Publication:
Comprehensive evaluation of key management hierarchies for outsourced data

dc.contributor.affiliationDA-IICT, Gandhinagar
dc.contributor.authorKumar, Naveen
dc.contributor.authorMathuria, Anish
dc.contributor.authorMathuria, Anish
dc.contributor.authorMathuria, Anish
dc.contributor.authorMathuria, Anish
dc.contributor.authorMathuria, Anish
dc.contributor.authorMathuria, Anish
dc.date.accessioned2025-08-01T13:09:17Z
dc.date.issued01-12-2019
dc.description.abstractKey management is an essential component of a cryptographic access control system with a large number of resources. It manages the secret keys assigned to the system entities in such a way that only authorized users can access a resource. Read access control allows read access of a resource by the authorized users and disallows others. An important objective of a key management is to reduce the secret key storage with each authorized user. To this end, there exist two prominent types of key management hierarchy with single key storage per user used for read access control in data outsourcing scenario: user-based and resource-based. In this work, we analyze the two types of hierarchy with respect to static hierarchy characteristics and dynamic operations such as adding or revoking user authorization. Our analysis shows that the resource-based hierarchies can be a better candidate which is not given equal emphasis in the literature. A new heuristic for minimizing the key management hierarchy is introduced that makes it practical in use even for a large number of users and resources. The performance evaluation of dynamic operations such as adding or revoking a user�s read subscription is shown experimentally to support our analytical results.
dc.format.extent1-17
dc.identifier.citationKumar, Naveen, and Mathuria, Anish"Comprehensive evaluation of key management hierarchies for outsourced data," Cybersecurity, vol. 2, no. 2, Dec. 2019, pp. 1-17, Springer. Doi: 10.1186/s42400-019-0026-y | PDF
dc.identifier.doi10.1186/s42400-019-0026-y
dc.identifier.issn2523-3246
dc.identifier.scopus2-s2.0-85089698997
dc.identifier.urihttps://ir.daiict.ac.in/handle/dau.ir/1798
dc.language.isoen
dc.publisherSpringer
dc.relation.ispartofseriesVol. 2; No. 2
dc.source Cybersecurity
dc.source.urihttps://cybersecurity.springeropen.com/articles/10.1186/s42400-019-0026-y
dc.titleComprehensive evaluation of key management hierarchies for outsourced data
dspace.entity.typePublication
relation.isAuthorOfPublication078fff3e-c9c9-46b3-b171-66587e178807
relation.isAuthorOfPublication078fff3e-c9c9-46b3-b171-66587e178807
relation.isAuthorOfPublication.latestForDiscovery078fff3e-c9c9-46b3-b171-66587e178807

Files

Collections