모바일 클라우드 환경에서 안전한 데이터 접근 제어에 관한 연구)

  • Kim, Si-Jung;Yeo, Sang-Soo
    • Journal of Digital Convergence
    • /
    • v.11 no.2
    • /
    • pp.317-322
    • /
    • 2013
  • Mobile cloud environment is recently becoming popular due to Internet access through various environments. Driven by computer performance improvement and service development, the demand for mobile cloud is increasing and accordingly the damage is on the rise. Therefore, it needs to conduct a study on problems of security necessary in large database that occurs in mobile cloud services. Although various security solutions limiting database access, security strategies about new user environments should be analyzed. This study analyzes weakness of safe data access through database management in mobile cloud environment and examines security requirements for safe data management. In addition, this study looks into threatening factors of security in cloud services and then draws security requirements about safer access control. A study on system application and evaluation of security requirements about access control is required.

Data access control of KP-ABE scheme for secure communication in drone environment

  • Hwang, Yong-Woon;Kim, Su-Hyun;Lee, Im-Yeong
    • Journal of the Korea Society of Computer and Information
    • /
    • v.27 no.4
    • /
    • pp.53-60
    • /
    • 2022
  • Recently, as the amount of data collected by drones has rapidly increased, it is necessary to support cloud computing technology that can securely and efficiently store and process data. However, various security threats such as stealing, leaking, or tampering with data communicated by drones can occur due to attackers. Therefore, there is a need for security technology to provide secure communication of data collected from drones. Among various security technologies, the KP-ABE scheme, which is attribute-based encryption, is a security technology that satisfies two characteristics: data encryption and user access control. This paper researched the KP-ABE scheme and proposed a secure data access control scheme to the drone environment. This proposed scheme provides confidentiality and integrity of data communicated in a drone environment and secure access control and availability. In addition, it provides a fast ciphertext search and constant size ciphertext among the requirements to be provided in the KP-ABE scheme.

Contract-based Access Control Method for NFT Use Rights

  • Jeong, Yoonsung;Ko, Deokyoon;Seo, Jungwon;Park, Sooyong;Kim, Seong-Jin;Kim, Bum-Soo;Kim, Do-Young
    • Journal of the Korea Society of Computer and Information
    • /
    • v.27 no.11
    • /
    • pp.1-11
    • /
    • 2022
  • In this paper, we propose an NFT(Non-Fungible Token)-based access control method for safely sharing data between users in blockchain environment. Since all data stored in the blockchain can be accessed by anyone due to the nature of the technology, it is necessary to control access except for authorized users when sharing sensitive data. For that, we generate each data as NFT and controls access to the data through the smart contract. In addition, in order to overcome the limitations of single ownership of the existing NFT, we separated the NFT into ownership and use rights, so that data can be safely shared between users. Ownership is represented as an original NFT, use rights is represented as a copied NFT, and all data generated as NFT is encrypted and uploaded, so data can be shared only through the smart contract with access control. To verify this approach, we set up a hypothetical scenario called Building Information Modeling (BIM) data trade, and deployed a smart contract that satisfies 32 function call scenarios that require access control. Also, we evaluated the stability in consideration of the possibility of decryption through brute-force attack. Through our approach, we confirmed that the data can be safely shared between users in blockchain environment.

Access Control of Digital Content Package by Using XML Encryption (XML 암호화를 이용한 디지털 콘텐츠 패키지의 접근 제어)

  • Cho, Kwang-Moon
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2004.11a
    • /
    • pp.291-295
    • /
    • 2004
  • As a large quantity of information is presented in XML format on the web, there are increasing demands for XML security. Until now research on XML security has been focused on the security of data network using digital signature and encryption technology. As XML data become extensive and complex however XML security comes to involve not only network security but also managerial security. But XML encryption support simple network security. So it cannot support multiple users and multiple access control policy. In this paper, we propose an integration method of encryption and access control policy for securing XML documents. This methodology can support multiple authorization of multiple users with integrating access control. And this can reduce the cost of the existing complicated access evaluation process of access control by using pre-processing.

  • PDF

A Study on Role-Based Access Control Modeling in Public Key Infrastructure (공개키 안에서 Role-Based 접근제어 모델링에 관한 연구)

  • Bang, Geuk-In;Lee, Joon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.6 no.5
    • /
    • pp.768-776
    • /
    • 2002
  • According as practical use of server system is generalized in multimedia and internet environment, the security of all data that is stored to system is actuality that security mechanism of high level such as competence grant or access control is required. Also, standardization of informations that is stored in system in scattered environment protection technology of more complicated system by absence of done schema, non-systemicity etc. Therefore in this paper. General access control way explained basic modeling because enough investigate and analyze general access control way. And assigning role about each modules separating module of RBAC(Role-Based Access Control) modeling, existent access control modeling and RBAC modeling using mixing new access control modeling present.

Role-Based Access Control in Object-Oriented GIS (객체지향 지리정보시스템에서의 역할 기반 접근 제어)

  • Kim, Mi-Yeon;Lee, Cheol-Min;Lee, Dong-Hoon;Moon, Chang-Joo
    • Journal of Information Technology Applications and Management
    • /
    • v.14 no.3
    • /
    • pp.49-77
    • /
    • 2007
  • Role-based access control (RBAC) models are recently receiving considerable attention as a generalized approach to access control. In line with the increase in applications that deal with spatial data. an advanced RBAC model whose entities and constraints depend on the characteristics of spatial data is required. Even if some approaches have been proposed for geographic information systems. most studies focus on the location of users instead of the characteristics of spatial data. In this paper. we extend the traditional RBAC model in order to deal with the characteristics of spatial data and propose new spatial constraints. We use the object-oriented modeling based on open GIS consortium geometric model to formalize spatial objects and spatial relations such as hierarchy relation and topology relation. As a result of the formalization for spatial relations. we present spatial constraints classified according to the characteristics of each relation. We demonstrate our extended-RBAC model called OOGIS-RBAC and spatial constraints through case studies. Finally. we compare our OOGIS-RBAC model and the DAC model in the management of access control to prove the efficiency of our model.

  • PDF

Image Features Based Secure Access Control for Data Content Protection (데이터 내용 보호를 위한 이미지 특징 기반의 보안 접근 제어)

  • Ha, Sunju;Park, Daechul
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.13 no.1
    • /
    • pp.171-180
    • /
    • 2013
  • Data security is always an important issue. In particular, the current emerging cloud computing system inevitably raises the issue of data security. However, data security is no longer safe with a simple way, but requires rather advanced method to secure the data. In this paper, instead of exploiting the existing text-based cryptography approach an image-based access control of data content is studied to present a higher level of data security. Color key chain is generated both using histogram value of the original image, and the location information and featured color information extracted by geometric transformation to form the security key to access secure data content. Finally, the paper addresses design interface and implementation for data content access control for evaluation of the proposed scheme.

A new WDM/TDM protocol for very high speed optical networks (고속광통신망용 새로운 WDM/TDM 프로토콜)

  • 이상록;이성근;박진우
    • Journal of the Korean Institute of Telematics and Electronics A
    • /
    • v.33A no.2
    • /
    • pp.50-58
    • /
    • 1996
  • This paper proposes the channel-access protocol suitable to a very high speed photonic WDM network with star configuration, which can provide a high channel utilization and insensitivity to the propagation delay. The proposed protocol employs a control channel and a simple status table to deal with the propagation delay which has been a major limiting factor in the performance of the very high speed optical communication networks. The control channel transmits control information in order to reserve access on data channels, and each node constitutes a status table after the reception of control pckets which holds information about the availbility of destination node and data channel. The proposed protocol is insensitive to the propagation delay time by removing necessity of the retransmission and by allowing parallel transmission of control packet and data packets. It is proved in analysis and discrete event simulation that the proposed protocol is superior in throughput and mean delay, especially at the high load conditions compared to the existing high speed channel-access protocols.

  • PDF