Updating encrypted XML documents on untrusted machines

被引:0
|
作者
Reddy, P [1 ]
Mayo, RN [1 ]
O'Brien-Strain, E [1 ]
Rowson, J [1 ]
Xiong, YH [1 ]
机构
[1] Hewlett Packard Labs, Palo Alto, CA 94304 USA
关键词
XML; security; incremental cryptography; XOR MACS; incremental change support;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With XML and other data types becoming increasingly used in distributed systems, we have a need to update this data in a way that preserves privacy and integrity. Prior work has developed ways of encrypting XML documents for privacy, and adding integrity codes to ensure that the data is not tampered with. In this paper we present an algorithm that allows XML documents, or other tree-structured data, to be updated without decrypting them. In our model of a distributed system, several trusted machines have access to the decrypted form of a document and may request changes to it. These change requests are encrypted and sent to an untrusted update machine for processing. The update machine is able to take the original encrypted document, apply the encrypted changes, and produce an updated encrypted document. In addition, an integrity code is produced that proves the untrusted machine performed the update correctly. In practice, our algorithm allows trusted machines in a distributed system to send incremental updates to a storage server, even if that server is not allowed access to the clear text.
引用
收藏
页码:425 / 439
页数:15
相关论文
共 50 条
  • [1] Querying encrypted XML documents
    Jammalamadaka, Ravi Chandra
    Mehrotra, Sharad
    [J]. 10TH INTERNATIONAL DATABASE ENGINEERING AND APPLICATIONS SYMPOSIUM, PROCEEDINGS, 2006, : 129 - 136
  • [2] Updating multidimensional XML documents
    Fousteris, Nikolaos
    Gergatsoulis, Manolis
    Stavrakas, Yannis
    [J]. INTERNATIONAL JOURNAL OF WEB INFORMATION SYSTEMS, 2008, 4 (02) : 142 - +
  • [3] Efficient XQuery over Encrypted XML Documents
    Rauf, Azhar
    Ali, Waqas
    Ahmed, Maher
    Khusro, Shah
    Ali, Shaukat
    [J]. 10TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE & EDUCATION (ICCSE 2015), 2015, : 159 - 162
  • [4] Computation and Search over Encrypted XML Documents
    Poon, Hoi Ting
    Miri, Ali
    [J]. 2015 IEEE INTERNATIONAL CONGRESS ON BIG DATA - BIGDATA CONGRESS 2015, 2015, : 631 - 634
  • [5] Updating XML Documents Without Breaking their Validity
    Dargham, Joumana
    Alti, Zeina
    Karam, Marcel
    [J]. 2008 3RD INTERNATIONAL CONFERENCE ON INTERNET AND WEB APPLICATIONS AND SERVICES (ICIW 2008), 2008, : 342 - +
  • [6] A survey on querying encrypted XML documents for databases as a service
    Unay, Ozan
    Gundem, Taflan I.
    [J]. SIGMOD RECORD, 2008, 37 (01) : 12 - 20
  • [7] Efficient Tree Pattern Queries On Encrypted XML Documents
    Rao, Fang-Yu
    Cao, Jianneng
    Kuzu, Mehmet
    Bertino, Elisa
    Kantarcioglu, Murat
    [J]. TRANSACTIONS ON DATA PRIVACY, 2013, 6 (03) : 199 - 226
  • [8] Developing an efficient query system for encrypted XML documents
    Chang, Tao-Ku
    Hwang, Gwan-Hwan
    [J]. JOURNAL OF SYSTEMS AND SOFTWARE, 2011, 84 (08) : 1292 - 1305
  • [9] Updating XML Schemas and Associated Documents through EXup
    Cavalieri, Federico
    Guerrini, Giovanna
    Mesiti, Marco
    [J]. IEEE 27TH INTERNATIONAL CONFERENCE ON DATA ENGINEERING (ICDE 2011), 2011, : 1320 - 1323
  • [10] PARALLEL PROCESSING OF ENCRYPTED XML DOCUMENTS IN DATABASE AS A SERVICE CONCEPT
    Unay, Ozan
    Gundem, Taflan Imre
    [J]. INFORMATION TECHNOLOGY AND CONTROL, 2010, 39 (04): : 301 - 309