Access Control and Query Verification for Untrusted Databases

被引:0
|
作者
Jain, Rohit [1 ]
Prabhakar, Sunil [1 ]
机构
[1] Purdue Univ, Dept Comp Sci, W Lafayette, IN 47907 USA
关键词
Access Control; Cloud Computing; Query Verification; Private Outsourcing;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
With the advent of Cloud Computing, data are increasingly being stored and processed by untrusted third-party servers on the Internet. Since the data owner lacks direct control over the hardware and the software running at the server, there is a need to ensure that the data are not read or modified by unauthorized entities. Even though a simple encryption of the data before transferring it to the server ensures that only authorized entities who have the private key can access the data, it has many drawbacks. Encryption alone does not ensure that the retrieved query results are trustworthy (e.g., retrieved values are the latest values and not stale). A simple encryption can not enforce access control policies where each entity has access rights to only a certain part of the database. In this paper, we provide a solution to enforce access control policies while ensuring the trustworthiness of the data. Our solution ensures that a particular data item is read and modified by only those entities who have been authorized by the data owner to access that data item. It provides privacy against malicious entities that somehow get access to the data stored at the server. Our solutions allow easy change in access control policies under the lazy revocation model under which a user's access to a subset of the data can be revoked so that the user can not read any new values in that subset of the data. Our solution also provides correctness and completeness verification of query results in the presence of access control policies. We implement our solution in a prototype system built on top of Oracle with no modifications to the database internals. We also provide an empirical evaluation of the proposed solutions and establish their feasibility.
引用
收藏
页码:211 / 225
页数:15
相关论文
共 50 条
  • [31] ENKI: Access Control for Encrypted Query Processing
    Hang, Isabelle
    Kerschbaum, Florian
    Damiani, Ernesto
    SIGMOD'15: PROCEEDINGS OF THE 2015 ACM SIGMOD INTERNATIONAL CONFERENCE ON MANAGEMENT OF DATA, 2015, : 183 - 196
  • [32] Access Control by Query Rewriting: the Case of KorAP
    Banski, Piotr
    Diewald, Nils
    Hanl, Michael
    Kupietz, Marc
    Witt, Andreas
    LREC 2014 - NINTH INTERNATIONAL CONFERENCE ON LANGUAGE RESOURCES AND EVALUATION, 2014, : 3817 - 3822
  • [33] Verification of Substring Searches on the Untrusted Cloud
    Faizal Riaz-ud-Din
    Robin Doss
    ZTE Communications, 2016, 14(S1) (S1) : 10 - 20
  • [34] A formal access control model for XML databases
    Gabillon, A
    SECURE DATA MANAGEMENT, PROCEEDINGS, 2005, 3674 : 86 - 103
  • [35] Access control for deductive databases by logic programming
    Barker, S
    LOGICS PROGRAMMING, PROCEEDINGS, 2002, 2401 : 54 - 69
  • [36] Access control scheme with tracing for outsourced databases
    Wang, Xiaoming
    Yao, Guoxiang
    FRONTIERS OF COMPUTER SCIENCE, 2012, 6 (06) : 677 - 685
  • [37] Using Usage Control to Access XML Databases
    Sun, Lili
    Li, Yan
    INTERNATIONAL JOURNAL OF INFORMATION SYSTEMS IN THE SERVICE SECTOR, 2009, 1 (03) : 32 - 44
  • [38] Access Control Models for XML Databases in the Cloud
    Alfaqir, Shumukh
    Hendaoui, Saloua
    Alhablani, Fatimah
    Alenzi, Wesam
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2022, 22 (05): : 89 - 96
  • [39] Access control scheme with tracing for outsourced databases
    Xiaoming Wang
    Guoxiang Yao
    Frontiers of Computer Science, 2012, 6 : 677 - 685
  • [40] Verification and enforcement of access control policies
    Antonio Cau
    Helge Janicke
    Ben Moszkowski
    Formal Methods in System Design, 2013, 43 : 450 - 492