File Download
There are no files associated with this item.
Links for fulltext
(May Require Subscription)
- Publisher Website: 10.1145/3183713.3183741
- Scopus: eid_2-s2.0-85048820745
- WOS: WOS:000460373700010
- Find via
Supplementary
- Citations:
- Appears in Collections:
Conference Paper: When query authentication meets fine-grained access control: A zero-knowledge approach
Title | When query authentication meets fine-grained access control: A zero-knowledge approach |
---|---|
Authors | |
Keywords | Query processing Fine-grained access control Data integrity |
Issue Date | 2018 |
Citation | Proceedings of the ACM SIGMOD International Conference on Management of Data, 2018, p. 147-162 How to Cite? |
Abstract | © 2018 Association for Computing Machinery. Query authentication has been extensively studied to ensure the integrity of query results for outsourced databases, which are often not fully trusted. However, access control, another important security concern, is largely ignored by existing works. Notably, recent breakthroughs in cryptography have enabled fine-grained access control over outsourced data. In this paper, we take the first step toward studying the problem of authenticating relational queries with fine-grained access control. The key challenge is how to protect information confidentiality during query authentication, which is essential to many critical applications. To address this challenge, we propose a novel access-policy-preserving (APP) signature as the primitive authenticated data structure. A useful property of the APP signature is that it can be used to derive customized signatures for unauthorized users to prove the inaccessibility while achieving the zero-knowledge confidentiality. We also propose a grid-indexbased tree structure that can aggregate APP signatures for efficient range and join query authentication. In addition to this, a number of optimization techniques are proposed to further improve the authentication performance. Security analysis and performance evaluation show that the proposed solutions and techniques are robust and efficient under various system settings. |
Persistent Identifier | http://hdl.handle.net/10722/280666 |
ISSN | 2023 SCImago Journal Rankings: 2.640 |
ISI Accession Number ID |
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Xu, Cheng | - |
dc.contributor.author | Xu, Jianliang | - |
dc.contributor.author | Hu, Haibo | - |
dc.contributor.author | Au, Man Ho | - |
dc.date.accessioned | 2020-02-17T14:34:37Z | - |
dc.date.available | 2020-02-17T14:34:37Z | - |
dc.date.issued | 2018 | - |
dc.identifier.citation | Proceedings of the ACM SIGMOD International Conference on Management of Data, 2018, p. 147-162 | - |
dc.identifier.issn | 0730-8078 | - |
dc.identifier.uri | http://hdl.handle.net/10722/280666 | - |
dc.description.abstract | © 2018 Association for Computing Machinery. Query authentication has been extensively studied to ensure the integrity of query results for outsourced databases, which are often not fully trusted. However, access control, another important security concern, is largely ignored by existing works. Notably, recent breakthroughs in cryptography have enabled fine-grained access control over outsourced data. In this paper, we take the first step toward studying the problem of authenticating relational queries with fine-grained access control. The key challenge is how to protect information confidentiality during query authentication, which is essential to many critical applications. To address this challenge, we propose a novel access-policy-preserving (APP) signature as the primitive authenticated data structure. A useful property of the APP signature is that it can be used to derive customized signatures for unauthorized users to prove the inaccessibility while achieving the zero-knowledge confidentiality. We also propose a grid-indexbased tree structure that can aggregate APP signatures for efficient range and join query authentication. In addition to this, a number of optimization techniques are proposed to further improve the authentication performance. Security analysis and performance evaluation show that the proposed solutions and techniques are robust and efficient under various system settings. | - |
dc.language | eng | - |
dc.relation.ispartof | Proceedings of the ACM SIGMOD International Conference on Management of Data | - |
dc.subject | Query processing | - |
dc.subject | Fine-grained access control | - |
dc.subject | Data integrity | - |
dc.title | When query authentication meets fine-grained access control: A zero-knowledge approach | - |
dc.type | Conference_Paper | - |
dc.description.nature | link_to_subscribed_fulltext | - |
dc.identifier.doi | 10.1145/3183713.3183741 | - |
dc.identifier.scopus | eid_2-s2.0-85048820745 | - |
dc.identifier.spage | 147 | - |
dc.identifier.epage | 162 | - |
dc.identifier.isi | WOS:000460373700010 | - |
dc.identifier.issnl | 0730-8078 | - |