Skip to main content

Advertisement

Table 1 Notations used

From: Comprehensive evaluation of key management hierarchies for outsourced data

Notation Description
a,b,c,... Resources
A,B,C,... End users
K i Random key assigned to node labeled i
acl[ o] A set of read authorized users for the resource o
cpl[ u] A set of resources authorized for user u
e(i,j) A directed edge from node i to node j
r i, j A public token associated with an edge e(i,j)
E() Symmetric encryption function
\(\mathcal {E}\) and \(\mathcal {D}\) A symmetric encryption and decryption operation
\(\mathcal {C}\) A communication between data owner and CSP
[ X] It represents a node corresponding to set X of users/resources