Font Size: a A A

Research On Protection Of Sensitive Information And Access Control Policies In ATN

Posted on:2016-03-25Degree:MasterType:Thesis
Country:ChinaCandidate:Y XieFull Text:PDF
GTID:2348330542475455Subject:Computer Science and Technology
Abstract/Summary:PDF Full Text Request
Automated trust negotiation ATN solves the access problems of resources in across security domains.In order to make the system safety during the negotiations,it has become a focus of research to protect sensitive information in automated trust negotiation.There are three ways in protection of sensitive information of the ATN: resource contents sensitive protection,resources possession sensitive protection and protection of insecure information transmission.There is no automated trust negotiation model to protect these three kinds of sensitive information perfectly at the same time.The efficiency and success rate of sensitive information protection model are low because of the invalid access control policies.So how to ensure high efficiency,success rate and protecting the sensitive information in the negotiation is the focus of this thesis.In order to solve these problems,the DHMATN negotiation model is proposed.The double spiral matrix encryption algorithm in this model is improved which is based on the traditional spiral matrix encryption algorithm and it is better and more secure.Resources possession sensitive are protected by the separation of access control policies and resources.0-1 graph policy parity algorithm is proposed to validate an invalid access control strategy in the negotiation.Invalid access control policies are reduced when using this algorithm,moreover,the system efficiency and success rate of negotiations are improved.Finally,simulation results demonstrate that DHMATN model has better security and success rate than traditional negotiation model.Comparing with HCBATN model,DHMATN model has better security,the negotiation efficiency,and the negotiation success rate.
Keywords/Search Tags:Automated trust negotiation, Sensitive information, Access control policy, Double Helix Matrix Encryption Algorithm, 0-1 Graph Policy Parity Algorithm
PDF Full Text Request
Related items