Securely sharing data in encrypted databases

被引:0
|
作者
Yu, Lihua [1 ]
Chen, Gang [1 ]
Chen, Ke [1 ]
Dong, Jinxiang [1 ]
机构
[1] Zhejiang Univ, Coll Comp Sci, Hangzhou 310027, Peoples R China
关键词
data sharing; access control; RBAC; database encryption;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Collaborative design and application integration emphasize the demand for database security. Database encryption is widely adopted to ensure data privacy, which can prevent attacks from both outside intruders and inside malicious users. Current researches on this area are mainly focusing on encryption algorithms, key management and encryption efficiency. However, data sharing nature of database system is usually neglected. In this paper, we propose an access control model, 3S-RBAC, which enables data sharing while guaranteeing privacy. The model has many features: the novel concept of strong permission and weak permission; the hierarchy of database objects and keys; the permission and key inheritance; the binding of keys and permissions. Implementation in OSCAR Secure DBMS shows that the model is flexible, secure, practical, and can be integrated easily into existing enterprise applications.
引用
收藏
页码:957 / 962
页数:6
相关论文
共 50 条
  • [21] Authorized Equality Test of Encrypted Data for Secure Cloud Databases
    Ma, Sha
    2018 17TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (IEEE TRUSTCOM) / 12TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (IEEE BIGDATASE), 2018, : 223 - 230
  • [22] Selective Sharing of Outsourced Encrypted Data in Cloud Environments
    Sifah, Emmanuel Boateng
    Xia, Qi
    Xia, Hu
    Agyekum, Kwame Opuni-Boachie Obour
    Acheampong, Kingsley Nketia
    Cobblah, Christian Nii Aflah
    Gao, Jianbin
    IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (18) : 14141 - 14155
  • [23] The Phish-Market Protocol: Securely Sharing Attack Data between Competitors
    Moran, Tal
    Moore, Tyler
    FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, 2010, 6052 : 222 - 237
  • [24] Sharing Enterprise Cloud Securely at IBM
    Chen, Longbin
    DeJana, Ryan
    Nassar, Tamer
    IT PROFESSIONAL, 2021, 23 (01) : 67 - 71
  • [25] Securely Sharing Randomized Code That Flies
    Jelesnianski, Christopher
    Yom, Jinwoo
    Min, Changwoo
    Jang, Yeongjin
    DIGITAL THREATS: RESEARCH AND PRACTICE, 2022, 3 (03):
  • [26] A data sharing and integration technology for heterogeneous databases
    Zhu, Yongjie
    Li, Youcheng
    International Journal of Circuits, Systems and Signal Processing, 2022, 16 : 232 - 238
  • [27] Reflective data sharing in managing Internet databases
    Bouguettaya, A
    Benatallah, B
    Edmond, D
    18TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS, PROCEEDINGS, 1998, : 172 - 181
  • [28] XML's impact on databases and data sharing
    Seligman, L
    Rosenthal, A
    COMPUTER, 2001, 34 (06) : 59 - +
  • [29] CloudDBGuard: Enabling Sorting and Searching on Encrypted Data in NoSQL Cloud Databases
    Waage, Tim
    Wiese, Lena
    BIG DATA ANALYTICS AND KNOWLEDGE DISCOVERY (DAWAK 2018), 2018, 11031 : 261 - 270
  • [30] An Efficient Secure System for Fetching Data From the Outsourced Encrypted Databases
    Almakdi, Sultan
    Panda, Brajendra
    Alshehri, Mohammed S.
    Alazeb, Abdulwahab
    IEEE ACCESS, 2021, 9 : 78474 - 78494