By Topic

A mobile role-based access control system using identity-based encryption with zero knowledge proof

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

3 Author(s)
Khandavilli, A.P. ; Fac. of Comput. Sci., Dalhousie Univ., Halifax, NS, Canada ; Rahman, M. ; Sampalli, S.

Controlled access to confidential information and resources is a critical element in security systems. Role-based access control (RBAC) has gained widespread usage in modern enterprise systems. Extensions have been proposed to RBAC for incorporating spatial constraints into such systems. Several solutions have been proposed for such models and many researchers are now focusing on enforcing system policies. In this paper we propose a security framework for RBAC systems with spatial constraints based on identity-based encryption. In our framework, we use identity-based encryption with zero knowledge proof (ZKP) to provide authentication and information security. We also show how Near Field Communication (NFC) can be used to establish the integrity of a user's proof of location. Simulation results in Java validate our model. Furthermore, security analysis has been done to show how our framework protects against well-known attacks.

Published in:

Computational Intelligence for Security and Defence Applications (CISDA), 2012 IEEE Symposium on

Date of Conference:

11-13 July 2012