首页 | 本学科首页   官方微博 | 高级检索  
     

ITTDAF:不依赖父权限信息传递的去中心化授权框架
作者姓名:罗期丰  石瑞生
作者单位:北京邮电大学 网络空间安全学院 北京 中国 100876
基金项目:本课题得到国家重点研发计划项目(No.2020YFB1005500),北京市自然科学基金项目(No.M21037),广东省重点研发计划项目(No.2019B010137003),北京市自然科学基金项目(No.M21034)资助。
摘    要:为了解决现有去中心化授权协议在支持传递权限时需要传递父权限信息从而容易导致权限信息泄露的问题以及单个用户信息泄露会威胁到其他用户权限的机密性的问题,本文提出了基于检索树结构和可信平台模块的去中心化授权框架ITTDAF,其核心思想是用户在授予其他用户权限时,需要将授权信息告知提供相关资源的实体,由资源实体基于授权信息生成...

关 键 词:加密与解密  访问控制  去中心化授权  可传递授权  可信平台模块(TPM)
收稿时间:2021/10/26 0:00:00
修稿时间:2022/1/8 0:00:00

ITTDAF:Decentralized Authorization Framework That Does Not Rely on The Transmission of Parent Permission Information
Authors:LUO Qifeng  SHI Ruisheng
Affiliation:School of Cyberspace Security, Beijing University of Posts and Telecommunications, Beijing 100876, China
Abstract:To solve the problem that the existing decentralized authorization protocols need to transmit the parent permis-sion information when one user transmits permissions to the other user,which is easy to cause the permission information leakage and threaten the confidentiality of other users’permission information,this paper proposes a decentralized autho-rization framework ITTDAF(Index Tree&TPM based Decentralized Authorization Framework)based on index tree struc-ture and trusted platform module.The core idea is that when one user authorizes permission to other users,the authorizing user needs to send the authorization information to the entities which providing relevant resources.The resource entity generates an index tree structure based on the authorization information sent by authorization user to know the transmis-sion relationship of permissions between users.When one user requests resources from a resource entity,the user only needs to provide his own permission information to the resource entity to prove the validity of its permission and does not need to know any of the parent permission information.The permission information does not contain the relevant informa-tion of the parent permission,so as to avoid the damage of the permission information leakage to the confidentiality of the permission information of other users.This decreases the amount of data that needs to be transmitted and time consume of permission validation made by resource entity.All information is signed by the user device’s trusted platform module to ensure the source of data is from user and realize the binding between permission and device to let the permission can’t be execute on other user’s device.Compared with the comparison scheme,under the same conditions,the scheme proposed in this paper reduces the amount of data required to describe permissions by 44.2%and the time required for permission veri-fication by 51.2%.It not only has higher security,but also has better availability.
Keywords:encryption and decryption  access control  decentralized authorization  delegate authorization  trusted platform module(TPM)
本文献已被 维普 等数据库收录!
点击此处可从《》浏览原始摘要信息
点击此处可从《》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号