Securely sharing data in encrypted databases

被引:0
|
作者
Yu, Lihua [1 ]
Chen, Gang [1 ]
Chen, Ke [1 ]
Dong, Jinxiang [1 ]
机构
[1] Zhejiang Univ, Coll Comp Sci, Hangzhou 310027, Peoples R China
关键词
data sharing; access control; RBAC; database encryption;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Collaborative design and application integration emphasize the demand for database security. Database encryption is widely adopted to ensure data privacy, which can prevent attacks from both outside intruders and inside malicious users. Current researches on this area are mainly focusing on encryption algorithms, key management and encryption efficiency. However, data sharing nature of database system is usually neglected. In this paper, we propose an access control model, 3S-RBAC, which enables data sharing while guaranteeing privacy. The model has many features: the novel concept of strong permission and weak permission; the hierarchy of database objects and keys; the permission and key inheritance; the binding of keys and permissions. Implementation in OSCAR Secure DBMS shows that the model is flexible, secure, practical, and can be integrated easily into existing enterprise applications.
引用
收藏
页码:957 / 962
页数:6
相关论文
共 50 条
  • [1] Securely Sharing Encrypted Medical Information
    Gupta, Arnab Deb
    Polyakov, Yuriy
    Rohloff, Kurt
    Ryan, Gerard
    2016 IEEE FIRST INTERNATIONAL CONFERENCE ON CONNECTED HEALTH: APPLICATIONS, SYSTEMS AND ENGINEERING TECHNOLOGIES (CHASE), 2016, : 330 - 331
  • [2] Sharing session keys in encrypted databases
    Tang, Yi
    ICEBE 2006: IEEE INTERNATIONAL CONFERENCE ON E-BUSINESS ENGINEERING, PROCEEDINGS, 2006, : 47 - 54
  • [3] Securely sharing access to sensitive data
    Begg, Norman
    Network Security, 2013, 2013 (07) : 15 - 18
  • [4] Efficient sharing of encrypted data
    Bennett, K
    Grothoff, C
    Horozov, T
    Patrascu, I
    INFORMATION SECURITY AND PRIVACY, 2002, 2384 : 107 - 120
  • [5] Securely Computing Clustering Coefficient for Outsourced Dynamic Encrypted Graph Data
    Sardar, Laltu
    Bansal, Gaurav
    Ruj, Sushmita
    Sakurai, Kouichi
    2021 INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS & NETWORKS (COMSNETS), 2021, : 465 - 473
  • [6] A Blockchain-based Verification for Sharing Data Securely
    Liu, Yu
    Chen, Haopeng
    Hu, Fei
    PROCEEDINGS OF 2017 IEEE INTERNATIONAL CONFERENCE ON PROGRESS IN INFORMATICS AND COMPUTING (PIC 2017), 2017, : 249 - 253
  • [7] Efficiently Managing Encrypted Data in Cloud Databases
    Ben Omran, Osama M.
    Panda, Brajendra
    2015 IEEE 2ND INTERNATIONAL CONFERENCE ON CYBER SECURITY AND CLOUD COMPUTING (CSCLOUD), 2015, : 266 - 271
  • [8] Encrypted Data Group Authentication for Outsourced Databases
    Jang, Miyoung
    Jo, Ara
    Chang, Jae-Woo
    UBIQUITOUS COMPUTING APPLICATION AND WIRELESS SENSOR, 2015, 331 : 695 - 705
  • [9] Encryption Switching Service: Securely Switch Your Encrypted Data to Another Format
    Jiang, Peng
    Ning, Jianting
    Liang, Kaitai
    Dong, Changyu
    Chen, Jiageng
    Cao, Zhenfu
    IEEE TRANSACTIONS ON SERVICES COMPUTING, 2021, 14 (05) : 1357 - 1369
  • [10] Design and analysis of querying encrypted data in relational databases
    Canim, Mustafa
    Kantarcioglu, Murat
    DATA AND APPLICATIONS SECURITY XXI, PROCEEDINGS, 2007, 4602 : 177 - +