Confidentiality and integrity in distributed data exchange

作者: Dan Suciu , Gerome Miklau

DOI:

关键词: CollusionInternet privacyAuthenticationRelational databaseComputer securityConfidentialityComputer scienceData exchangeConstruct (python library)EncryptionData access

摘要: The distributed exchange of structured data has emerged on the World Wide Web because it promises efficiency, easy collaboration, and—through integration diverse sources—the discovery new trends and insights. Along with these benefits, however, there is also danger that exchanged will be disclosed inappropriately or modified by unauthorized parties. This dissertation provides conceptual practical tools for ensuring confidentiality integrity across heterogeneous systems. Securing in such settings challenging participants may behave maliciously, their remote systems are outside control owner. addresses challenges, first developing a precise analysis information disclosure result from publishing relational data. critical prerequisite to forming policy permitting denying access novel notion presented here can capture leaks collusion multiple parties, prior knowledge they possess. then problems safely efficiently guaranteeing security properties To provide confidentiality, flexible fine-grained encryption framework proposed which allows owners construct, set policies, single encrypted database stored all Access granted separately disseminating keys. integrity, an efficient authentication mechanism described used detect tampering when untrusted database. Together techniques significantly advance exchange.

参考文章(113)
Lois M. L. Delcambre, David Maier, Superimposed Information for the Internet. WebDB (Informal Proceedings). pp. 1- 9 ,(1999)
Dan Suciu, Gerome Miklau, Cryptographically Enforced Conditional Access for XML. international workshop on the web and databases. pp. 101- 106 ,(2002)
Dan Suciu, Gerome Miklau, Managing Integrity for Data Exchanged on the Web international workshop on the web and databases. pp. 13- 18 ,(2005)
Stuart E. Madnick, Stéphane Bressan, Thomas Lee, Source Attribution for Querying Against Semi-structured Documents. web information and data management. pp. 33- 39 ,(1998)
Nicolas Spyratos, François Bancilhon, Protection of information in relational data bases very large data bases. pp. 494- 500 ,(1977)
Ronald L Rivest, Len Adleman, Michael L Dertouzos, ON DATA BANKS AND PRIVACY HOMOMORPHISMS ,(1978)
Steven J. DeRose, James W. Clark, XML Path Language (XPath) ,(1999)
Daniele Micciancio, Bogdan Warinschi, Soundness of Formal Encryption in the Presence of Active Adversaries theory of cryptography conference. pp. 133- 151 ,(2004) , 10.1007/978-3-540-24638-1_8
Alan F. Westin, Privacy and freedom ,(1970)