EconPapers    
Economics at your fingertips  
 

Dynamic permission access control model based on privacy protection

Qikun Zhang, Liang Zhu, Kunyuan Zhao, Yimeng Wu, Baohua Jin, Jianyong Li, Yinghui Meng () and Sikang Hu ()
Additional contact information
Qikun Zhang: Zhengzhou University of Light Industry
Liang Zhu: Zhengzhou University of Light Industry
Kunyuan Zhao: Zhengzhou University of Light Industry
Yimeng Wu: School of Architecture and Environmental Engineering Zhengzhou Technical College
Baohua Jin: Zhengzhou University of Light Industry
Jianyong Li: Zhengzhou University of Light Industry
Yinghui Meng: Zhengzhou University of Light Industry
Sikang Hu: Beijing Institute of Technology

Telecommunication Systems: Modelling, Analysis, Design and Management, 2022, vol. 81, issue 2, No 2, 205 pages

Abstract: Abstract Access control technology is one of the key technologies to ensure safe resource sharing. Identity authentication and authority distribution are two key technologies for access control technology to restrict unauthorized users from accessing resources, and only authorised legal users can access resources. However, user privacy protection and frequent permission changes are two thorny issues that need to be solved urgently by access control technology. In this paper, a dynamic access control model based on privacy protection is proposed to deal with these problems. Compared with existing access control technologies, the main advantages of this paper are as follows: (1) Encrypt and hide the attributes of entities, and use attribute-based identity authentication technology for identity authentication, which not only achieves the purpose of traditional identity authentication, but also ensures the attributes and privacy of entities are not leaked; (2) Binding resource access permissions with entity attributes, dynamically assigning and adjusting resource access control permissions through changes in entity attributes, making resource access control more fine-grained and more flexible. Security proof and performance analysis show that the proposed protocol is secure under the hardness assumption of the discrete logarithm problem and the decision bilinear Diffie–Hellman problem. Compared with the cited references, this model has the advantages of low computational complexity, short computational time, and low communication overhead.

Keywords: Privacy protection; Access control; Attribute-based encryption; Information security; Hidden attribute authentication (search for similar items in EconPapers)
Date: 2022
References: View references in EconPapers View complete reference list from CitEc
Citations:

Downloads: (external link)
http://link.springer.com/10.1007/s11235-022-00937-8 Abstract (text/html)
Access to the full text of the articles in this series is restricted.

Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.

Export reference: BibTeX RIS (EndNote, ProCite, RefMan) HTML/Text

Persistent link: https://EconPapers.repec.org/RePEc:spr:telsys:v:81:y:2022:i:2:d:10.1007_s11235-022-00937-8

Ordering information: This journal article can be ordered from
http://www.springer.com/journal/11235

DOI: 10.1007/s11235-022-00937-8

Access Statistics for this article

Telecommunication Systems: Modelling, Analysis, Design and Management is currently edited by Muhammad Khan

More articles in Telecommunication Systems: Modelling, Analysis, Design and Management from Springer
Bibliographic data for series maintained by Sonal Shukla () and Springer Nature Abstracting and Indexing ().

 
Page updated 2025-03-20
Handle: RePEc:spr:telsys:v:81:y:2022:i:2:d:10.1007_s11235-022-00937-8