CFP last date
22 April 2024
Reseach Article

Article:Lightweight Encryption of Hierarchical Access Control Mechanism Key Using Tribes of Farey Fractions and its Analysis

by Rajendra Hegadi, Ramesh Shahabadkar, Shamshekhar Patil
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 6 - Number 3
Year of Publication: 2010
Authors: Rajendra Hegadi, Ramesh Shahabadkar, Shamshekhar Patil
10.5120/1060-1385

Rajendra Hegadi, Ramesh Shahabadkar, Shamshekhar Patil . Article:Lightweight Encryption of Hierarchical Access Control Mechanism Key Using Tribes of Farey Fractions and its Analysis. International Journal of Computer Applications. 6, 3 ( September 2010), 23-28. DOI=10.5120/1060-1385

@article{ 10.5120/1060-1385,
author = { Rajendra Hegadi, Ramesh Shahabadkar, Shamshekhar Patil },
title = { Article:Lightweight Encryption of Hierarchical Access Control Mechanism Key Using Tribes of Farey Fractions and its Analysis },
journal = { International Journal of Computer Applications },
issue_date = { September 2010 },
volume = { 6 },
number = { 3 },
month = { September },
year = { 2010 },
issn = { 0975-8887 },
pages = { 23-28 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume6/number3/1060-1385/ },
doi = { 10.5120/1060-1385 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T19:54:28.352412+05:30
%A Rajendra Hegadi
%A Ramesh Shahabadkar
%A Shamshekhar Patil
%T Article:Lightweight Encryption of Hierarchical Access Control Mechanism Key Using Tribes of Farey Fractions and its Analysis
%J International Journal of Computer Applications
%@ 0975-8887
%V 6
%N 3
%P 23-28
%D 2010
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In this paper we propose a mechanism to develop a lightweight encryption technique. We encrypt hierarchical single key-lock access control mechanism key by encoding key (key number). Key number is derived using Chinese reminder theorem and tribes of Gaussian or rational Farey fractions are used to encode the key number. The advantages of the proposed mechanism are i) no decoding overhead as access rights are derived without decoding the encoded the key number, ii) no need to derive the key number for already existing files. Hence this method secures access control system by encoding the key number and acts as a thin layer of security; however the performance of retrieval system remains unchanged.

References
  1. C. C. Chang, 1987, “An Information Protection Scheme Based upon Number Theory”, The Computer Journal, Vol. 30, No. 3, pp. 249-253.
  2. H. Chandrashekhar and M. Nagaraj, 1994, “Tribes of Gaussian Farey Fractions”, The Mathematical Student, Vol. 63, 1-4, pp.196-200.
  3. Geon-Woo Kim, Jong-Wook Han, 2008, “Light-weight Access Control Mechanism based on Authenticate issued for Smart Home”, International Journal of Smart Home, Vol. 2, No. 4.
  4. Kim S. Lee, Huizhu Lu, D. D. Fisher, 1992, “A Hierarchical Single-Key-Lock Access Control Using the Chinese Remainder Theorem”, Symposium on Applied Computing Proceedings, pp: 491 – 496.
  5. Manoj Kumar, 2010, “A New Secure Remote User Authentication Scheme with Smart Cards”, International Journal of Network Security, Vol.11, No.3, PP.112–118.
  6. Manpreet Singh, Manjeet S. Patterh, 2010, “Formal Specification of Common Criteria Based Access Control Policy Model”, International Journal of Network Security, Vol.10, No.3, PP.232–241.
  7. M. L Wu and T. Y. Hwang, 1984, “Access control with single key-lock”, IEEE Transaction on Software Engineering, Vol. SE-10, No. 2, pp.185-191.
  8. M. Nagaraj & Srinivas Murthy, 1989, “Properties of Tribes of Farey Fractions”, J. Ramanujan Math, Soc 4(i), pp 25-31.
  9. Sabrina De Capitani di Vimercati1, Pierangela Samarati1, and Sushil Jajodia2, 2005, “Policies, Models, and Languages for Access Control”, S. Bhalla (Ed.): DNIS 2005, LNCS 3433, Springer-Verlag Berlin Heidelberg 2005, 225–237.
Index Terms

Computer Science
Information Sciences

Keywords

Light weight encryption Farey fractions Access control mechanism Chinese remainder theorem