Privacy-preserving authentication of trees and graphs

被引:0
|
作者
Ashish Kundu
Elisa Bertino
机构
[1] Yorktown Heights,IBM T J Watson Research Center
[2] Purdue University,Computer Science and CERIAS
关键词
Authenticity; Leakage-free; Privacy; Trees; Graphs;
D O I
暂无
中图分类号
学科分类号
摘要
Secure data sharing in third-party environments such as the cloud requires that both authenticity and confidentiality of the data be assured, especially when such structures encode sensitive information (such as in XML documents). Existing authentication schemes for trees and directed acyclic graphs (DAGs) are authenticity-preserving, but not confidentiality-preserving, and lead to leakage of sensitive information during authentication. In this paper, we propose a family of three leakage-free authentication schemes for (1) tree data structures, (2) directed acyclic graphs (DAGs), and (3) graphs (with cycles), which are also efficient. This family of schemes referred to as the “structural signatures” is based on the structure of the tree as defined by tree traversals and aggregate signatures. We also show through complexity and performance analysis that our scheme is practical in terms of the cost for authentication of data. We have also discussed two applications of the proposed scheme: (1) automatic correction and recovery from structural errors, and (2) secure publish /subscribe of XML documents.
引用
收藏
页码:467 / 494
页数:27
相关论文
共 50 条
  • [21] Privacy-Preserving Graph Operations for Mobile Authentication
    Li, Peng
    Zhou, Fucai
    Xu, Zifeng
    Li, Yuxi
    Xu, Jian
    [J]. WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2020, 2020
  • [22] A Generic Model for Privacy-Preserving Authentication on Smartphones
    Keykhaie, Sepehr
    Pierre, Samuel
    [J]. 2021 15TH ANNUAL IEEE INTERNATIONAL SYSTEMS CONFERENCE (SYSCON 2021), 2021,
  • [23] A Lightweight Privacy-Preserving Authentication Protocol for VANETs
    Li, Xiong
    Liu, Tian
    Obaidat, Mohammad S.
    Wu, Fan
    Vijayakumar, Pandi
    Kumar, Neeraj
    [J]. IEEE SYSTEMS JOURNAL, 2020, 14 (03): : 3547 - 3557
  • [24] A novel privacy-preserving biometric authentication scheme
    Mao, Xuechun
    Chen, Ying
    Deng, Cong
    Zhou, Xiaqing
    [J]. PLOS ONE, 2023, 18 (05):
  • [25] Novel and Efficient Privacy-Preserving Continuous Authentication
    Baig, Ahmed Fraz
    Eskeland, Sigurd
    Yang, Bian
    [J]. CRYPTOGRAPHY, 2024, 8 (01)
  • [26] Distributed Aggregate Privacy-Preserving Authentication in VANETs
    Zhang, Lei
    Wu, Qianhong
    Domingo-Ferrer, Josep
    Qin, Bo
    Hu, Chuanyan
    [J]. IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2017, 18 (03) : 516 - 526
  • [27] Privacy-Preserving Gradient Boosting Decision Trees
    Li, Qinbin
    Wu, Zhaomin
    Wen, Zeyi
    He, Bingsheng
    [J]. THIRTY-FOURTH AAAI CONFERENCE ON ARTIFICIAL INTELLIGENCE, THE THIRTY-SECOND INNOVATIVE APPLICATIONS OF ARTIFICIAL INTELLIGENCE CONFERENCE AND THE TENTH AAAI SYMPOSIUM ON EDUCATIONAL ADVANCES IN ARTIFICIAL INTELLIGENCE, 2020, 34 : 784 - 791
  • [28] Privacy-Preserving Decision Trees Training and Prediction
    Akavia, Adi
    Leibovich, Max
    Resheff, Yehezkel S.
    Ron, Roey
    Shahar, Moni
    Vald, Margarita
    [J]. MACHINE LEARNING AND KNOWLEDGE DISCOVERY IN DATABASES, ECML PKDD 2020, PT I, 2021, 12457 : 145 - 161
  • [29] Privacy-Preserving Inductive Learning with Decision Trees
    Truex, Stacey
    Liu, Ling
    Gursoy, Mehmet Emre
    Yu, Lei
    [J]. 2017 IEEE 6TH INTERNATIONAL CONGRESS ON BIG DATA (BIGDATA CONGRESS 2017), 2017, : 57 - 64
  • [30] Privacy-Preserving Decision Trees Training and Prediction
    Akavia, Adi
    Leibovich, Max
    Resheff, Yehezkel S.
    Ron, Roey
    Shahar, Moni
    Vald, Margarita
    [J]. ACM TRANSACTIONS ON PRIVACY AND SECURITY, 2022, 25 (03)