Skip to main content

A Novel E-Newspapers Publication System Using Provably Secure Time-Bound Hierarchical Key Assignment Scheme and XML Security

  • Conference paper
Advances in Grid and Pervasive Computing (GPC 2010)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 6104))

Included in the following conference series:

Abstract

A time-bound hierarchical key assignment scheme is a cryptographic key assignment scheme that organizes and encrypts the resources, according to the hierarchical tree relations and the time constraint, such that only authorized users can efficiently access the resources. This paper proposes a practical time-bound key assignment scheme, which is efficient and is proved secure. We, based on the time-bound hierarchical key assignment scheme and XML security, design and implement a new E-newspaper publication. The new system owns the practical merits: (1) the server can broadcast its publications with minimized communication overhead; (2) the subscribers, with only few set up data, can access to those authorized publications; (3) the system can efficiently manage and sell some of its backlogs, according to buyer’s interests in specific categories of publications over a specific time periods. The experiment shows that the new system greatly improves both the efficiency of the server and the clients.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Akl, S.G., Taylor, P.D.: Cryptographic Solution to a Problem of Access Control in a hierarchy. ACM Trans. on Computer Systems 1(3), 239–248 (1983)

    Article  Google Scholar 

  2. Chen, T.-S., Huang, J.-Y.: A novel key management scheme for dynamic access control in a user hierarchy. Applied Mathematics and Computation 162, 339–351 (2005)

    Article  MATH  MathSciNet  Google Scholar 

  3. Chien, H.-Y., Jan, J.-K.: New hierarchical assignment without Public Key cryptography. Computer and Security 22(6), 523–526 (2003)

    Article  Google Scholar 

  4. Chien, H.-Y.: Efficient time-bound hierarchical key assignment scheme. IEEE Trans. on Knowledge and Data Eng. 16(10), 1301–1304 (2004)

    Article  MathSciNet  Google Scholar 

  5. Chien, H.-Y., Tang, Y.-L., Chen, Y.-L.: A Secure and Efficient Time-Bound Hierarchical Key Assignment Scheme. In: Proc. of the 2007 IAENG International Conference on Communication Systems and Applications, Hong Kong, pp. 21–23 (2007)

    Google Scholar 

  6. Gemplus, M.L.: Smart-Cards: A Cost-Effective Solution against Electronic Fraud. In: Proc. European Conf. Security and Detection, pp. 81–85 (1997)

    Google Scholar 

  7. Huang, H.-F., Chang, C.-C.: A new cryptographic key assignment scheme with time-constraint access control in a hierarchy. Computer Standards and Interfaces 26(3), 159–166 (2004)

    Article  Google Scholar 

  8. Lee, W.-B., Li, J.-H., Dow, C.-R.: Efficient Date-Constraint Hierarchical Key Assignment Scheme. In: Proc. of the 2005 International Conf. on Security and Management, Las Vegas, Nevada, USA, pp. 51–57 (2005)

    Google Scholar 

  9. De Santis, A., Ferrara, A.L., Masucci, B.: Enforcing the security of a time-bound hierarchical key assignment scheme. Information Sciences 176, 1684–1694 (2006)

    Article  MATH  MathSciNet  Google Scholar 

  10. Tzeng, W.-G.: A Time-Bound Cryptographic Key Assignment Scheme for Access Control in a Hierarchy. IEEE Trans. Knowledge and Data Eng. 14(1), 182–188 (2002)

    Article  MathSciNet  Google Scholar 

  11. Tzeng, W.-G.: Access control and authorization: A secure system for data access based on anonymous authentication and time-dependent hierarchical keys. In: Proc. ACM Symposium on Information, computer and comm. Security, Taiwan, pp. 223–230 (2006)

    Google Scholar 

  12. Wang, S.-Y., Laih, C.-S.: Merging: An Efficient Solution for a Time-Bound Hierarchical Key Assignment Scheme. IEEE Trans. on Dependable and Secure Computing 3(1), 91–100 (2006)

    Article  Google Scholar 

  13. World Wide Web Consortium. Extensible Markup Language (XML) 1.0 (1998), http://www.w3.org/TR/REC-xml/

  14. World Wide Web Consortium. XML Encryption Syntax and Processing (2002a), http://www.w3.org/TR/xmlenc-core/

  15. World Wide Web Consortium. XML-Signature Syntax and Processing (2002b), http://www.w3.org/TR/xmldsig-core/

  16. Yeh, J.-H.: An RSA-Based Time-Bound Hierarchical Key Assignment Scheme for Electronic Article Subscription. In: Proc. ACM Conf. Information and Knowledge Management, pp. 285–286 (2005)

    Google Scholar 

  17. Yi, X., Ye, Y.: Security of Tzeng’s time-bound key assignment scheme for access control in a hierarchy. IEEE Trans. on Knowledge and Data Eng. 15(4), 1054–1055 (2003)

    Article  Google Scholar 

  18. Yi, X.: Security of Chien’s efficient time-bound hierarchical key assignment scheme. IEEE Trans. on Knowledge and Data Eng. 17(9), 1298–1299 (2005)

    Article  Google Scholar 

  19. Messerges, T.S., Dabbish, E.A., Sloan, R.H.: Examining smart-card security under the threat of power analysis attacks. IEEE Transactions on Computers 51(5), 541–552 (2002)

    Article  MathSciNet  Google Scholar 

  20. Bellare, M., Rogaway, P.: Provably secure session key distribution: The three party case. In: 27th ACM Symposium on the Theory of Computing, pp. 57–66. ACM Press, New York (1995)

    Google Scholar 

  21. Bertino, E., Carminati, B., Ferrari, E.: A temporal key management scheme for secure broadcasting of XML documents. In: ACM Conference on Computer and Communications Security, pp. 31–40 (2002)

    Google Scholar 

  22. Miklau, G., Suciu, D.: Controlling Access to Published Data Using Cryptography. In: Proc. of the 29th international conference on Very large data bases, VLDB, pp. 898-909 (2003)

    Google Scholar 

  23. Chen, Y.L.: Application and Design of Time-Bound Hierarchical Key Assignment Scheme, thesis, ChaoYang University of Technology, Department of Information Management (2007)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Chien, HY., Chen, YL., Lo, CF., Huang, YM. (2010). A Novel E-Newspapers Publication System Using Provably Secure Time-Bound Hierarchical Key Assignment Scheme and XML Security. In: Bellavista, P., Chang, RS., Chao, HC., Lin, SF., Sloot, P.M.A. (eds) Advances in Grid and Pervasive Computing. GPC 2010. Lecture Notes in Computer Science, vol 6104. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-13067-0_43

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-13067-0_43

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-13066-3

  • Online ISBN: 978-3-642-13067-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics