Decentralized access control scheme for the dynamic group

被引:0
|
作者
Wang, X. M. [1 ]
机构
[1] Jinan Univ, Dept Comp Sci, Guangzhou 510632, Guangdong, Peoples R China
来源
2008 PROCEEDINGS OF INFORMATION TECHNOLOGY AND ENVIRONMENTAL SYSTEM SCIENCES: ITESS 2008, VOL 1 | 2008年
关键词
ynamic group; access control; revocation control;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
ully decentralized access control scheme for the dynamic group is proposed in this paper. The scheme uses the two layers of fully decentralized access control mechanism to provide security services such as joining the group, accessing group resources. One layer control is to prevent unauthorized members from joining a group. Another layer control is to trace the behavior of group members, to rate their trust values, and to revoke malicious members from group once detected. Furthermore, the scheme requires no central-trusted authority and a few interactions among group members, so it is a fully decentralized control, more efficient, and more practical scheme in the environments of dynamic membership and there is no central-trusted authority.
引用
收藏
页码:445 / 450
页数:6
相关论文
共 50 条
  • [21] A Secure and Efficient Decentralized Access Control Scheme Based on Blockchain for Vehicular Social Networks
    Zhang, Leyou
    Zhang, Ye
    Wu, Qing
    Mu, Yi
    Rezaeibagha, Fatemeh
    IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (18) : 17938 - 17952
  • [22] An access control and authentication scheme for secure data sharing in the decentralized cloud storage system
    Khatiwada, Pankaj
    Yang, Bian
    2022 5TH CONFERENCE ON CLOUD AND INTERNET OF THINGS, CIOT, 2022, : 137 - 144
  • [23] THE DESIGN OF DYNAMIC ACCESS-CONTROL SCHEME WITH USER AUTHENTICATION
    YEN, SM
    LAIH, CS
    COMPUTERS & MATHEMATICS WITH APPLICATIONS, 1993, 25 (07) : 27 - 32
  • [24] Auditable and dynamic access control scheme with behavior and identity tracing
    Zhang, Qianhui
    Yuan, Lingyun
    Xie, Tianyu
    Chen, Han
    COMPUTER NETWORKS, 2024, 251
  • [25] Secure Dynamic Access Control Scheme of PHR in Cloud Computing
    Chen, Tzer-Shyong
    Liu, Chia-Hui
    Chen, Tzer-Long
    Chen, Chin-Sheng
    Bau, Jian-Guo
    Lin, Tzu-Ching
    JOURNAL OF MEDICAL SYSTEMS, 2012, 36 (06) : 4005 - 4020
  • [26] Secure Dynamic Access Control Scheme of PHR in Cloud Computing
    Tzer-Shyong Chen
    Chia-Hui Liu
    Tzer-Long Chen
    Chin-Sheng Chen
    Jian-Guo Bau
    Tzu-Ching Lin
    Journal of Medical Systems, 2012, 36 : 4005 - 4020
  • [27] A Dynamic Cryptographic Access Control Scheme in Cloud Storage Services
    Zhang, Rui
    Chen, PeiShuai
    2012 8TH INTERNATIONAL CONFERENCE ON COMPUTING AND NETWORKING TECHNOLOGY (ICCNT, INC, ICCIS AND ICMIC), 2012, : 50 - 55
  • [28] Toward a decentralized trust-based access control system for dynamic collaboration
    Adams, WJ
    Davis, NJ
    PROCEEDINGS FROM THE SIXTH ANNUAL IEEE SYSTEMS, MAN AND CYBERNETICS INFORMATION ASSURANCE WORKSHOP, 2005, : 317 - 324
  • [29] A Secure and Scalable Group Access Control Scheme for Wireless Sensor Networks
    Vanga Odelu
    Ashok Kumar Das
    Adrijit Goswami
    Wireless Personal Communications, 2015, 85 : 1765 - 1788
  • [30] A decentralized protocol for mobile control access
    J. A. Alvarez Bermejo
    M. A. Lodroman
    J. A. Lopez-Ramos
    The Journal of Supercomputing, 2014, 70 : 709 - 720