Encrypted Shared Data Spaces

被引:0
|
作者
Russello, Giovanni [1 ]
Dong, Changyu [1 ]
Dulay, Naranker [1 ]
Chaudron, Michel [2 ]
van Steen, Maarten [3 ]
机构
[1] Univ London Imperial Coll Sci Technol & Med, London SW7 2AZ, England
[2] Eindhoven Univ Technol, NL-5600 MB Eindhoven, Netherlands
[3] Vrije Univ Amsterdam, Amsterdam, Netherlands
关键词
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
The deployment of Share Data Spaces in open, possibly hostile, environments arises the need of protecting the confidentiality of the data space content. Existing approaches focus on access control mechanisms that protect the data space from untrusted agents. The basic assumption is that the hosts (and their administrators) where the data space is deployed have to be trusted. Encryption schemes can be used to protect the data space content from malicious hosts. However, these schemes do not allow searching on encrypted data. In this paper we present a novel encryption scheme that allows tuple matching on completely encrypted tuples. Since the data space does not need to decrypt tuples to perform the search, tuple confidentiality can be guaranteed even when the data space is deployed on malicious hosts (or an adversary gains access to the host). Our scheme does not require authorised agents to share keys for inserting and retrieving tuples. Each authorised agent can encrypt, decrypt, and search encrypted tuples; without having to know other agents' keys. This is beneficial inasmuch as it simplifies the task of key management. An implementation of an encrypted data space based on this scheme is described and some preliminary performance results are given.
引用
收藏
页码:264 / +
页数:3
相关论文
共 50 条
  • [1] Shared and searchable encrypted data for untrusted servers
    Dong, Changyu
    Russello, Giovanni
    Dulay, Naranker
    JOURNAL OF COMPUTER SECURITY, 2011, 19 (03) : 367 - 397
  • [2] Shared and searchable encrypted data for untrusted servers
    Dong, Changyu
    Russello, Giovanni
    Dulay, Naranker
    DATA AND APPLICATIONS SECURITY XXII, 2008, 5094 : 127 - 143
  • [3] Nothing is for Free: Security in Searching Shared and Encrypted Data
    Tang, Qiang
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2014, 9 (11) : 1943 - 1952
  • [4] Customizable data distribution for shared data spaces
    Russello, G
    Chaudron, M
    van Steen, M
    PDPTA'03: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED PROCESSING TECHNIQUES AND APPLICATIONS, VOLS 1-4, 2003, : 122 - 128
  • [5] A Verifiable Commitment Scheme of Encrypted Shared Data for Internet of Mobile Things
    He, Zhimin
    Tan, Weijie
    Long, Yangyang
    Yang, Yuting
    Li, Chunguo
    2024 IEEE/CIC INTERNATIONAL CONFERENCE ON COMMUNICATIONS IN CHINA, ICCC, 2024,
  • [6] Resilience needs shared and sovereign Data Spaces
    Kubach, Uwe
    ATP MAGAZINE, 2021, (11-12): : 30 - 31
  • [7] Public Integrity Auditing of Shared Encrypted Data within Cloud Storage Group
    Han, Chunxia
    Wang, Linjie
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2022, 2022
  • [8] Exploiting differentiated tuple distribution in shared data spaces
    Russello, G
    Chaudron, M
    van Steen, M
    EURO-PAR 2004 PARALLEL PROCESSING, PROCEEDINGS, 2004, 3149 : 579 - 586
  • [9] A Web solution to concurrency awareness in shared data spaces
    Thamm, J
    Wilke, S
    Wegner, L
    ADVANCES IN DATABASE TECHNOLOGIES, 1999, 1552 : 382 - 395
  • [10] Providing data confidentiality against malicious hosts in Shared Data Spaces
    Russello, Giovanni
    Dong, Changyu
    Dulay, Naranker
    Chaudron, Michel
    van Steen, Maarten
    SCIENCE OF COMPUTER PROGRAMMING, 2010, 75 (06) : 426 - 439