Data Is Key: Introducing the Data-Based Access Control Paradigm

被引:0
|
作者
Pieters, Wolter [1 ]
Tang, Qiang [1 ]
机构
[1] Univ Twente, Faulty Elect Engn Math & Comp Sci, NL-7500 AE Enschede, Netherlands
关键词
data-based access control; de-perimeterisation; secure sketches; secret sharing; GENERATE STRONG KEYS; FUZZY EXTRACTORS; BIOMETRICS;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
According to the Jericho forum, the trend in information security is moving the security perimeter as close to the data as possible. In this context, we suggest the idea of data-based access control, where decryption of data is made possible by knowing enough of the data. Trust is thus based on what someone already knows. A specific problem is defined as follows: given n pieces of data, an agent is able to recover all n items once she knows k of them. The problem is similar to both secure sketches and secret sharing, and we show that both can be used as a basis for constructions. Examples of possible applications are granting, access without credentials, recovering forgotten passwords and sharing personal data in social networks.
引用
收藏
页码:240 / 251
页数:12
相关论文
共 50 条
  • [41] Data-Based Control and Process Monitoring with Industrial Applications
    Yin, Shen
    Gao, Huijun
    Ding, Steven
    Wang, Zhuo
    IET CONTROL THEORY AND APPLICATIONS, 2015, 9 (07): : 997 - 999
  • [42] Data-Based Robust Control for Unknown Nonlinear Systems
    Yang Xiong
    Liu Derong
    Wei Qinglai
    PROCEEDINGS OF THE 35TH CHINESE CONTROL CONFERENCE 2016, 2016, : 3123 - 3128
  • [43] Beyond Broadband Access: Developing Data-based Information Policy Strategies
    McDonough, Carol
    TELECOMMUNICATIONS POLICY, 2015, 39 (02) : 157 - 158
  • [44] Data-Based Statistical Models of Data Networks
    Kuleshov, Alexander
    Bernstein, Alexander
    Agalakov, Yury
    2015 IEEE 14TH INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND APPLICATIONS (ICMLA), 2015, : 433 - 438
  • [45] Intelligent Control of Micro Grid: A Big Data-Based Control Center
    Liu, Lu
    Wang, Yanping
    Liu, Li
    Wang, Zhiseng
    2017 3RD INTERNATIONAL CONFERENCE ON ENVIRONMENTAL SCIENCE AND MATERIAL APPLICATION (ESMA2017), VOLS 1-4, 2018, 108
  • [46] Data categorization for data-based business models
    Schmidt S.
    Martin A.J.
    Bauernhansl T.
    WT Werkstattstechnik, 2022, 112 (7-8): : 501 - 505
  • [47] Blockchain-Based Data Access Control and Key Agreement System in IoT Environment
    Lee, JoonYoung
    Kim, MyeongHyun
    Park, KiSung
    Noh, SungKee
    Bisht, Abhishek
    Das, Ashok Kumar
    Park, Youngho
    SENSORS, 2023, 23 (11)
  • [48] A BP -based Key Management Protocol for Data Sharing on Cloud Storage with Access Control
    Abi-Char, Pierre E.
    2022 45TH INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS AND SIGNAL PROCESSING, TSP, 2022, : 132 - 138
  • [49] Key-aggregate based access control encryption for flexible cloud data sharing
    Liu, Jinlu
    Qin, Jing
    Wang, Wenchao
    Mei, Lin
    Wang, Huaxiong
    COMPUTER STANDARDS & INTERFACES, 2024, 88
  • [50] Access to AOA data is key
    Fitzpatrick, S
    AVIATION WEEK & SPACE TECHNOLOGY, 1996, 144 (20): : 6 - 6