• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Ma Jun, Guo Yuanbo, Ma Jianfeng, Zhang Qi. A Time-Bound Hierarchical Access Control Scheme for Ubiquitous Sensing Network[J]. Journal of Computer Research and Development, 2017, 54(2): 328-337. DOI: 10.7544/issn1000-1239.2017.20150925
Citation: Ma Jun, Guo Yuanbo, Ma Jianfeng, Zhang Qi. A Time-Bound Hierarchical Access Control Scheme for Ubiquitous Sensing Network[J]. Journal of Computer Research and Development, 2017, 54(2): 328-337. DOI: 10.7544/issn1000-1239.2017.20150925

A Time-Bound Hierarchical Access Control Scheme for Ubiquitous Sensing Network

More Information
  • Published Date: January 31, 2017
  • In order to realize an effective access control of sensitive data captured by sensor nodes, researchers have made great achievements on secure and efficient hierarchical access control to satisfy the features of widespread distribution, large universe, limited computation and storage capacity of sensor nodes in ubiquitous sensing network. However, time is the main factor that makes the requirements of hierarchical access control scheme in ubiquitous sensing network different from that in traditional Internet networks, leading to the limited actual application scenario. According to the users' requirement on the nodes for gathering resources, an efficient and secure time-bound hierarchical access control scheme is presented in this paper. Based on the characteristics of perception node in ubiquitous sensing network, including the limited power and computation capability, as well as the storage resource, the scheme optimizes the key storage of user, key derivation time, and public information. The advantages of our scheme include that 1) only one key material is required in each users'access; 2) the balance can be achieved between the time for key acquisition and the amount of public information and 3) the scheme is provably secure without random oracle model. Theoretical analysis indicates that our proposed schedule adapts to user' access control requirement of ubiquitous sensing network.
  • Related Articles

    [1]Li Xi, Hu Zhigang, Hu Zhoujun, Yan Chaokun. Grid Workflow Scheduling Algorithm Based on Deadline Satisfaction[J]. Journal of Computer Research and Development, 2011, 48(5): 877-884.
    [2]Han Rui, Liu Yingbo, Wen Lijie, and Wang Jianmin. A Probabilistic Approach to Analyze and Adjust Time Constraints in Workflow Management System[J]. Journal of Computer Research and Development, 2010, 47(1): 157-163.
    [3]Yuan Yingchun, Li Xiaoping, Wang Qian, Wang Kejian. Time Optimization Heuristics for Scheduling Budget-Constrained Grid Workflows[J]. Journal of Computer Research and Development, 2009, 46(2): 194-201.
    [4]Liu Daobin, Guo Li, and Bai Shuo. A Methodology for Analyzing Security Policy in Workflow[J]. Journal of Computer Research and Development, 2008, 45(6).
    [5]Tu Bibo, Hong Xuehai, Zhan Jianfeng, Fan Jianping. Workflow-Based User Environment for High Performance Computing[J]. Journal of Computer Research and Development, 2007, 44(10): 1717-1723.
    [6]Xiao Zhengjin, He Qinming, and Chen Qi. A Multilevel Model of Task Assignment in Fuzzy Situations of Workflow[J]. Journal of Computer Research and Development, 2007, 44(2): 302-309.
    [7]Xing Guanglin and Hong Fan. A Workflow Authorization Model Based on Role and Task and Constraints Specification[J]. Journal of Computer Research and Development, 2005, 42(11): 1946-1953.
    [8]Xu Wei, Wei Jun, Li Jing. A Service-Oriented Workflow Access Control Model[J]. Journal of Computer Research and Development, 2005, 42(8): 1369-1375.
    [9]Jiang Hao and Dong Yisheng. A Time Performance Evaluation Method for Workflow Based on Extended Timed Petri Net[J]. Journal of Computer Research and Development, 2005, 42(5): 849-855.
    [10]Zhao Zhikun, Sheng Qiujian, Shi Zhongzhi. An Execution Semantics of UML Activity View for Workflow Modeling[J]. Journal of Computer Research and Development, 2005, 42(2): 300-307.

Catalog

    Article views (1013) PDF downloads (559) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return