Access Control and Query Verification for Untrusted Databases

被引:0
|
作者
Jain, Rohit [1 ]
Prabhakar, Sunil [1 ]
机构
[1] Purdue Univ, Dept Comp Sci, W Lafayette, IN 47907 USA
关键词
Access Control; Cloud Computing; Query Verification; Private Outsourcing;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
With the advent of Cloud Computing, data are increasingly being stored and processed by untrusted third-party servers on the Internet. Since the data owner lacks direct control over the hardware and the software running at the server, there is a need to ensure that the data are not read or modified by unauthorized entities. Even though a simple encryption of the data before transferring it to the server ensures that only authorized entities who have the private key can access the data, it has many drawbacks. Encryption alone does not ensure that the retrieved query results are trustworthy (e.g., retrieved values are the latest values and not stale). A simple encryption can not enforce access control policies where each entity has access rights to only a certain part of the database. In this paper, we provide a solution to enforce access control policies while ensuring the trustworthiness of the data. Our solution ensures that a particular data item is read and modified by only those entities who have been authorized by the data owner to access that data item. It provides privacy against malicious entities that somehow get access to the data stored at the server. Our solutions allow easy change in access control policies under the lazy revocation model under which a user's access to a subset of the data can be revoked so that the user can not read any new values in that subset of the data. Our solution also provides correctness and completeness verification of query results in the presence of access control policies. We implement our solution in a prototype system built on top of Oracle with no modifications to the database internals. We also provide an empirical evaluation of the proposed solutions and establish their feasibility.
引用
下载
收藏
页码:211 / 225
页数:15
相关论文
共 50 条
  • [1] Access Control Friendly Query Verification for Outsourced Data Publishing
    Chen, Hong
    Ma, Xiaonan
    Hsu, Windsor
    Li, Ninghui
    Wang, Qihua
    COMPUTER SECURITY - ESORIC 2008, PROCEEDINGS, 2008, 5283 : 177 - +
  • [2] Access control enforcement on query-aware encrypted cloud databases
    Ferretti, Luca
    Colajanni, Michele
    Marchetti, Mirco
    2013 IEEE FIFTH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING TECHNOLOGY AND SCIENCE (CLOUDCOM), VOL 2, 2013, : 717 - 722
  • [3] Query Access Assurance in Outsourced Databases
    Le, Wangchao
    Li, Feifei
    IEEE TRANSACTIONS ON SERVICES COMPUTING, 2012, 5 (02) : 178 - 191
  • [4] The dynamic predicate: integrating access control with query processing in XML databases
    Lee, Jae-Gil
    Whang, Kyu-Young
    Han, Wook-Shin
    Song, Il-Yeol
    VLDB JOURNAL, 2007, 16 (03): : 371 - 387
  • [5] The dynamic predicate: integrating access control with query processing in XML databases
    Jae-Gil Lee
    Kyu-Young Whang
    Wook-Shin Han
    Il-Yeol Song
    The VLDB Journal, 2007, 16 : 371 - 387
  • [6] A Query Verification Scheme for Dynamic Outsourced Databases
    Wang, Xiaoming
    Yuan, Duobao
    JOURNAL OF COMPUTERS, 2012, 7 (01) : 156 - 160
  • [7] Query assurance verification for dynamic outsourced XML databases
    Nguyen, Viet Hung
    Dang, Tran Khanh
    Son, Nguyen Thanh
    Kueng, Josef
    ARES 2007: SECOND INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, PROCEEDINGS, 2007, : 689 - +
  • [8] A query processing method for integrated access to multiple databases
    Nishizawa, I
    Takasu, A
    Adachi, J
    DATABASE AND EXPERT SYSTEMS APPLICATIONS, 1996, 1134 : 385 - 399
  • [9] Query assurance verification for outsourced multi-dimensional databases
    Cheng, Weiwei
    Tan, Kian-Lee
    JOURNAL OF COMPUTER SECURITY, 2009, 17 (01) : 101 - 126
  • [10] ACCESS TO INDEXED HIERARCHICAL DATABASES USING A RELATIONAL QUERY LANGUAGE
    CHUNG, CW
    MCCLOSKEY, KE
    IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 1993, 5 (01) : 155 - 161