Go home now Header Background Image
Submission Procedure
share: |
Follow us
Volume 3 / Issue 6

available in:   PDF (322 kB) PS (115 kB)
Similar Docs BibTeX   Write a comment
Links into Future
DOI:   10.3217/jucs-003-06-0730


Using Cryptographic Hash Functions for Discretionary Access Control in Object-Oriented Databases

Ahmad Baraani-Dastjerdi (University of Wollongong, Australia)

Josef Pieprzyk (University of Wollongong, Australia)

Reihaneh Safavi-Naini (Centre for Computer Security Research, University of Wollongong, Australia)

Janusz R. Getta (University of Wollongong, Australia)

Abstract: This is a discussion paper which presents a cryptographic solution for discretionary access control in object-oriented databases. Our approach is based on the use of pseudo-random functions and sibling intractable function families (SIFF). Each entity (object or class) in the object-oriented database model is associated with access keys that ensure secure access to that entity and all related entities. The main advantage of our approach is its ability to verify an access request during query processing. Pseudo-random functions and SIFF are applied in such a way that cryptographic keys can be generated from keys of related objects or users. The security of the system depends on the difficulty of predicting the output of pseudo-random functions and on finding extra collision for the sibling intractable function family. The authorization system supports ownership and granting/revoking of privileges.

Keywords: Access control, Application of cryptography., Data security, Database security, Discretionary security policy, Object-oriented databases

Categories: D.4.6, H.2.0, K.6.5