首页> 外文会议>DBSec 2013 >Access Control and Query Verification for Untrusted Databases
【24h】

Access Control and Query Verification for Untrusted Databases

机译:对不可信任的数据库访问控制和查询验证

获取原文

摘要

With the advent of Cloud Computing, data are increasingly being stored and processed by untrusted third-party servers on the Internet. Since the data owner lacks direct control over the hardware and the software running at the server, there is a need to ensure that the data are not read or modified by unauthorized entities. Even though a simple encryption of the data before transferring it to the server ensures that only authorized entities who have the private key can access the data, it has many drawbacks. Encryption alone does not ensure that the retrieved query results are trustworthy (e.g., retrieved values are the latest values and not stale). A simple encryption can not enforce access control policies where each entity has access rights to only a certain part of the database. In this paper, we provide a solution to enforce access control policies while ensuring the trustworthiness of the data. Our solution ensures that a particular data item is read and modified by only those entities who have been authorized by the data owner to access that data item. It provides privacy against malicious entities that somehow get access to the data stored at the server. Our solutions allow easy change in access control policies under the lazy revocation model under which a user’s access to a subset of the data can be revoked so that the user can not read any new values in that subset of the data. Our solution also provides correctness and completeness verification of query results in the presence of access control policies. We implement our solution in a prototype system built on top of Oracle with no modifications to the database internals. We also provide an empirical evaluation of the proposed solutions and establish their feasibility.
机译:随着云计算的出现,数据越来越多地存储和处理Internet上的不可信的第三方服务器。由于数据所有者缺乏对硬件的直接控制和服务器上运行的软件,因此需要确保未经授权的实体读取或修改数据。即使在将数据传输到服务器之前的数据简单加密确保只有拥有私钥的授权实体可以访问数据,但它有很多缺点。单独加密不确保检索到的查询结果是值得信赖的(例如,检索值是最新值而不是陈旧)。简单的加密无法强制执行访问控制策略,其中每个实体只有仅权访问数据库的某一部分。在本文中,我们提供了一个解决方案来强制执行访问控制策略,同时确保数据的可信度。我们的解决方案确保仅通过数据所有者授权的实体读取和修改特定数据项来访问该数据项。它为恶意实体提供了隐私,以某种方式访问​​存储在服务器上的数据。我们的解决方案允许在延迟撤销模型下轻松更改访问控制策略,在该延迟撤销模型下可以撤销用户对数据子集的访问,以便用户无法在该数据的子集中读取任何新值。我们的解决方案还提供了对访问控制策略的查询结果的正确性和完整性验证。我们在构建在Oracle之上的原型系统中实现了我们的解决方案,没有对数据库内部的修改。我们还提供了对提出的解决方案的实证评估,并建立了可行性。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号