Skip to main content

Table 1 Notations used

From: Comprehensive evaluation of key management hierarchies for outsourced data

Notation

Description

a,b,c,...

Resources

A,B,C,...

End users

K i

Random key assigned to node labeled i

acl[ o]

A set of read authorized users for the resource o

cpl[ u]

A set of resources authorized for user u

e(i,j)

A directed edge from node i to node j

r i, j

A public token associated with an edge e(i,j)

E()

Symmetric encryption function

\(\mathcal {E}\) and \(\mathcal {D}\)

A symmetric encryption and decryption operation

\(\mathcal {C}\)

A communication between data owner and CSP

[ X]

It represents a node corresponding to set X of users/resources