Fig 1 - uploaded by Miraz Uz Zaman
Content may be subject to copyright.
Some techniques for hierarchical access control

Some techniques for hierarchical access control

Contexts in source publication

Context 1
... on a number of publicly known one way functions, a HAC scheme has been proposed in [1]. In this scheme the key of each node is the encryption of its name using its parent node's key (an arbitrary key is assigned to the root node) as shown in Figure 1, for example E k (Name1) is the encryption of the node name (Name1) using the key k. Similarly, another HAC scheme has been proposed using a number of publicly known hash functions in [2] as shown in Figure 1. ...
Context 2
... this scheme the key of each node is the encryption of its name using its parent node's key (an arbitrary key is assigned to the root node) as shown in Figure 1, for example E k (Name1) is the encryption of the node name (Name1) using the key k. Similarly, another HAC scheme has been proposed using a number of publicly known hash functions in [2] as shown in Figure 1. But again there is an issue with the increasing size of the hierarchy structure since the number of publicly known one-way hash functions also needs to increase. ...
Context 3
... proposed a collision-free key assignment scheme for HAC in [3]. In this scheme, the horizontal access is controlled by the single hash chains and the vertical access is controlled by the recursive hash chains started from an arbitrary key as shown in Figure 1. ...

Similar publications

Preprint
Full-text available
The Galois hulls of linear codes are a generalization of the Euclidean and Hermitian hulls of linear codes. In this paper, we study the Galois hulls of (extended) GRS codes and present several new constructions of MDS codes with Galois hulls of arbitrary dimensions via (extended) GRS codes. Two general methods of constructing MDS codes with Galois...

Citations

... When it comes time for a secure, immutable, and trustless network, blockchain is poised to fill the gap. Healthcare is another business that has a direct impact on the lives of individuals [9]. Until now, little attention has been devoted to and little research has been done to combine and connect these three technological domains. ...
... A comparison between the [3,6,9] method and the hash family described here is made in terms of speed and output length. The simulation can only be run on computers that meet the specifications specified below. ...
Conference Paper
Full-text available
Health care is one of the many fields where blockchain technology is being put to use in new and creative ways. When it comes to the medical industry, blockchain technology is being utilised to store and share patient data across healthcare organisations. It is possible to discover severe errors in the medical field using blockchain technology, which may even be potentially lethal. As a result, medical data interchange may become more efficient, secure, and transparent. Medical facilities may acquire insight and improve their analysis of patient data with the help of this technology. Using blockchain technology, we show how IoT devices in the healthcare industry might be more secure.The development of a novel hash function is based on the Unpredictability principle. Given that the IoT has constrained resources and power, we employed an S-box of AES-256 with an XOR operator. We also created a collision-proof, lightweight, and fast hash function. The outcomes of the suggested hash functions are as follows: (256, 384, and 512).
... When it comes time for a secure, immutable, and trustless network, blockchain is poised to fill the gap. Healthcare is another business that has a direct impact on the lives of individuals [9]. Until now, little attention has been devoted to and little research has been done to combine and connect these three technological domains. ...
... A comparison between the [3,6,9] method and the hash family described here is made in terms of speed and output length. The simulation can only be run on computers that meet the specifications specified below. ...
Conference Paper
Full-text available
Health care is one of the many fields where blockchain technology is being put to use in new and creative ways. When it comes to the medical industry, blockchain technology is being utilised to store and share patient data across healthcare organisations. It is possible to discover severe errors in the medical field using blockchain technology, which may even be potentially lethal. As a result, medical data interchange may become more efficient, secure, and transparent. Medical facilities may acquire insight and improve their analysis of patient data with the help of this technology. Using blockchain technology, we show how IoT devices in the healthcare industry might be more secure. The development of a novel hash function is based on the Unpredictability principle. Given that the IoT has constrained resources and power, we employed an S-box of AES-256 with an XOR operator. We also created a collision-proof, lightweight, and fast hash function. The outcomes of the suggested hash functions are as follows: (256, 384, and 512).
... 1. attaching monitoring data to program code [10]; 2. storage of monitoring data together with the program code in memory or in file system [11]; 3. storage of monitoring data in a remote database (monitoring data are requested from the database at the time of monitoring) [12]. All three of the above approaches to storing monitoring data make open the fact of the availability of monitoring data and the fact that monitoring is performed [13,14]. ...
... They also often intersect with smart-card based technology [32] rather than being applied independently in a widely deployable manner for evolution of current paradigms. Various methods which have adopted hash-chains exist, including [33][34][35]. These proposals have largely implemented hash-chains for the purpose of producing one-time passwords as described above and detailed in [33], or for helping facilitate secure methods of peer-to-peer communication outside of centrally signed authorities [35]. ...
... They provided reasonable resilience to eavesdropping, impersonation, and interception, as well as somewhat eased deployment, but both suffered from only providing one way authentication, and Bicakci's protocol suffered from high computational complexity as well [33]. High computational complexity is an issue with many hash-chain protocols; studies such as [34] have attempted to fix this but have not found much wider implementation. The scheme described within [35] stands as another contrast to the protocols described within [33]. ...
Article
Full-text available
A significant percentage of security research that is conducted suffers from common issues that prevent wide-scale adoption. Common snags of such proposed methods tend to include (i) introduction of additional nodes within the communication architecture, breaking the simplicity of the typical client–server model, or fundamental restructuring of the Internet ecosystem; (ii) significant inflation of responsibilities or duties for the user and/or server operator; and (iii) adding increased risks surrounding sensitive data during the authentication process. Many schemes seek to prevent brute-forcing attacks; they often ignore either partially or holistically the dangers of other cyber-attacks such as MiTM or replay attacks. Therefore, there is no incentive to implement such proposals, and it has become the norm instead to inflate current username/password authentication systems. These have remained standard within client–server authentication paradigms, despite insecurities stemming from poor user and server operator practices, and vulnerabilities to interception and masquerades. Besides these vulnerabilities, systems which revolve around secure authentication typically present exploits of two categories; either pitfalls which allow MiTM or replay attacks due to transmitting data for authentication constantly, or the storage of sensitive information leading to highly specific methods of data storage or facilitation, increasing chances of human error. This paper proposes a more secure method of authentication that retains the current structure of accepted paradigms, but minimizes vulnerabilities which result from the process, and does not inflate responsibilities for users or server operators. The proposed scheme uses a hybrid, layered encryption technique alongside a two-part verification process, and provides dynamic protection against interception-based cyber-attacks such as replay or MiTM attacks, without creating additional vulnerabilities for other attacks such as bruteforcing. Results show the proposed mechanism outperforms not only standardized methods, but also other schemes in terms of deployability, exploit resilience, and speed.
Chapter
With a population of around 136 crores, India is one of the world’s largest developing nations. According to the Ministry of Housing and Urban Affairs, it is also one of the largest producers of solid waste, generating around 150,000 tons per day. The main problem lies with the management of the generated waste efficiency. Although the government has taken up several measures to ensure proper waste management techniques, most of them have not given the desired outputs. IoT (Internet of Things), being called one of the dominant infrastructure in the technological domain, has dynamic characteristics such as interoperability, scalability, self-configuring, and unique identity in the connected network. On the other hand, QR codes are machine-readable barcodes that contain an authenticated specific code that provides the tracking and routing information for the IoT enabled devices in the connected network. On applying the request-response communication model, the scanned QR data can be exchanged with the connected devices in the network. They can also be communicated with the centralised cloud server. Confidentiality, integrity, and Authenticity (CIA) can be integrated with the QR code using the Hash chaining principle.