期刊文献+

外包数据库的安全访问控制机制 被引量:2

Security Access Control Mechanism of Outsourced Database
下载PDF
导出
摘要 通过对外包数据库双层加密方案的分析,指出存在授权用户可以将资源访问授权给其他非授权用户的安全缺陷,为此,提出一个改进的安全外包数据访问控制方案。该方案利用二元一次函数诱导产生加密密钥。为适应访问控制策略动态变化,防止非授权用户访问资源,通过双重加密实现授权访问动态变化。分析结果表明,改进方案能够克服外包数据库双层加密方案的安全缺陷,可实现策略动态更新,是一个安全高效的访问控制方案。 Through the analysis of outsourced database two layer encryption scheme,its security flaw is pointed out,that is,authorized users can easy authorized other non-authorized user to access to resource.An improved scheme that can derive the encryption key by using linear equation in two unknowns is proposed.To adapt to access policy changes avoiding re-encryption for the data owner,this scheme exploits a two layer encryption scheme to prevent non-authorized users to access resource.Analysis shows that this scheme not only can overcome the flaws of the original program but also adapt to dynamic changes.It is a safe and efficient access control scheme.
作者 麻浩 王晓明
出处 《计算机工程》 CAS CSCD 北大核心 2011年第9期173-175,共3页 Computer Engineering
基金 国家自然科学基金资助项目(61070164) 广东省自然科学基金资助项目(8151063201000022) 广东省科技计划基金资助项目(2010B010600025)
关键词 外包数据库 访问控制 数据加密 密钥管理 隐私保护 outsourced database access control data encryption key management privacy preservation
  • 相关文献

参考文献6

  • 1Damiani E,Vimercati S D C D,Foresti S,et al.Metadata Management in Outsourced Encrypted Databases[C]//Proc.of the 4th VLDB Workshop on Secure Data Management.Heidelberg,Germany:Springer-Verlag,2007.
  • 2Vimercati S D C D,Foresti S,Jajodia S,et al.A Data Outsourcing Architecture Combining Cryptography and Access Control[C]//Proc.of ACM Workshop on Computer Security Architecture.[S.l.]:ACM Press,2007.
  • 3Vimercati S D C D,Foresti S,Jajodia S,et al.Over-encryption:Management of Access Control Evolution on Outsourced Data[C]//Proc.of International Conference on Very Large Data Bases.Vienna,Austria:[s.n.],2007.
  • 4Liu Shuai,Li Wei,Wang Lingyu.Towards Efficient Overencryption in Outsourced Databases Using Secret Sharing[C]//Proc.of the 2nd IFIP International Conference on New Technologies,Mobility and Security.[S.l.]:ACM Press,2008.
  • 5袁多宝,王晓明.基于MH树的外包数据库查询验证方法[J].计算机工程,2010,36(4):115-117. 被引量:9
  • 6田秀霞,王晓玲,高明,周傲英.数据库服务——安全与隐私保护[J].软件学报,2010,21(5):991-1006. 被引量:61

二级参考文献60

  • 1Hacigumus H, Mehrotra S, Iyer B, et al. Providing Database as a Service[C]//Proc. of the 18th International Conference on Data Engineering. San Jose, CA, USA: IEEE Computer Society, 2002.
  • 2Merkle R C. Protocols for Public Key Cryptosystems[C]//Proc. of IEEE Symposium on Research in Security and Privacy. [S. l.]: IEEE Press, 1980.
  • 3Devanbu P, Gertz M, Martel C, et al. Authentic Third-party Data Publication[C]//Proc. of the 14th IFIP TCll/WGI1.3 Annual Working Conference on Database Security. Schood, Netherlands: [s. n.], 2000.
  • 4Mykletun E, Narasimha M, Tsudik G DSAC: Integrity for Outsoumed Databases with Signature Aggregation and Chaining[C]//Proc. of ACM CIKM'05. New York, USA: ACM Press, 2005.
  • 5Li Feifei, Marios H, George K, et al. Dynamic Authenticated Index Structures for Outsourced Database[C]//Proc. ofACM SIGMOD'06 Chicago, Illinois, USA: ACM Press, 2006.
  • 6Kyriakos M, Dimitris S, HweeHwa Pang. Partially Materialized Digest Scheme: An Efficient Verification Method for Outsourced Databases[J]. VLDB, 2009, 18(1): 345-362.
  • 7Hacigümüs H,Mehrotra S,Iyer B.Providing database as a service.In:Proc.of the Int'l Conf.on Data Engineering.Washington:IEEE Computer Society Press,2002.29-38.
  • 8Mykletun E,Narasimha M,Tsudik G.Authentication and integrity in outsourced databases.ACM Trans.on Storage,2006,2(2):107-138.
  • 9Schneier B,Wrote; Wu SZ,Zhu SX,Zhang WZ,Trans.Applied Cryptography-Protocols,Algorithms,and Source Code in C (Second Edition).Beijing:China Machine Press,2006 (in Chinese).
  • 10Shmueli E,Waisenberg R,Elovici Y,Gudes E.Designing secure indexes for encrypted databases.In:Proc.of the IFIP Conf.on Database and Applications Security.LNCS 3654,Heidelberg,Berlin:Springer-Verlag,2005.54-68.

共引文献67

同被引文献7

  • 1Buyya R, Yeo C S, Venugopal S. Market-oriented Cloud Computing: Vision, Hype, and Reality for Delivering IT Services as Computing Utilities[C] //Proc. of the 10th IEEE Int’l Conf. on High Performance Computing and Communication. Dalian, China, [s. n.] , 2008.
  • 2Sotomayor B, Montero R S, Lorente I M, et al. Virual Infrastructure Management in Private and Hybrid Clouds[J]. IEEE Internet Computing, 2009, 13(5): 14-22.
  • 3Burns R C, Rees R M, Darrel D E L. Semi-preemptible Locks for a Distributed File System[C] //Proc. of International Performance Computing and Communication Conference. Phoenix, USA: [s. n.] , 2000, 397-404.
  • 4Jaechun N. Data Consistency Protocol for Distributed File Systems[C] //Proc. of Conf. on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications. Rende, Italy: [s. n.] , 2009.
  • 5Choi Sung-Chune, Choi Min-Seuk, Lee Chun-Kyeong, et al. Distributed Lock Manager for Distributed File System in Shared-disk Environment[C] //Proc. of the 10th Int’l Conference on Computer and Information Technology. Bradford, UK: [s. n.] , 2010.
  • 6袁多宝,王晓明.基于MH树的外包数据库查询验证方法[J].计算机工程,2010,36(4):115-117. 被引量:9
  • 7田秀霞,王晓玲,高明,周傲英.数据库服务——安全与隐私保护[J].软件学报,2010,21(5):991-1006. 被引量:61

引证文献2

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部