Attribute-Tree Based Hierarchical Hidden Credential Model

Article Preview

Abstract:

Hidden credentials are useful in situations where requests for service, credentials, access policies and resources are extremely sensitive. Current research related to hidden credentials has the shortage that the attribute model cannot provide the complex description. This paper presents a hierarchical hidden credential model which combines the attribute tree structure and the hierarchical identity-based encryption. Attribute tree structure is given that is used to organize sensitive information and the hierarchical hidden credential model is applied to carry and transport credentials, sensitive access control policy, and private resource and so on. This model expands the attribute from a simple atom one to an attribute tree. After the evaluation, it is proven that this model overcomes the shortcomings such as high-load network communication, too many credential exchanges which was caused by attribute-based access control policy. The usability and expansibility of hidden credentials were improved also.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 546-547)

Pages:

604-611

Citation:

Online since:

July 2012

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2012 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Winsborough WH, Seamons KE, Jones VE. Automated trust negotiation. In: DARPA Information Survivability Conf. and Exposition. New York: IEEE Press, 2000. Pages: 88-102.

DOI: 10.1109/discex.2000.824965

Google Scholar

[2] Winsborough WH, Li NH. Safety in automated trust negotiation. In: IEEE Symp. on Security and Privacy 2004. Washington: IEEE Computer Society Press, 2004. Pages: 147−160.

DOI: 10.1109/secpri.2004.1301321

Google Scholar

[3] Holt JE, Bradshaw RW, Seamons KE, Orman H. Hidden credentials. Proc of the ACM Workshop on Privacy in the Electronic Society. New York: ACM Press, 2003. Pages: 1-8.

DOI: 10.1145/1005140.1005142

Google Scholar

[4] Bradshaw RW, Holt JE, Seamons KE. Concealing complex policies with hidden credentials. ACM Conf. on Computer and Communications Security. New York: ACM Press. 2004. Pages: 146-157.

DOI: 10.1145/1030083.1030104

Google Scholar

[5] Frikken K, Atallah M, Li JT. Hidden access control policies with hidden credentials. ACM Workshop on Privacy in the Electronic Society. New York: ACM Press, 2004. Pages: 27-28.

DOI: 10.1145/1029179.1029186

Google Scholar

[6] Jiangtao Li. Ninghui Li. William H. Winsborough: Automated Trust Negotiation Using Cryptographic Credentials. CCS'05, November 7–11, 2005, Pages: 46-57.

DOI: 10.1145/1102120.1102129

Google Scholar

[7] Adi Shamlr. Identity based cryptosystems and signature schemes[A]. In G. BIakley and David Chaum Editors, Proceedings of Crypto 1984, volume 196 of LNCS[C]. Springer-Verlag, 1984, 47-53.

Google Scholar

[8] Winsborough, W.H.; Jacobs, J: Automated trust negotiation in attribute-based access control. DARPA Information Survivability Conference and Exposition, 2003. Proceedings Volume 2, Issue, 22-24 April 2003 Pages: 252 - 257.

DOI: 10.1109/discex.2003.1194974

Google Scholar

[9] Ting Yu. Marianne Winslett. Kent E: Supporting Structured Credentials and Sensitive Policies through Interoperable Strategies for Automated Trust Negotiation. ACM Transactions on Information and System Security, Vol. 6, No. 1, February 2003, Pages: 1–42.

DOI: 10.1145/605434.605435

Google Scholar

[10] Dan Boneh, Matt Franklin. Identity-based encryption from the Well pairing[c]. Joe Kilian, editor, Proceedings of Crypto 2001, LNCS Springer-Verlag, 2001, 2139: 213-229.

DOI: 10.1007/3-540-44647-8_13

Google Scholar

[11] Dan Boneh, Xavier Boyen, Eu-Jin Goh. Hierarchical identity based encryption with constant size ciphertext[C]. Advances in Cryptology EUROCRYPT 2005 Springer-Verlag. 2005. LNCS, 3494: 440-456.

DOI: 10.1007/11426639_26

Google Scholar

[12] Sherman S M Chow, Lucas C K Hui, Siu MingYiu, et a1. Secure hierarchical identity based signature and its application. ICICS 2004, Springer-Verlag, 2004, LNCS. 3269: 480-494.

Google Scholar

[13] Markus Lorch. Seth Proctor. Rebekah Lepro: First Experiences Using XACML for Access Control in Distributed Systems ACM Workshop on XML Security, October 31, 2003, Pages 25-37.

DOI: 10.1145/968559.968563

Google Scholar

[14] Moses, T., ed., Privacy policy profile of XACML v2. 0; OASIS Standard, February 1, (2005).

Google Scholar

[15] Moses, T., ed., eXtensible Access Control Markup Language (XACML), Version 2. 0; OASIS Standard, February 1, (2005).

Google Scholar

[16] Anderson, A., and Lockhart, H., eds., SAML 2. 0 profile of XACML v2. 0, OASIS Standard, 1 February (2005).

Google Scholar

[17] Anderson, A., ed., Hierarchical resource profile of XACML v2. 0, OASIS Standard, 1 February (2005).

Google Scholar

[18] Fan Hong, Lei Liu: Implementing access policies with hidden credentials. Computer Application, 2005. 12 Vol. 25 No. 12 Pages: 2731-2733(in Chinese).

Google Scholar

[19] Xuexiong Yan, Hengtai Ma, Qingxian Wang, Pengfei Li: Attribute-tree based access control model for Web services. Computer Engineering and Applications, 2008. Vol. 44 No. 6 Pages: 142-145 (in Chinese).

Google Scholar