Earticle

현재 위치 Home

Data Access Privilege Management with a Revocation Period in a Cloud Environment

첫 페이지 보기
  • 발행기관
    보안공학연구지원센터(IJSEIA) 바로가기
  • 간행물
    International Journal of Software Engineering and Its Applications SCOPUS 바로가기
  • 통권
    Vol.10 No.7 (2016.07)바로가기
  • 페이지
    pp.127-134
  • 저자
    You-Jin Song
  • 언어
    영어(ENG)
  • URL
    https://www.earticle.net/Article/A281777

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

원문정보

초록

영어
Revocation of a private key is an indispensable factor if user-operation aspects, such as an information management system in a cloud computing environment, are considered. Although there is a public key infrastructure (PKI)-based certificate revocation list in the private key revocation function, the revocation function of a PKI cannot be applied to functional encryption as it is. The cloud environment has limitations, such as no smooth access privilege change, and re-allocation that uses the existing proxy re-encryption. To solve the problem, functional encryption that is suitable for the cloud used as external storage, and for which revocation is possible, was proposed. This study proposes medical data management based on functional encryption that can restrict access privileges to the users concerned, if data access privileges stored within a health cloud are terminated. If many users exist in the health cloud environment, communications volume and computation requirements are expected to increase enormously due to the packet processing load of a trusted third party. Therefore, a revocation function is executed by postponing the revocation function for a certain period of time (D) for efficient retention and management of a revocation list, and by increasing key numbers when a specific time arrives. A system and protocol must be configured in which the first ciphertext is converted into a secondary ciphertext so that the revocation of access privileges to data stored in the health cloud server can be made, and a user whose access privileges were revoked cannot conduct secondary decryption.

목차

Abstract
 1. Introduction
 2. Related Works
 3. System Configuration
  3.1. Setup
  3.2. KeyGen
  3.3. Enc
  3.4. Dec
 4. Results and Discussion
 5. Conclusion
 Acknowledgments
 References

키워드

Functional Encryption Revocation Access Privilege Management

저자

  • You-Jin Song [ Department of Management, Dongguk University ]

참고문헌

자료제공 : 네이버학술정보

간행물 정보

발행기관

  • 발행기관명
    보안공학연구지원센터(IJSEIA) [Science & Engineering Research Support Center, Republic of Korea(IJSEIA)]
  • 설립연도
    2006
  • 분야
    공학>컴퓨터학
  • 소개
    1. 보안공학에 대한 각종 조사 및 연구 2. 보안공학에 대한 응용기술 연구 및 발표 3. 보안공학에 관한 각종 학술 발표회 및 전시회 개최 4. 보안공학 기술의 상호 협조 및 정보교환 5. 보안공학에 관한 표준화 사업 및 규격의 제정 6. 보안공학에 관한 산학연 협동의 증진 7. 국제적 학술 교류 및 기술 협력 8. 보안공학에 관한 논문지 발간 9. 기타 본 회 목적 달성에 필요한 사업

간행물

  • 간행물명
    International Journal of Software Engineering and Its Applications
  • 간기
    월간
  • pISSN
    1738-9984
  • 수록기간
    2008~2016
  • 등재여부
    SCOPUS
  • 십진분류
    KDC 505 DDC 605

이 권호 내 다른 논문 / International Journal of Software Engineering and Its Applications Vol.10 No.7

    피인용수 : 0(자료제공 : 네이버학술정보)

    함께 이용한 논문 이 논문을 다운로드한 분들이 이용한 다른 논문입니다.

      페이지 저장