Multi-User Access Control Scheme Based on Resources Hierarchies for Perceptual Layer of IoT
MA Jun1,2, GUO Yuan-bo2, MA Jian-feng1,3, LIU Xi-meng1, LI Qi1
1. School of Computer Science and Technology, Xidian University, Xi'an, Shaanxi 710071, China;
2. PLA Information Engineering University, Zhengzhou, Henan 450004, China;
3. Shaanxi Key Laboratory of Network and System Security, Xidian University, Xi'an, Shaanxi 710071, China
Abstract:A novel hierarchical access control scheme for perceptual layer of the IoT is presented based on resources hierarchies,which could conform to the secure and efficient access requirement of multi-user.In the scheme,every hierarchical node is composed of perceptual nodes which provide resources with the same levels of security.More hierarchical nodes can be modeled as a set of partially ordered classes.With this mode,a deterministic key derivation algorithm is designed,which makes every user and perceptual node possesses a single key material to get some keys,and obtains the resources at the presented class and all descendant classes in the hierarchy.Furthermore,a mechanism of Merkle tree is introduced to guarantee secure and efficient multi-user key material derivation by independent of each hash link.Compared with previous proposals,the scheme is more suitable for multi-user to access resources of perceptual layer in IoT.
马骏, 郭渊博, 马建峰, 刘西蒙, 李琦. 物联网感知层基于资源分层的多用户访问控制方案[J]. 电子学报, 2014, 42(1): 28-35.
MA Jun, GUO Yuan-bo, MA Jian-feng, LIU Xi-meng, LI Qi. Multi-User Access Control Scheme Based on Resources Hierarchies for Perceptual Layer of IoT. Chinese Journal of Electronics, 2014, 42(1): 28-35.
[1] 工业和信息化部.物联网"十二五"发展规划[EB/OL].http://www.gov.cn/zwgk/2012-02/14/content-2065999.htm.[2012-02-14].[2] M Tuters,K Varnelis.Beyond locative media:Giving shape to the internet of things [J].Leonardo,2006,39(4):357-363.[3] 孙其博,刘杰,等.物联网:概念、架构与关键技术研究综述[J].2010,33(3):1-9. SUN Qibo,LIU Jie,et al.Internet of things:Summarize on concepts,architecture and key technology problem[J].Journal of Beijing University of Posts and Telecommunications,2010,33(3):1-9.(in Chinese)[4] 吴振强,周彦伟,马建峰.物联网安全传输模型[J].计算机学报,2011,34(8):1351-1364. Wu Zhenqiang,Zhou Yanwei,Ma Jianfeng.A securitytransmission model for internet of things [J].Chinese Journal of Computers,2011,34(8):1351-1364.(in Chinese)[5] N Gershenfeld,R Krikorian,D Cohen.The internet of things[J].Scientific American,2004,291(4):76-81.[6] Ashton K.That 'internet of things’ thing[J].RFID Journal,2009:97-114.[7] L Atzori,A Iera,G Morabito.The internet of things:A survey[J].Computer Networks,2010,54(15):2787-2805.[8] S Akl,P Taylor.Cryptographic solution to a problem of access control in a hierarchy[J].ACM Transactions on Computer Systems,1983,1(3):239-248.[9] A De Santis,A Ferrara,B Masucci.Cryptographic key assignment schemes for any access control policy[J].Information Processing Letters (IPL),2004,92(4):199-205.[10] ElGamal T.A public key cryptosystem and a signature scheme based on discrete logarithms [A].Advances in Cryptology [C].Berlin Heidelberg:Springer,1985.10-18.[11] 阎军智,李凤华,马建峰.基于Diffie Hellman算法的分层密钥分配方案[J].电子学报,2011,39(1):119-123. Yan Junzhi,Li Fenghua,Ma Jianfeng.Ahierarchical key assignment scheme based on diffie-hellman algorithm[J].Acta Electronica Sinica,2011,39(1):119-123.(in Chinese)[12] M Hwang,W Yang.Controlling access in large partially ordered hierarchies using cryptographic keys[J].Journal of Systems and Software,2003,67(2):99-107.[13] 姬东耀,张福泰,王育民.多级安全系统中访问控制新方案[J].计算机研究与发展,2001,38(6):715-720. JI Dongyao,ZHANG Futai,WANG Yumin.Anew scheme for access control in multilevel security system[J].Journal of Computer Research & Development,2001,38(6):715-720.(in Chinese)[14] 李凤华,王巍,马建峰.适用于传感器网络的分级群组密钥管理[J].电子学报,2008,36(12):2405-2411. LI Fenghua,WANG Wei,MA Jianfeng.Leveled group key management for wireless sensor networks[J].Acta Electronica Sinica,2008,36(12):2405-2411.(in Chinese)[15] S Y Wang,C S Laih.Cryptanalysis of Hwang-Yang scheme for controlling access in large partially ordered hierarchies[J].Journal of Systems and Software,2005,75(1-2):189-192.[16] Chen T S,Huang J Y.A novel key management scheme for dynamic access control in a user hierarchy[J].Applied Mathematics and Computation,2005,162(1):339-351.[17] Hwang M S,Yang W P.Controlling access in large partially ordered hierarchies using cryptographic keys[J].Journal of Systems and Software,2003,67(2):99-107.[18] Chien H Y,Jan J K.New hierarchical assignment without public key cryptography .Computers & Security,2003,22(6):523-526.[19] Sorniotti A,Molva R,Gomez L,et al.Efficient access control for wireless sensor data[J].International Journal of Wireless Information Networks,2009,16(3):165-174.[20] Zou X,Ramamurthy B,Magliveras S S.Chinese remainder theorem based hierarchical access control for secure group communication [A].Proceedings of the Third International Conference Information and Communications Security [C].London,UK:Springer,2001.381-385.[21] Gudes E.The design of a cryptography based secure file system[J].IEEE Transactions on Software Engineering,1980,SE-6(5):411-420.[22] Atallah M J,et al.Incorporating temporal capabilities in existing key management schemes [A].Proceedings of the 12th European Symposium on Research in Computer Security [C].Berlin Heidelberg:Springer,2007.515-530.[23] De Santis A,Ferrara A L,Masucci B.Efficient Provably-secure Hierarchical Key Assignment Schemes[M].Berlin Heidelberg:Springer,2007.371-382.[24] Sa ndhu R,Coyne E,Feinstein H,et al.Role-based access control models[J].IEEE Computer,1996,29(2):38-47.[25] Martínez-García C,Navarro-Arribas G,Borrell J.Fuzzy role-based access control[J].Iformation Processing Letters,2011,111(10):483-487.[26] Goyal V,PandeyO,et al.Attribute-based encryption for fine-grained access control of encrypted data [A].Proceedings of the 13th ACM Conference on Computer and Communications Security [C].Alexandria,Virginia,USA:ACM,2006.89-98.[27] XIONG Jin-bo1,YAO Zhi-qiang,MA Jian-feng1,et al.Multilevel access control model for video database[J].Journal on Communications,2012,33(8):147-154.[28] Waters B.Ciphertext-policy attribute-based encryption:An expressive,efficient,and provably secure realization [A].Proceedings of Public Key Cryptography-PKC [C].Taormina,Italy:Springer,2011.53-70.[29] Goldreich O,et al.How to construct random functions[J].Journal of the ACM,1986,33(4):792-807.[30] Mrkle R C.A certified digital signature [A].Proceedings of Advances in Cryptology—CRYPTO [C].New York:Springer,1990.218-238.[31] Jakobsson M,Leighton T,et al.Fractal merkle tree representation and traversal [A].Proceedings of Topics in Cryptology—CT-RSA [C].Berlin Heidelberg:Springer,2003.314-326.[32] Atallah M J,Frikken K B,Blanton M.Dynamic and efficient key management for access hierarchies [A].Proceedings of the 12th ACM Conference on Computer and Communications Security [C].NY,USA:ACM,2005.190-202.