Access control scheme with tracing for outsourced databases

被引:0
|
作者
Wang, Xiaoming [1 ]
Yao, Guoxiang [1 ]
机构
[1] Jinan Univ, Dept Comp Sci, Guangzhou 510632, Guangdong, Peoples R China
基金
中国国家自然科学基金;
关键词
outsourced databases; access control; malicious user tracing; adding and revoking users;
D O I
10.1007/s11704-012-1193-0
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
To manage dynamic access control and deter pirate attacks on outsourced databases, a dynamic access control scheme with tracing is proposed. In our scheme, we introduce the traitor tracing idea into outsource databases, and employ a polynomial function and filter function as the basic means of constructing encryption and decryption procedures to reduce computation, communication, and storage overheads. Compared to previous access control schemes for outsourced databases, our scheme can not only protect sensitive data from leaking and perform scalable encryption at the server side without shipping the outsourced data back to the data owner when group membership is changed, but also provide trace-and-revoke features. When malicious users clone and sell their decryption keys for profit, our scheme can trace the decryption keys to the malicious users and revoke them. Furthermore, our scheme avoids massive message exchanges for establishing the decryption key between the data owner and the user. Compared to previously proposed publickey traitor tracing schemes, our scheme can simultaneously achieve full collusion resistance, full recoverability, full revocation, and black-box traceability. The proof of security and analysis of performance show that our scheme is secure and efficient.
引用
收藏
页码:677 / 685
页数:9
相关论文
共 50 条
  • [1] Access control scheme with tracing for outsourced databases
    Xiaoming Wang
    Guoxiang Yao
    [J]. Frontiers of Computer Science, 2012, 6 : 677 - 685
  • [2] An efficient key management scheme for user access control in outsourced databases
    Hong, Seungtae
    Kim, Hyeong-Il
    Chang, Jae-Woo
    [J]. WORLD WIDE WEB-INTERNET AND WEB INFORMATION SYSTEMS, 2017, 20 (03): : 467 - 490
  • [3] An efficient key management scheme for user access control in outsourced databases
    Seungtae Hong
    Hyeong-Il Kim
    Jae-Woo Chang
    [J]. World Wide Web, 2017, 20 : 467 - 490
  • [4] An Efficient Access Control Scheme for Outsourced Data
    Wang, Xiaoming
    Lin, Yanchun
    [J]. JOURNAL OF COMPUTERS, 2012, 7 (04) : 918 - 922
  • [5] Query Access Assurance in Outsourced Databases
    Le, Wangchao
    Li, Feifei
    [J]. IEEE TRANSACTIONS ON SERVICES COMPUTING, 2012, 5 (02) : 178 - 191
  • [6] A Query Verification Scheme for Dynamic Outsourced Databases
    Wang, Xiaoming
    Yuan, Duobao
    [J]. JOURNAL OF COMPUTERS, 2012, 7 (01) : 156 - 160
  • [7] A Secure and Verifiable Outsourced Access Control Scheme in Fog-Cloud Computing
    Fan, Kai
    Wang, Junxiong
    Wang, Xin
    Li, Hui
    Yang, Yintang
    [J]. SENSORS, 2017, 17 (07)
  • [8] A query integrity assurance scheme for accessing outsourced spatial databases
    Ku, Wei-Shinn
    Hu, Ling
    Shahabi, Cyrus
    Wang, Haixun
    [J]. GEOINFORMATICA, 2013, 17 (01) : 97 - 124
  • [9] A privacy-preserving aggregate query scheme on outsourced databases
    Jiang, Ya-Jun
    Yang, Bo
    Zhang, Ming-Wu
    Chen, Xu-Ri
    [J]. Zhongnan Daxue Xuebao (Ziran Kexue Ban)/Journal of Central South University (Science and Technology), 2011, 42 (03): : 721 - 725
  • [10] A query integrity assurance scheme for accessing outsourced spatial databases
    Wei-Shinn Ku
    Ling Hu
    Cyrus Shahabi
    Haixun Wang
    [J]. GeoInformatica, 2013, 17 : 97 - 124