Please wait a minute...
Frontiers of Computer Science

ISSN 2095-2228

ISSN 2095-2236(Online)

CN 10-1014/TP

Postal Subscription Code 80-970

2018 Impact Factor: 1.129

Front Comput Sci    2012, Vol. 6 Issue (6) : 677-685    https://doi.org/10.1007/s11704-012-1193-0
RESEARCH ARTICLE
Access control scheme with tracing for outsourced databases
Xiaoming WANG(), Guoxiang YAO
Department of Computer Science, Jinan University, Guangzhou 510632, China
 Download: PDF(270 KB)   HTML
 Export: BibTeX | EndNote | Reference Manager | ProCite | RefWorks
Abstract

To manage dynamic access control and deter pirate attacks on outsourced databases, a dynamic access control scheme with tracing is proposed. In our scheme, we introduce the traitor tracing idea into outsource databases, and employ a polynomial function and filter function as the basic means of constructing encryption and decryption procedures to reduce computation, communication, and storage overheads. Compared to previous access control schemes for outsourced databases, our scheme can not only protect sensitive data from leaking and perform scalable encryption at the server side without shipping the outsourced data back to the data owner when group membership is changed, but also provide trace-and-revoke features.When malicious users clone and sell their decryption keys for profit, our scheme can trace the decryption keys to the malicious users and revoke them. Furthermore, our scheme avoids massive message exchanges for establishing the decryption key between the data owner and the user. Compared to previously proposed publickey traitor tracing schemes, our scheme can simultaneously achieve full collusion resistance, full recoverability, full revocation, and black-box traceability. The proof of security and analysis of performance show that our scheme is secure and efficient.

Keywords outsourced databases      access control      malicious user tracing      adding and revoking users     
Corresponding Author(s): WANG Xiaoming,Email:wxmsq@eyou.com   
Issue Date: 01 December 2012
 Cite this article:   
Xiaoming WANG,Guoxiang YAO. Access control scheme with tracing for outsourced databases[J]. Front Comput Sci, 2012, 6(6): 677-685.
 URL:  
https://academic.hep.com.cn/fcs/EN/10.1007/s11704-012-1193-0
https://academic.hep.com.cn/fcs/EN/Y2012/V6/I6/677
1 Hacigümüus H, Iyer B, Mehrotra S, Li C. Executing SQL over encrypted data in the database-service-provider model. In: Proceedings of the ACM SIGMOD’2002 . 2002, 216-227
2 Agrawal R, Kierman J, Srikant R, Xu Y. Order preserving encryption for numeric data. In: Proceedings of ACM SIGMOD 2004 . 2004, 563-574
doi: 10.1145/1007568.1007632
3 Damiani E, Di Vimercati S D C, Foresti S, Jajodia S, Paraboschi S, Samarati P. Metadata management in outsourced encrypted databases. In: Proceedings of the 2nd VLDB Workshop on Secure Data Management . Norway, 2005, 16-32
4 Brinkman R, Doumen J, Jonker W. Using secret sharing for searching in encrypted data. In: Proceedings of the Secure Data Management Workshop . 2004, 18-27
doi: 10.1007/978-3-540-30073-1_2
5 Paraboschi S, Samarati P. Modeling and assessing inference exposure in encrypted databases. ACM Transactions on Information and System Security , 2005, 8(1): 119-152
doi: 10.1145/1053283.1053289
6 Lanovenko A, Guo H. Dynamic group key management in outsourced databases. In: Proceedings of the World Congress on Engineering and Computer Science . 2007, 22-28
7 Di Vimercati S D C, Foresti S, Jajodia S, Paraboschi S, Samarati P. Over-encryption: management of access control evolution on outsourced data. In: Proceedings of the 33rd International Conference on Very Large Data Bases . 2007, 123-134
8 Liu S, Li W, Wang L Y. Towards efficient over-encryption in outsourced databases using secret sharing. New Technologies, Mobilety and Security, Morocco , 2008, 1-5
9 Weng J, Chen M R, Chen K F, Deng R H. Cryptanalysis of a hierarchical identity-based encryption scheme. IEICE Transaction , 2010, 94-A(4): 854-856
doi: 10.1587/transfun.E93.A.854
10 Wang W, Li Z W, Owens R, Bhargava B. Secure and efficient access to outsourced data. In: Proceedings of the 2009 ACM Workshop on Cloud Computing Security , 2009, 55-56
doi: 10.1145/1655008.1655016
11 Dai J, Zhou Q. A PKI-based mechanism for secure and efficient access to outsourced data. Networking and Digital Society , 2010, 640-643
12 Watanabe Y, Hanaoka G, Imai H. Efficient asymmetric public-key traitor tracing without trusted agents. In: Proceedings of CT-RSA 2001 . Berlin: Springer-Verlag, 2001, 392-407
13 McGregor J P, Yin Y L, Ruby B. A traitor tracing scheme based on RSA for fast decryption. In: Proceedings of ACNS 2005 . Berlin: Springer-Verlag, 2005, 56-75
14 Tatsuyuki M, Hideki I. A public-key black-box traitor tracing scheme with sublinear ciphertext size against self-defensive pirates. In: Proceedings of ASIACRYPT 2004 . 2004, 260-275
15 Tzeng W G, Tzeng Z J. A public-key traitor tracing scheme with revocation using dynamic share. Designs, Codes and Cryptography , 2005, 35(1): 47-61
doi: 10.1007/s10623-003-6150-3
16 Dodis Y, Fazio N, Kiayias A, Yung M. Scalable public-key tracing and revoking. Distributed Computing , 2005, 17(4): 323-347
doi: 10.1007/s00446-004-0120-5
17 Wang Q L, Yang B, Han Z, Geng X H. Collusion-free public-key traitor tracing scheme. Journal on Communications , 2006, 27(12): 6-9
18 Boneh D, Sahai A, Waters B. Fully collusion resistant traitor tracing with short ciphertexts and private keys. In: Proceedings of the 13th ACM Conf on Computer and Communications Security . 2006, 211-220
19 Wang Q L, Han Z, Yang B. A traitor tracing scheme based on bilinear map. Journal of Computer Research and Developmen , 2009, 46(3): 384-389
20 Boneh D, Waters B. A full collusion resistant broadcast, trace, and revoke system. In: Proceedings of EUROCRYPT 2006 . Berlin: Springer- Verlag, 2006, 573-592
[1] Han Yao HUANG, Kyung Tae KIM, Hee Yong YOUN. Determining node duty cycle using Q-learning and linear regression for WSN[J]. Front. Comput. Sci., 2021, 15(1): 151101-.
[2] Yan CAO, Zhiqiu HUANG, Yaoshen YU, Changbo KE, Zihao WANG. A topology and risk-aware access control framework for cyber-physical space[J]. Front. Comput. Sci., 2020, 14(4): 144805-.
[3] Qiong ZUO, Meiyi XIE, Guanqiu QI, Hong ZHU. Tenant-based access control model for multi-tenancy and sub-tenancy architecture in Software-as-a-Service[J]. Front. Comput. Sci., 2017, 11(3): 465-484.
[4] Li LIN,Jian HU,Jianbiao ZHANG. Packet: a privacy-aware access control policy composition method for services composition in cloud environments[J]. Front. Comput. Sci., 2016, 10(6): 1142-1157.
[5] Rahat MASOOD,Muhammad Awais SHIBLI,Yumna GHAZI,Ayesha KANWAL,Arshad ALI. Cloud authorization: exploring techniques and approach towards effective access control framework[J]. Front. Comput. Sci., 2015, 9(2): 297-321.
[6] Defu CHEN, Zhengsu TAO. An adaptive polling interval and short preamble media access control protocol for wireless sensor networks[J]. Front Comput Sci Chin, 2011, 5(3): 300-307.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed