A Pervasive Polling Secret-Sharing Based Access Control Protocol for Sensitive Information

A Pervasive Polling Secret-Sharing Based Access Control Protocol for Sensitive Information

Juan Álvaro Muñoz Naranjo, Justo Peralta López, Juan Antonio López Ramos
DOI: 10.4018/978-1-60960-042-6.ch012
OnDemand:
(Individual Chapters)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

This chapter presents a novel access control mechanism for sensitive information which requires permission from different entities or persons to be accessed. The mechanism consists of a file structure and a protocol which extend the features of the OpenPGP Message Format standard by using secret sharing techniques. Several authors are allowed to work in the same file, while access is blocked for not authorized users. Access control rules can be set indicating the minimum number of authors that need to be gathered together in order to open the file. Furthermore, these rules can be different for each section of the document, allowing collaborative work. Non-repudiation and authentication are achieved by means of a shared signature. The scheme’s features are best appreciated when using it in a mobile scenario. Deployment in such an environment is easy and straight.
Chapter Preview
Top

Introduction

Protection of sensitive information is an ever-present concern which is gaining more and more attention as digitalization of information and use of Internet increase. Numerous privacy protocols, standards and applications exist in order to keep information away from unauthorized persons, as well as to authenticate its author. Most of them regard privacy while information is being transmitted through the web and provide authentication (OpenSSH) (Dierks&Rescorla, 2008) (Atkinson, 1995) (Kohl, 1989) (Paterson &Yau, 2006). GnuPG (GnuPG) and PGP (PGP) applications also protect information while stored in a device. Both implement the OpenPGP Message Format standard (Callas, Donnerhacke, Finney, Shaw, & Thayer, 2007).

Those protocols and applications usually work on an individual basis, that is, a single user manages the privacy of its own information. Some examples are: communicating in a private and/or authenticated way with a Web server, protecting personal information and keeping a private and/or authenticated email conversation.

Some scenarios may require, in addition to protection and authentication of information, some kind of access control measures. That is the case of governmental classified documents (defense, foreign affairs, historical, etc.) or high-value information in private companies. Controlling the access to this kind of documents is critical, and may require the approval of third-party entities or individuals, or even a set of them. Security restrictions will be even higher when modifying the classified information.

On a different matter, advances in smart devices and connectivity have given us the chance to access Internet from almost anywhere and at any time. Internet access is no longer confined to static devices that cannot be taken with us. Now that the technology already exists, it is time to develop new mechanisms and applications that take advantage of it.

Having all this in mind we have designed a polling-based file access control mechanism that is presented in this chapter. This mechanism includes an extension of the OpenPGP Message Format and a protocol: access to the file is granted only under the approval of a minimum number of authorized users, and modifications are signed for authenticity and integrity verification. The first feature is achieved by using secret sharing techniques; the later by using a shared signature.

Section Background explains and discusses some technologies that keep some similarity, along with the OpenPGP Message Format, the secret sharing techniques and the shared signature. Section Our Proposal introduces our scheme with some mobility and security considerations, and finally the last section shows the conclusions of the chapter.

Key Terms in this Chapter

OpenPGP: Message Format: A standard that defines a file structure to be handled by GnuPG and similar software applications.

GnuPG: A GNU software application that provides privacy and authentication in communications between two persons. It is mainly used as a complement for email applications. It uses the OpenPGP Message Format. It is the open-source equivalent to PGP.

Shared Signature: A cryptographic technique that allows signing a piece of information by binding two different signers together.

Secret Sharing: A cryptographic technique that allows regenerating a secret by computing separate pieces of information.

Public Key Cryptography: A cryptographic paradigm in which every individual owns two bound keys: a public and a private key. What is encrypted with a key can only be decrypted with its counterpart. Public Key Cryptography has helped to evolve security and privacy in the digital era, especially on Internet.

Symmetric cryptography: A cryptographic paradigm in which the same key is used to encrypt and decrypt information.

TLS: A protocol similar to SSL. In fact it is an evolution of SSL 3.0. The current version is TLS 1.0.

SSL: A protocol that provides privacy and authentication in communication between two hosts. Its last version is 3.0, which later evolved into TLS 1.0.

Complete Chapter List

Search this Book:
Reset