Growing numbers of users and many access control policies which involve many different resource attributes in service-oriented environments bring various problems in protecting resource.This paper analyzes the relatio...Growing numbers of users and many access control policies which involve many different resource attributes in service-oriented environments bring various problems in protecting resource.This paper analyzes the relationships of resource attributes to user attributes in all policies, and propose a general attribute and rule based role-based access control(GAR-RBAC) model to meet the security needs. The model can dynamically assign users to roles via rules to meet the need of growing numbers of users. These rules use different attribute expression and permission as a part of authorization constraints, and are defined by analyzing relations of resource attributes to user attributes in many access policies that are defined by the enterprise. The model is a general access control model, and can support many access control policies, and also can be used to wider application for service. The paper also describes how to use the GAR-RBAC model in Web service environments.展开更多
With the number of connected devices increasing rapidly,the access latency issue increases drastically in the edge cloud environment.Massive low time-constrained and data-intensive mobile applications require efficien...With the number of connected devices increasing rapidly,the access latency issue increases drastically in the edge cloud environment.Massive low time-constrained and data-intensive mobile applications require efficient replication strategies to decrease retrieval time.However,the determination of replicas is not reasonable in many previous works,which incurs high response delay.To this end,a correlation-aware replica prefetching(CRP)strategy based on the file correlation principle is proposed,which can prefetch the files with high access probability.The key is to determine and obtain the implicit high-value files effectively,which has a significant impact on the performance of CRP.To achieve the goal of accelerating the acquisition of implicit highvalue files,an access rule management method based on consistent hashing is proposed,and then the storage and query mechanisms for access rules based on adjacency list storage structure are further presented.The theoretical analysis and simulation results corroborate that CRP shortens average response time over 4.8%,improves average hit ratio over 4.2%,reduces transmitting data amount over 8.3%,and maintains replication frequency at a reasonable level when compared to other schemes.展开更多
为应对数字版权管理中恶意发布者的挑战,提出一种可撤销访问控制加密(Revocable Identity-based Access Control Encryption,RACE)方案。RACE结合结构保持签名、非交互式零知识证明和抗碰撞聚合器,通过可净化的身份基广播加密,确保合法...为应对数字版权管理中恶意发布者的挑战,提出一种可撤销访问控制加密(Revocable Identity-based Access Control Encryption,RACE)方案。RACE结合结构保持签名、非交互式零知识证明和抗碰撞聚合器,通过可净化的身份基广播加密,确保合法发送方传输的密文经净化器处理后与原始密文格式一致。同时,引入撤销机制,通过更新密钥实现用户撤销与密文更新以增强系统的安全性。安全性分析表明,RACE满足“无读”和“无写”规则的安全要求。性能分析表明,RACE在增加安全功能的同时,实现了较低的计算和通信开销,其中解密阶段的计算开销较现有高效方案降低约12%,性能表现良好。展开更多
基金The National Natural Science Foundation of China(No60402019No60672068)
文摘Growing numbers of users and many access control policies which involve many different resource attributes in service-oriented environments bring various problems in protecting resource.This paper analyzes the relationships of resource attributes to user attributes in all policies, and propose a general attribute and rule based role-based access control(GAR-RBAC) model to meet the security needs. The model can dynamically assign users to roles via rules to meet the need of growing numbers of users. These rules use different attribute expression and permission as a part of authorization constraints, and are defined by analyzing relations of resource attributes to user attributes in many access policies that are defined by the enterprise. The model is a general access control model, and can support many access control policies, and also can be used to wider application for service. The paper also describes how to use the GAR-RBAC model in Web service environments.
基金the National Natural Science Foundation of China(No.61602525,No.61572525)the Research Foundation of Education Bureau of Hunan Province of China(No.19C1391)the Natural Science Foundation of Hunan Province of China(No.2020JJ5775)。
文摘With the number of connected devices increasing rapidly,the access latency issue increases drastically in the edge cloud environment.Massive low time-constrained and data-intensive mobile applications require efficient replication strategies to decrease retrieval time.However,the determination of replicas is not reasonable in many previous works,which incurs high response delay.To this end,a correlation-aware replica prefetching(CRP)strategy based on the file correlation principle is proposed,which can prefetch the files with high access probability.The key is to determine and obtain the implicit high-value files effectively,which has a significant impact on the performance of CRP.To achieve the goal of accelerating the acquisition of implicit highvalue files,an access rule management method based on consistent hashing is proposed,and then the storage and query mechanisms for access rules based on adjacency list storage structure are further presented.The theoretical analysis and simulation results corroborate that CRP shortens average response time over 4.8%,improves average hit ratio over 4.2%,reduces transmitting data amount over 8.3%,and maintains replication frequency at a reasonable level when compared to other schemes.
文摘为应对数字版权管理中恶意发布者的挑战,提出一种可撤销访问控制加密(Revocable Identity-based Access Control Encryption,RACE)方案。RACE结合结构保持签名、非交互式零知识证明和抗碰撞聚合器,通过可净化的身份基广播加密,确保合法发送方传输的密文经净化器处理后与原始密文格式一致。同时,引入撤销机制,通过更新密钥实现用户撤销与密文更新以增强系统的安全性。安全性分析表明,RACE满足“无读”和“无写”规则的安全要求。性能分析表明,RACE在增加安全功能的同时,实现了较低的计算和通信开销,其中解密阶段的计算开销较现有高效方案降低约12%,性能表现良好。