Scalable Data Access Control in RFID-Enabled Supply Chain

被引:10
|
作者
Qi, Saiyu [1 ,2 ]
Zheng, Yuanqing [2 ]
Li, Mo [2 ]
Liu, Yunhao [3 ]
Qiu, Jinli [4 ]
机构
[1] Hong Kong Univ Sci & Technol, Dept Comp Sci & Engn, Hong Kong, Hong Kong, Peoples R China
[2] Nanyang Technol Univ, Sch Comp Engn, Singapore, Singapore
[3] Tsinghua Univ, Sch Software, TNLIST, Beijing, Peoples R China
[4] Xi An Jiao Tong Univ, Dept Comp Sci & Technol, Xian, Shaanxi, Peoples R China
来源
2014 IEEE 22ND INTERNATIONAL CONFERENCE ON NETWORK PROTOCOLS (ICNP) | 2014年
关键词
D O I
10.1109/ICNP.2014.28
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
By attaching RFID tags to products, supply chain participants can identify products and create product data to record the product particulars in transit. Participants along the supply chain share their product data to enable information exchange and support critical decisions in production operations. Such an information sharing essentially requires a data access control mechanism when the product data relates to sensitive business issues. However, existing access control solutions are ill-suited to the RFID-enabled supply chain, as they are not scalable in handling a huge number of tags, introduce vulnerability to the product data, and performs poorly to support privilege revocation of product data. We present a new scalable data access control system that addresses these limitations. Our system provides an item-level data access control mechanism that defines and enforces access policies based on both the participants' role attribute and the products' RFID tag attribute. Our system further provides an item-level privilege revocation mechanism by allowing the participants to delegate encryption updates in revocation operation without disclosing the underlying data contents. We design a new updatable encryption scheme and integrate it with Ciphertext Policy-Attribute Based Encryption (CP-ABE) to implement the key components of our system.
引用
收藏
页码:71 / 82
页数:12
相关论文
共 50 条
  • [1] Scalable Industry Data Access Control in RFID-Enabled Supply Chain
    Qi, Saiyu
    Zheng, Yuanqing
    Li, Mo
    Liu, Yunhao
    Qiu, Jinli
    IEEE-ACM TRANSACTIONS ON NETWORKING, 2016, 24 (06) : 3551 - 3564
  • [2] Practical access control management for outsourced EPC-related data in RFID-enabled supply chain
    Evdokimov, Sergei
    Guenther, Oliver
    ICEBE 2007: IEEE INTERNATIONAL CONFERENCE ON E-BUSINESS ENGINEERING, PROCEEDINGS, 2007, : 331 - 336
  • [3] Semantic access control model for RFID-enabled supply chains
    Li Z.
    Chu C.-H.
    Yao W.
    Cryptology and Information Security Series, 2010, 4 : 95 - 108
  • [4] RFID-enabled traceability in the food supply chain
    Kelepouris, Thomas
    Pramatari, Katerina
    Doukidis, Georgios
    INDUSTRIAL MANAGEMENT & DATA SYSTEMS, 2007, 107 (1-2) : 183 - 200
  • [5] ENHANCING SECURITY OF RFID-ENABLED IOT SUPPLY CHAIN
    Turksonmez, Halit
    Ozcanhan, Mehmet Hilal
    MALAYSIAN JOURNAL OF COMPUTER SCIENCE, 2023, 36 (03)
  • [6] Trust in RFID-enabled supply-chain management
    Mahinderjit-Singh M.
    Li X.
    International Journal of Security and Networks, 2010, 5 (2-3) : 96 - 105
  • [7] Batch Clone Detection in RFID-Enabled Supply Chain
    Shi, Jie
    Kywe, Su Mon
    Li, Yingjiu
    2014 IEEE INTERNATIONAL CONFERENCE ON RFID (IEEE RFID), 2014, : 118 - 125
  • [8] Tamper detection for ubiquitous RFID-enabled supply chain
    Potdar, V
    Wu, C
    Chang, E
    COMPUTATIONAL INTELLIGENCE AND SECURITY, PT 2, PROCEEDINGS, 2005, 3802 : 273 - 278
  • [9] RFID-enabled supply chain systems with computer simulation
    Mehijerdi, Yahia Zare
    ASSEMBLY AUTOMATION, 2009, 29 (02) : 174 - 183
  • [10] Effective Tracking and Tracing in RFID-enabled Supply Chain Networks
    Fu, Ge
    Shen, Shijun
    Zhao, Li
    Liu, Qian
    Li, Wenda
    PROCEEDINGS 2013 INTERNATIONAL CONFERENCE ON MECHATRONIC SCIENCES, ELECTRIC ENGINEERING AND COMPUTER (MEC), 2013, : 2310 - 2315