File Download

There are no files associated with this item.

  Links for fulltext
     (May Require Subscription)
Supplementary

Conference Paper: When query authentication meets fine-grained access control: A zero-knowledge approach

TitleWhen query authentication meets fine-grained access control: A zero-knowledge approach
Authors
KeywordsQuery processing
Fine-grained access control
Data integrity
Issue Date2018
Citation
Proceedings of the ACM SIGMOD International Conference on Management of Data, 2018, p. 147-162 How to Cite?
Abstract© 2018 Association for Computing Machinery. Query authentication has been extensively studied to ensure the integrity of query results for outsourced databases, which are often not fully trusted. However, access control, another important security concern, is largely ignored by existing works. Notably, recent breakthroughs in cryptography have enabled fine-grained access control over outsourced data. In this paper, we take the first step toward studying the problem of authenticating relational queries with fine-grained access control. The key challenge is how to protect information confidentiality during query authentication, which is essential to many critical applications. To address this challenge, we propose a novel access-policy-preserving (APP) signature as the primitive authenticated data structure. A useful property of the APP signature is that it can be used to derive customized signatures for unauthorized users to prove the inaccessibility while achieving the zero-knowledge confidentiality. We also propose a grid-indexbased tree structure that can aggregate APP signatures for efficient range and join query authentication. In addition to this, a number of optimization techniques are proposed to further improve the authentication performance. Security analysis and performance evaluation show that the proposed solutions and techniques are robust and efficient under various system settings.
Persistent Identifierhttp://hdl.handle.net/10722/280666
ISSN
2023 SCImago Journal Rankings: 2.640
ISI Accession Number ID

 

DC FieldValueLanguage
dc.contributor.authorXu, Cheng-
dc.contributor.authorXu, Jianliang-
dc.contributor.authorHu, Haibo-
dc.contributor.authorAu, Man Ho-
dc.date.accessioned2020-02-17T14:34:37Z-
dc.date.available2020-02-17T14:34:37Z-
dc.date.issued2018-
dc.identifier.citationProceedings of the ACM SIGMOD International Conference on Management of Data, 2018, p. 147-162-
dc.identifier.issn0730-8078-
dc.identifier.urihttp://hdl.handle.net/10722/280666-
dc.description.abstract© 2018 Association for Computing Machinery. Query authentication has been extensively studied to ensure the integrity of query results for outsourced databases, which are often not fully trusted. However, access control, another important security concern, is largely ignored by existing works. Notably, recent breakthroughs in cryptography have enabled fine-grained access control over outsourced data. In this paper, we take the first step toward studying the problem of authenticating relational queries with fine-grained access control. The key challenge is how to protect information confidentiality during query authentication, which is essential to many critical applications. To address this challenge, we propose a novel access-policy-preserving (APP) signature as the primitive authenticated data structure. A useful property of the APP signature is that it can be used to derive customized signatures for unauthorized users to prove the inaccessibility while achieving the zero-knowledge confidentiality. We also propose a grid-indexbased tree structure that can aggregate APP signatures for efficient range and join query authentication. In addition to this, a number of optimization techniques are proposed to further improve the authentication performance. Security analysis and performance evaluation show that the proposed solutions and techniques are robust and efficient under various system settings.-
dc.languageeng-
dc.relation.ispartofProceedings of the ACM SIGMOD International Conference on Management of Data-
dc.subjectQuery processing-
dc.subjectFine-grained access control-
dc.subjectData integrity-
dc.titleWhen query authentication meets fine-grained access control: A zero-knowledge approach-
dc.typeConference_Paper-
dc.description.naturelink_to_subscribed_fulltext-
dc.identifier.doi10.1145/3183713.3183741-
dc.identifier.scopuseid_2-s2.0-85048820745-
dc.identifier.spage147-
dc.identifier.epage162-
dc.identifier.isiWOS:000460373700010-
dc.identifier.issnl0730-8078-

Export via OAI-PMH Interface in XML Formats


OR


Export to Other Non-XML Formats