A secure access control scheme based on group for peer to peer network
So far, some access control schemes for peer-to-peer network have been proposed. However, previously some schemes can only prevent unauthorized member from joining peer-to-peer network, and cannot revoke malicious members from peer-to-peer network. In this paper, a secure access control scheme based...
Gespeichert in:
Hauptverfasser: | , |
---|---|
Format: | Tagungsbericht |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 1511 |
---|---|
container_issue | |
container_start_page | 1507 |
container_title | |
container_volume | |
creator | Xiaoming Wang Shuaiwen Xu |
description | So far, some access control schemes for peer-to-peer network have been proposed. However, previously some schemes can only prevent unauthorized member from joining peer-to-peer network, and cannot revoke malicious members from peer-to-peer network. In this paper, a secure access control scheme based on group is proposed for peer-to-peer network. In our scheme, we employ the polynomial function and access function as basic means of constructing access control procedure in order to avoid the need for public key cryptography. Our scheme uses authentication, admission and revocation control to provide security services for peer-to-peer network. More importantly, our scheme robustly adds or revokes any group member without changing secret keys of other members. Moreover, our scheme avoids massive message to exchange for authentication and establish share key between two members. The analysis of security and performance shows that our scheme is secure, efficient and practical scheme for peer-to-peer network. |
doi_str_mv | 10.1109/ICSAI.2012.6223323 |
format | Conference Proceeding |
fullrecord | <record><control><sourceid>ieee_6IE</sourceid><recordid>TN_cdi_ieee_primary_6223323</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>6223323</ieee_id><sourcerecordid>6223323</sourcerecordid><originalsourceid>FETCH-LOGICAL-i90t-c9f19177d651fd123ff67d7d43b6f48b2734e1b69f0cacb094bc29a3d0ef33ba3</originalsourceid><addsrcrecordid>eNpVj81KAzEURiMiKHVeQDd5gRmT3DSZLIfB6kDBhd2X_NzoaDspyRTx7RXaTc_mcDYffIQ8cNZwzszT0L93QyMYF40SAkDAFamMbrlUGhg3RlxfdLu8JVUpX-wfrVsp5R1ZdbSgP2ak1nsshfo0zTntaPGfuEfqbMFA00Q_cjoeaEyZHhAzndPJE84_KX_fk5todwWrsxdks3re9K_1-u1l6Lt1PRo2195EbrjWQS15DFxAjEoHHSQ4FWXrhAaJ3CkTmbfeMSOdF8ZCYBgBnIUFeTzNjoi4PeRxb_Pv9nwe_gBFwE1T</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>A secure access control scheme based on group for peer to peer network</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Xiaoming Wang ; Shuaiwen Xu</creator><creatorcontrib>Xiaoming Wang ; Shuaiwen Xu</creatorcontrib><description>So far, some access control schemes for peer-to-peer network have been proposed. However, previously some schemes can only prevent unauthorized member from joining peer-to-peer network, and cannot revoke malicious members from peer-to-peer network. In this paper, a secure access control scheme based on group is proposed for peer-to-peer network. In our scheme, we employ the polynomial function and access function as basic means of constructing access control procedure in order to avoid the need for public key cryptography. Our scheme uses authentication, admission and revocation control to provide security services for peer-to-peer network. More importantly, our scheme robustly adds or revokes any group member without changing secret keys of other members. Moreover, our scheme avoids massive message to exchange for authentication and establish share key between two members. The analysis of security and performance shows that our scheme is secure, efficient and practical scheme for peer-to-peer network.</description><identifier>ISBN: 9781467301985</identifier><identifier>ISBN: 1467301981</identifier><identifier>EISBN: 9781467301992</identifier><identifier>EISBN: 9781467301978</identifier><identifier>EISBN: 1467301973</identifier><identifier>EISBN: 146730199X</identifier><identifier>DOI: 10.1109/ICSAI.2012.6223323</identifier><language>eng</language><publisher>IEEE</publisher><subject>Access control ; Authentication ; authentication control admission control ; Cryptography ; Law ; Peer to peer computing ; peer-to-peer network ; Polynomials ; revocation control</subject><ispartof>2012 International Conference on Systems and Informatics (ICSAI2012), 2012, p.1507-1511</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/6223323$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,776,780,785,786,2051,27904,54898</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/6223323$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Xiaoming Wang</creatorcontrib><creatorcontrib>Shuaiwen Xu</creatorcontrib><title>A secure access control scheme based on group for peer to peer network</title><title>2012 International Conference on Systems and Informatics (ICSAI2012)</title><addtitle>ICSAI</addtitle><description>So far, some access control schemes for peer-to-peer network have been proposed. However, previously some schemes can only prevent unauthorized member from joining peer-to-peer network, and cannot revoke malicious members from peer-to-peer network. In this paper, a secure access control scheme based on group is proposed for peer-to-peer network. In our scheme, we employ the polynomial function and access function as basic means of constructing access control procedure in order to avoid the need for public key cryptography. Our scheme uses authentication, admission and revocation control to provide security services for peer-to-peer network. More importantly, our scheme robustly adds or revokes any group member without changing secret keys of other members. Moreover, our scheme avoids massive message to exchange for authentication and establish share key between two members. The analysis of security and performance shows that our scheme is secure, efficient and practical scheme for peer-to-peer network.</description><subject>Access control</subject><subject>Authentication</subject><subject>authentication control admission control</subject><subject>Cryptography</subject><subject>Law</subject><subject>Peer to peer computing</subject><subject>peer-to-peer network</subject><subject>Polynomials</subject><subject>revocation control</subject><isbn>9781467301985</isbn><isbn>1467301981</isbn><isbn>9781467301992</isbn><isbn>9781467301978</isbn><isbn>1467301973</isbn><isbn>146730199X</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2012</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><sourceid>RIE</sourceid><recordid>eNpVj81KAzEURiMiKHVeQDd5gRmT3DSZLIfB6kDBhd2X_NzoaDspyRTx7RXaTc_mcDYffIQ8cNZwzszT0L93QyMYF40SAkDAFamMbrlUGhg3RlxfdLu8JVUpX-wfrVsp5R1ZdbSgP2ak1nsshfo0zTntaPGfuEfqbMFA00Q_cjoeaEyZHhAzndPJE84_KX_fk5todwWrsxdks3re9K_1-u1l6Lt1PRo2195EbrjWQS15DFxAjEoHHSQ4FWXrhAaJ3CkTmbfeMSOdF8ZCYBgBnIUFeTzNjoi4PeRxb_Pv9nwe_gBFwE1T</recordid><startdate>201205</startdate><enddate>201205</enddate><creator>Xiaoming Wang</creator><creator>Shuaiwen Xu</creator><general>IEEE</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope></search><sort><creationdate>201205</creationdate><title>A secure access control scheme based on group for peer to peer network</title><author>Xiaoming Wang ; Shuaiwen Xu</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i90t-c9f19177d651fd123ff67d7d43b6f48b2734e1b69f0cacb094bc29a3d0ef33ba3</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2012</creationdate><topic>Access control</topic><topic>Authentication</topic><topic>authentication control admission control</topic><topic>Cryptography</topic><topic>Law</topic><topic>Peer to peer computing</topic><topic>peer-to-peer network</topic><topic>Polynomials</topic><topic>revocation control</topic><toplevel>online_resources</toplevel><creatorcontrib>Xiaoming Wang</creatorcontrib><creatorcontrib>Shuaiwen Xu</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Electronic Library (IEL)</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Xiaoming Wang</au><au>Shuaiwen Xu</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>A secure access control scheme based on group for peer to peer network</atitle><btitle>2012 International Conference on Systems and Informatics (ICSAI2012)</btitle><stitle>ICSAI</stitle><date>2012-05</date><risdate>2012</risdate><spage>1507</spage><epage>1511</epage><pages>1507-1511</pages><isbn>9781467301985</isbn><isbn>1467301981</isbn><eisbn>9781467301992</eisbn><eisbn>9781467301978</eisbn><eisbn>1467301973</eisbn><eisbn>146730199X</eisbn><abstract>So far, some access control schemes for peer-to-peer network have been proposed. However, previously some schemes can only prevent unauthorized member from joining peer-to-peer network, and cannot revoke malicious members from peer-to-peer network. In this paper, a secure access control scheme based on group is proposed for peer-to-peer network. In our scheme, we employ the polynomial function and access function as basic means of constructing access control procedure in order to avoid the need for public key cryptography. Our scheme uses authentication, admission and revocation control to provide security services for peer-to-peer network. More importantly, our scheme robustly adds or revokes any group member without changing secret keys of other members. Moreover, our scheme avoids massive message to exchange for authentication and establish share key between two members. The analysis of security and performance shows that our scheme is secure, efficient and practical scheme for peer-to-peer network.</abstract><pub>IEEE</pub><doi>10.1109/ICSAI.2012.6223323</doi><tpages>5</tpages></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | ISBN: 9781467301985 |
ispartof | 2012 International Conference on Systems and Informatics (ICSAI2012), 2012, p.1507-1511 |
issn | |
language | eng |
recordid | cdi_ieee_primary_6223323 |
source | IEEE Electronic Library (IEL) Conference Proceedings |
subjects | Access control Authentication authentication control admission control Cryptography Law Peer to peer computing peer-to-peer network Polynomials revocation control |
title | A secure access control scheme based on group for peer to peer network |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-23T21%3A59%3A01IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=A%20secure%20access%20control%20scheme%20based%20on%20group%20for%20peer%20to%20peer%20network&rft.btitle=2012%20International%20Conference%20on%20Systems%20and%20Informatics%20(ICSAI2012)&rft.au=Xiaoming%20Wang&rft.date=2012-05&rft.spage=1507&rft.epage=1511&rft.pages=1507-1511&rft.isbn=9781467301985&rft.isbn_list=1467301981&rft_id=info:doi/10.1109/ICSAI.2012.6223323&rft_dat=%3Cieee_6IE%3E6223323%3C/ieee_6IE%3E%3Curl%3E%3C/url%3E&rft.eisbn=9781467301992&rft.eisbn_list=9781467301978&rft.eisbn_list=1467301973&rft.eisbn_list=146730199X&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=6223323&rfr_iscdi=true |