Privacy-preserving authentication of trees and graphs

被引:0
|
作者
Ashish Kundu
Elisa Bertino
机构
[1] Yorktown Heights,IBM T J Watson Research Center
[2] Purdue University,Computer Science and CERIAS
关键词
Authenticity; Leakage-free; Privacy; Trees; Graphs;
D O I
暂无
中图分类号
学科分类号
摘要
Secure data sharing in third-party environments such as the cloud requires that both authenticity and confidentiality of the data be assured, especially when such structures encode sensitive information (such as in XML documents). Existing authentication schemes for trees and directed acyclic graphs (DAGs) are authenticity-preserving, but not confidentiality-preserving, and lead to leakage of sensitive information during authentication. In this paper, we propose a family of three leakage-free authentication schemes for (1) tree data structures, (2) directed acyclic graphs (DAGs), and (3) graphs (with cycles), which are also efficient. This family of schemes referred to as the “structural signatures” is based on the structure of the tree as defined by tree traversals and aggregate signatures. We also show through complexity and performance analysis that our scheme is practical in terms of the cost for authentication of data. We have also discussed two applications of the proposed scheme: (1) automatic correction and recovery from structural errors, and (2) secure publish /subscribe of XML documents.
引用
收藏
页码:467 / 494
页数:27
相关论文
共 50 条
  • [1] Privacy-preserving authentication of trees and graphs
    Kundu, Ashish
    Bertino, Elisa
    [J]. INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2013, 12 (06) : 467 - 494
  • [2] Privacy-preserving authentication for general directed graphs in industrial IoT
    Zhu, Fei
    Wu, Wei
    Zhang, Yuexin
    Chen, Xiaofeng
    [J]. INFORMATION SCIENCES, 2019, 502 : 218 - 228
  • [3] Privacy-Preserving Implicit Authentication
    Safa, Nashad Ahmed
    Safavi-Naini, Reihaneh
    Shahandashti, Siamak F.
    [J]. ICT SYSTEMS SECURITY AND PRIVACY PROTECTION, IFIP TC 11 INTERNATIONAL CONFERENCE, SEC 2014, 2014, 428 : 471 - 484
  • [4] Privacy-Preserving Fingercode Authentication
    Barni, Mauro
    Bianchi, Tiziano
    Catalano, Dario
    Di Raimondo, Mario
    Labati, Ruggero Donida
    Failla, Pierluigi
    [J]. MM&SEC 2010: 2010 ACM SIGMM MULTIMEDIA AND SECURITY WORKSHOP, PROCEEDINGS, 2010, : 231 - 240
  • [5] Efficient privacy-preserving implicit authentication
    Blanco-Justicia, Alberto
    Domingo-Ferrer, Josep
    [J]. COMPUTER COMMUNICATIONS, 2018, 125 : 13 - 23
  • [6] PRIVACY-PRESERVING AUTHENTICATION USING FINGERPRINT
    Feng, Quan
    Su, Fei
    Cai, Anni
    [J]. INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2012, 8 (11): : 8001 - 8018
  • [7] Practical Privacy-Preserving Authentication for SSH
    Roy, Lawrence
    Lyakhov, Stanislav
    Jang, Yeongjin
    Rosulek, Mike
    [J]. PROCEEDINGS OF THE 31ST USENIX SECURITY SYMPOSIUM, 2022, : 3345 - 3362
  • [8] Robust Privacy-Preserving Fingerprint Authentication
    Zhang, Ye
    Koushanfar, Farinaz
    [J]. PROCEEDINGS OF THE 2016 IEEE INTERNATIONAL SYMPOSIUM ON HARDWARE ORIENTED SECURITY AND TRUST (HOST), 2016, : 1 - 6
  • [9] A privacy-preserving multifactor authentication system
    Acar, Abbas
    Liu, Wenyi
    Beyah, Raheem
    Akkaya, Kemal
    Uluagac, Arif Selcuk
    [J]. SECURITY AND PRIVACY, 2019, 2 (05):
  • [10] Privacy-Preserving Authentication Protocols in Vanet
    Nath H.J.
    Choudhury H.
    [J]. SN Computer Science, 4 (5)