Security is a very vital concern in information system in this modern day. The protection of confidential files and integrity of information kept in the database are also of great important, the security model play an important role in protecting the privacy and integrity of messages in the database from unlawful users is a formal method to verify and describe intricate information system. An access Control mechanism is a main strategy for prevention and protection of the classified files in a database; this is carried out by restricting rights of access for different approved users of these files. This paper proposes a novel access control mechanism based on Chinese remainder theorem II which implements a single-key-lock system to encrypt one key called a secret key which is used for both encryption and decryption in the electronic information system for accessing the database. The key to be used in the decryption process must be exchanged between the entities in communication using symmetric encryption for the users to have access to the database. This method represents flocks and keys which is highly efficient and proficient. Also, this implementation can be achieved using the Chinese remainder theorem which executes faster operations and enables simpler construction of keys and locks to be provide for user to have access to control.
Published in | International Journal of Intelligent Information Systems (Volume 10, Issue 3) |
DOI | 10.11648/j.ijiis.20211003.12 |
Page(s) | 31-36 |
Creative Commons |
This is an Open Access article, distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution and reproduction in any medium or format, provided the original work is properly cited. |
Copyright |
Copyright © The Author(s), 2021. Published by Science Publishing Group |
Access Control, Residue Number System (RNS), New Chinese Remainder Theorem II (New CRT II)
[1] | D. E. Derming and P. J. Denning, “Data Security,” ACM Comp. Survey, Vol. 1 No. 3, (1979), pp 227-249. |
[2] | B. W. Lampson ‘Protection” Proc. 5th Princeton Sytnp. of Info. Sci. and Syst., Princeton Univ., (1971), pp. 437-443. |
[3] | G. S. Graharn and P. L. Denning, “protection-principles and practice,” Proc. Spring Jt. Computer Coference, Vol. 40, AFIPS Press, Montvale, N. J., (1972), pp. 417-29. |
[4] | Kim S. Lee et al. A Hierarchical Single-Key-Lock Access Control Using the Chinese Remainder Theorem. ACM 1992. |
[5] | Baumann, A., Peinado, M., & Hunt, G. (2015). Shielding applications from an untrusted cloud with haven. ACM Transactions on Computer Systems (TOCS), 33 (3), 1-26. |
[6] | M. L. Wu, T. Y. Hwang, Access control with single-key-lock, IEEE Trans. Software Eng. 10 (2) (1994) 185-191. |
[7] | Yanjun Liu, Chin-Chen, and Shih-Chang Chang, An Access Control Mechanism Based on the Generalized Aryabhata Remainder Theorem. International Journal of Network Security, Vol. 16, No. 1, PP. 58-64, Jan. 2014. |
[8] | Anderson R. Security Engineering: a guide to building dependable distributed systems. John Wiley & Sons; 2010. p. 640. |
[9] | Younis A. Younis, KashifKifayat, MadjidMerabti. An access control model for cloud computing. journal of information security and aplications 19 (2014) 45-60. Elsevier Ltd. |
[10] | Vilardy, J. M., Giacometto, F., Torres, C. O., & Mattos, L. (2011, January). Design and implementation in VHDL code of the two-dimensional fast Fourier transform for frequency filtering, convolution and correlation operations. In Journal of Physics-Conference Series (Vol. 274, No. 1, p. 012048). |
[11] | Ouyang, J., Coatrieux, G., & Shu, H. (2015). Robust hashing for image authentication using quaternion discrete Fourier transform and log-polar transform. Digital Signal Processing, 41, 98-109. |
[12] | Chervyakov, N. I., Molahosseini, A. S., Lyakhov, P. A., Babenko, M. G., & Deryabin, M. A. (2017). Residue-to-binary conversion for general moduli sets based on approximate Chinese remainder theorem. International journal of computer mathematics, 94 (9), 1833-1849. |
[13] | C. H., Premkumar, A. B., & Zhang, W. (2013). A new RNS based DA approach for inner product computation. IEEE Transactions on Circuits and Systems I: Regular Papers, 60 (8), 2139-2152. Omondi A. and Premkumar B (2007): Residue Number Systems: Theory and Implementation. Imperial College Press, 2007. |
[14] | Ouye, M. M., & Crocker, S. T. (2018). U.S. Patent No. 10,033,700. Washington, DC: U.S. Patent and Trademark Office. |
APA Style
Aremu Idris Aremu, Ibitoye Akinfola Akinrinnola, Nwaocha Vivian Ogochukwu. (2021). Novel Access Control Mechanism Based New Chinese Remainder Theorem II (New Crt II). International Journal of Intelligent Information Systems, 10(3), 31-36. https://doi.org/10.11648/j.ijiis.20211003.12
ACS Style
Aremu Idris Aremu; Ibitoye Akinfola Akinrinnola; Nwaocha Vivian Ogochukwu. Novel Access Control Mechanism Based New Chinese Remainder Theorem II (New Crt II). Int. J. Intell. Inf. Syst. 2021, 10(3), 31-36. doi: 10.11648/j.ijiis.20211003.12
AMA Style
Aremu Idris Aremu, Ibitoye Akinfola Akinrinnola, Nwaocha Vivian Ogochukwu. Novel Access Control Mechanism Based New Chinese Remainder Theorem II (New Crt II). Int J Intell Inf Syst. 2021;10(3):31-36. doi: 10.11648/j.ijiis.20211003.12
@article{10.11648/j.ijiis.20211003.12, author = {Aremu Idris Aremu and Ibitoye Akinfola Akinrinnola and Nwaocha Vivian Ogochukwu}, title = {Novel Access Control Mechanism Based New Chinese Remainder Theorem II (New Crt II)}, journal = {International Journal of Intelligent Information Systems}, volume = {10}, number = {3}, pages = {31-36}, doi = {10.11648/j.ijiis.20211003.12}, url = {https://doi.org/10.11648/j.ijiis.20211003.12}, eprint = {https://article.sciencepublishinggroup.com/pdf/10.11648.j.ijiis.20211003.12}, abstract = {Security is a very vital concern in information system in this modern day. The protection of confidential files and integrity of information kept in the database are also of great important, the security model play an important role in protecting the privacy and integrity of messages in the database from unlawful users is a formal method to verify and describe intricate information system. An access Control mechanism is a main strategy for prevention and protection of the classified files in a database; this is carried out by restricting rights of access for different approved users of these files. This paper proposes a novel access control mechanism based on Chinese remainder theorem II which implements a single-key-lock system to encrypt one key called a secret key which is used for both encryption and decryption in the electronic information system for accessing the database. The key to be used in the decryption process must be exchanged between the entities in communication using symmetric encryption for the users to have access to the database. This method represents flocks and keys which is highly efficient and proficient. Also, this implementation can be achieved using the Chinese remainder theorem which executes faster operations and enables simpler construction of keys and locks to be provide for user to have access to control.}, year = {2021} }
TY - JOUR T1 - Novel Access Control Mechanism Based New Chinese Remainder Theorem II (New Crt II) AU - Aremu Idris Aremu AU - Ibitoye Akinfola Akinrinnola AU - Nwaocha Vivian Ogochukwu Y1 - 2021/06/22 PY - 2021 N1 - https://doi.org/10.11648/j.ijiis.20211003.12 DO - 10.11648/j.ijiis.20211003.12 T2 - International Journal of Intelligent Information Systems JF - International Journal of Intelligent Information Systems JO - International Journal of Intelligent Information Systems SP - 31 EP - 36 PB - Science Publishing Group SN - 2328-7683 UR - https://doi.org/10.11648/j.ijiis.20211003.12 AB - Security is a very vital concern in information system in this modern day. The protection of confidential files and integrity of information kept in the database are also of great important, the security model play an important role in protecting the privacy and integrity of messages in the database from unlawful users is a formal method to verify and describe intricate information system. An access Control mechanism is a main strategy for prevention and protection of the classified files in a database; this is carried out by restricting rights of access for different approved users of these files. This paper proposes a novel access control mechanism based on Chinese remainder theorem II which implements a single-key-lock system to encrypt one key called a secret key which is used for both encryption and decryption in the electronic information system for accessing the database. The key to be used in the decryption process must be exchanged between the entities in communication using symmetric encryption for the users to have access to the database. This method represents flocks and keys which is highly efficient and proficient. Also, this implementation can be achieved using the Chinese remainder theorem which executes faster operations and enables simpler construction of keys and locks to be provide for user to have access to control. VL - 10 IS - 3 ER -