Visible to the public Implementation of Discretionary Security Policy in the Distributed Systems Based on the Secret Sharing Scheme

TitleImplementation of Discretionary Security Policy in the Distributed Systems Based on the Secret Sharing Scheme
Publication TypeConference Paper
Year of Publication2019
AuthorsBelim, S.V., S.Yu, Belim
Conference Name2019 International Multi-Conference on Industrial Engineering and Modern Technologies (FarEastCon)
Date Publishedoct
PublisherIEEE
ISBN Number978-1-7281-0061-6
KeywordsBlakley's scheme, Collaboration, computer network security, discretionary security policy, forbidden information channels, matrix of access., Policy Based Governance, policy-based governance, polynomials, pubcrawl, secret sharing scheme, Shamir's scheme, sharing secretscheme, telecommunication channels
Abstract

In this article the combination of secret sharing schemes and the requirement of discretionary security policy is considered. Secret sharing schemes of Shamir and Blakley are investigated. Conditions for parameters of schemes the providing forbidden information channels are received. Ways for concealment of the forbidden channels are suggested. Three modifications of the Shamir's scheme and two modifications of the Blakley's scheme are suggested. Transition from polynoms to exponential functions for formation the parts of a secret is carried out. The problem of masking the presence of the forbidden information channels is solved. Several approaches with the complete and partial concealment are suggested.

URLhttps://ieeexplore.ieee.org/document/8933972
DOI10.1109/FarEastCon.2019.8933972
Citation Keybelim_implementation_2019