Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/2699026.2699135acmconferencesArticle/Chapter ViewAbstractPublication PagescodaspyConference Proceedingsconference-collections
poster

ABSS: An Attribute-based Sanitizable Signature for Integrity of Outsourced Database with Public Cloud

Published: 02 March 2015 Publication History

Abstract

Database outsourcing is an important application of cloud computing, and security is one of the most critical concerns in adopting this application model, such as data privacy, query privacy, etc. Data integrity is another essential requirement for outsourced database system. When the database is outsourced to public cloud, the situation is more complex as different users may modify the data and these users may hold different privileges for different parts of the database. Furthermore, as the cloud is in charge of the management of the database, users have to rely on the cloud to guarantee data integrity. We propose ABSS to protect the integrity of outsourced database which supports fine-grained modification policy. ABSS utilizes an attribute based sanitizable signature scheme, which combining the ingredients of attribute based encryption and sanitizable signature. ABSS enables the database owner to deploy fine-grained policy of database modification and can detect illegal modifications without trusting the cloud. We also discuss the security properties and performance of ABSS to show its practicability.

References

[1]
Apache. Accumulo https://accumulo.apache.org/.
[2]
G. Ateniese, D. H. Chou, B. de Medeiros, and G. Tsudik. Sanitizable signatures. In S. D. C. di Vimercati, P. F. Syverson, and D. Gollmann, editors, European Symposium on Research in Computer Security - ESORICS 2005, volume 7459 of LNCS, pages 159--177. Springer-Verlag, 2005.
[3]
G. Ateniese and B. de Medeiros. On the key exposure problem in chameleon hashes. In C. Blundo and S. Cimato, editors, Security in Communication Networks - SCN 2004, volume 3352 of LNCS, pages 165--179. Springer-Verlag, 2004.
[4]
S. Bajaj and R. Sion. TrustedDB: A trusted hardware-based database with privacy and data confidentiality. IEEE Transactions on Knowledge and Data Engineering, 26(3):752--765, 2014.
[5]
J. Bethencourt, A. Sahai, and B. Waters. Ciphertext-policy attribute-based encryption. In IEEE Symposium on Security and Privacy - S&P 2007, pages 321--334. IEEE Computer Society, 2007.
[6]
Y. Deswarte, J.-J. Quisquater, and A. Saïdane. Remote integrity checking. In Integrity and Internal Control in Information Systems VI, pages 1--11. Springer, 2004.
[7]
H. Hacigumus, B. R. Iyer, C. Li, and S. Mehrotra. Executing sql over encrypted data in the database-service-provider model. In M. J. Franklin, B. Moon, and A. Ailamaki, editors, Proceedings of the ACM International Conference on Management of Data - SIGMOD 2002, pages 216--227. ACM, 2002.
[8]
H. Hacigumus, B. Iyer, and S. Mehrotra. Ensuring the integrity of encrypted databases in the database-as-a-service model. In Data and Applications Security XVII, pages 61--74. Springer, 2004.
[9]
M. Klonowski and A. Lauks. Extended sanitizable signatures. In M. S. Rhee and B. Lee, editors, Information Security and Cryptology - ICISC 2006, volume 4296 of LNCS, pages 343--355. Springer-Verlag, 2006.
[10]
M. Narasimha and G. Tsudik. Dsac: integrity for outsourced databases with signature aggregation and chaining. In Proceedings of the 14th ACM international conference on Information and knowledge management, pages 235--236. ACM, 2005.
[11]
R. Sion. Query execution assurance for outsourced databases. In Proceedings of the 31st international conference on Very large data bases, pages 601--612. VLDB Endowment, 2005.
[12]
H. Wang, J. Yin, C.-s. Perng, C.-s., and P. S. Yu. Dual encryption for query integrity assurance. In Proceedings of the 17th ACM conference on Information and knowledge management, pages 863--872. ACM, 2008.
[13]
Y. Zhu, H. Wang, Z. Hu, G.-J. Ahn, H. Hu, and S. S. Yau. Dynamic audit services for integrity verification of outsourced storages in clouds. In Proceedings of the 2011 ACM Symposium on Applied Computing, pages 1550--1557. ACM, 2011.

Cited By

View all
  • (2022)Fine-Grained and Controllably Editable Data Sharing With Accountability in Cloud StorageIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2021.310040119:5(3448-3463)Online publication date: 1-Sep-2022
  • (2018)FABSS: Attribute-Based Sanitizable Signature for Flexible Access StructureInformation and Communications Security10.1007/978-3-319-89500-0_3(39-50)Online publication date: 10-Apr-2018
  • (2017)SecureNoSQLInternational Journal of Information Management: The Journal for Information Professionals10.1016/j.ijinfomgt.2016.11.00537:2(63-74)Online publication date: 1-Apr-2017
  • Show More Cited By

Index Terms

  1. ABSS: An Attribute-based Sanitizable Signature for Integrity of Outsourced Database with Public Cloud

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    CODASPY '15: Proceedings of the 5th ACM Conference on Data and Application Security and Privacy
    March 2015
    362 pages
    ISBN:9781450331913
    DOI:10.1145/2699026
    Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 02 March 2015

    Check for updates

    Author Tags

    1. access control
    2. cloud computing
    3. cloud storage
    4. database
    5. integrity

    Qualifiers

    • Poster

    Conference

    CODASPY'15
    Sponsor:

    Acceptance Rates

    CODASPY '15 Paper Acceptance Rate 19 of 91 submissions, 21%;
    Overall Acceptance Rate 149 of 789 submissions, 19%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)11
    • Downloads (Last 6 weeks)2
    Reflects downloads up to 21 Nov 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2022)Fine-Grained and Controllably Editable Data Sharing With Accountability in Cloud StorageIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2021.310040119:5(3448-3463)Online publication date: 1-Sep-2022
    • (2018)FABSS: Attribute-Based Sanitizable Signature for Flexible Access StructureInformation and Communications Security10.1007/978-3-319-89500-0_3(39-50)Online publication date: 10-Apr-2018
    • (2017)SecureNoSQLInternational Journal of Information Management: The Journal for Information Professionals10.1016/j.ijinfomgt.2016.11.00537:2(63-74)Online publication date: 1-Apr-2017
    • (2016)A survey of big data managementJournal of Network and Computer Applications10.1016/j.jnca.2016.04.00871:C(151-166)Online publication date: 1-Aug-2016

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media