Over-encryption: management of access control evolution on outsourced data

作者: Stefano Paraboschi , Sara Foresti , Sabrina De Capitani di Vimercati , Sushil Jajodia , Pierangela Samarati

DOI:

关键词:

摘要: Data outsourcing is emerging today as a successful paradigm allowing users and organizations to exploit external services for the distribution of resources. A crucial problem be addressed in this context concerns enforcement selective authorization policies support policy updates dynamic scenarios. In paper, we present novel solution access control management its evolution. Our proposal based on application encryption means enforce authorizations. Two layers are imposed data: inner layer by owner providing initial protection, outer server reflect modifications. The combination two provides an efficient robust solution. paper presents model, algorithm layers, analysis identify therefore counteract possible information exposure risks.

参考文章(17)
Bruce Schneier, John Kelsey, Doug Whiting, David Wagner, Chris Hall, Niels Ferguson, On the Twofish Key Schedule selected areas in cryptography. pp. 27- 42 ,(1998) , 10.1007/3-540-48892-8_3
Gerome Miklau, Dan Suciu, Controlling access to published data using cryptography very large data bases. pp. 898- 909 ,(2003) , 10.1016/B978-012722442-8/50084-7
E. Damiani, S. De Vimercati, S. Foresti, S. Jajodia, S. Paraboschi, P. Samarati, An Experimental Evaluation of Multi-Key Strategies for Data Outsourcing information security conference. ,vol. 232, pp. 385- 396 ,(2007) , 10.1007/978-0-387-72367-9_33
J.-C. Birget, X. Zou, G. Noubir, B. Ramamurthy, Hierarchy-based access control in distributed environments international conference on communications. ,vol. 1, pp. 229- 233 ,(2001) , 10.1109/ICC.2001.936308
Sushil Jajodia, Pierangela Samarati, Maria Luisa Sapino, V. S. Subrahmanian, Flexible support for multiple access control policies ACM Transactions on Database Systems. ,vol. 26, pp. 214- 260 ,(2001) , 10.1145/383891.383894
Selim G. Akl, Peter D. Taylor, Cryptographic solution to a problem of access control in a hierarchy ACM Transactions on Computer Systems. ,vol. 1, pp. 239- 248 ,(1983) , 10.1145/357369.357372
Hakan Hacigümüş, Bala Iyer, Chen Li, Sharad Mehrotra, Executing SQL over encrypted data in the database-service-provider model Proceedings of the 2002 ACM SIGMOD international conference on Management of data - SIGMOD '02. pp. 216- 227 ,(2002) , 10.1145/564691.564717
Einar Mykletun, Maithili Narasimha, Gene Tsudik, Authentication and integrity in outsourced databases ACM Transactions on Storage. ,vol. 2, pp. 107- 138 ,(2006) , 10.1145/1149976.1149977
Alberto Ceselli, Ernesto Damiani, Sabrina De Capitani Di Vimercati, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati, None, Modeling and assessing inference exposure in encrypted databases ACM Transactions on Information and System Security. ,vol. 8, pp. 119- 152 ,(2005) , 10.1145/1053283.1053289
Marina Blanton, Nelly Fazio, KB Frikken, Dynamic and efficient key management for access hierarchies Proceedings of the 12th ACM conference on Computer and communications security - CCS '05. pp. 190- 202 ,(2005) , 10.1145/1102120.1102147