From: Comprehensive evaluation of key management hierarchies for outsourced data
Notation | Description |
---|---|
a,b,c,... | Resources |
A,B,C,... | End users |
K i | Random key assigned to node labeled i |
acl[ o] | A set of read authorized users for the resource o |
cpl[ u] | A set of resources authorized for user u |
e(i,j) | A directed edge from node i to node j |
r i, j | A public token associated with an edge e(i,j) |
E() | Symmetric encryption function |
\(\mathcal {E}\) and \(\mathcal {D}\) | A symmetric encryption and decryption operation |
\(\mathcal {C}\) | A communication between data owner and CSP |
[ X] | It represents a node corresponding to set X of users/resources |