Securely sharing data in encrypted databases

被引:0
|
作者
Yu, Lihua [1 ]
Chen, Gang [1 ]
Chen, Ke [1 ]
Dong, Jinxiang [1 ]
机构
[1] Zhejiang Univ, Coll Comp Sci, Hangzhou 310027, Peoples R China
关键词
data sharing; access control; RBAC; database encryption;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Collaborative design and application integration emphasize the demand for database security. Database encryption is widely adopted to ensure data privacy, which can prevent attacks from both outside intruders and inside malicious users. Current researches on this area are mainly focusing on encryption algorithms, key management and encryption efficiency. However, data sharing nature of database system is usually neglected. In this paper, we propose an access control model, 3S-RBAC, which enables data sharing while guaranteeing privacy. The model has many features: the novel concept of strong permission and weak permission; the hierarchy of database objects and keys; the permission and key inheritance; the binding of keys and permissions. Implementation in OSCAR Secure DBMS shows that the model is flexible, secure, practical, and can be integrated easily into existing enterprise applications.
引用
收藏
页码:957 / 962
页数:6
相关论文
共 50 条
  • [31] Adopting secret sharing for reversible data hiding in encrypted images
    Wu, Xiaotian
    Weng, Jian
    Yan, WeiQi
    SIGNAL PROCESSING, 2018, 143 : 269 - 281
  • [32] On Minimizing the Size of Encrypted Databases
    Di Crescenzo, Giovanni
    Shallcross, David
    DATA AND APPLICATIONS SECURITY AND PRIVACY XXVIII, 2014, 8566 : 364 - 372
  • [33] A framework for searching encrypted databases
    Alves, Pedro G. M. R.
    Aranha, Diego F.
    JOURNAL OF INTERNET SERVICES AND APPLICATIONS, 2018, 9 (09)
  • [34] SafeBox: A Scheme for Searching and Sharing Encrypted Data in Cloud Applications
    Wang, Guofeng
    Liu, Chuanyi
    Dong, Yingfei
    Pan, Hezhong
    Han, Peiyi
    Fang, Binxing
    2017 INTERNATIONAL CONFERENCE ON SECURITY, PATTERN ANALYSIS, AND CYBERNETICS (SPAC), 2017, : 648 - 653
  • [35] Searchable Encrypted Data Sharing Scheme Based on Inverted Index
    Liu, Wei
    Bai, Xiaodan
    She, Wei
    Song, Xuan
    Tian, Zhao
    Computer Engineering and Applications, 2023, 59 (10) : 270 - 279
  • [36] Encrypted Databases: Progresses and Challenges
    Ren, Kui
    ASIA CCS'21: PROCEEDINGS OF THE 2021 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2021, : 628 - 628
  • [37] Experiments with queries over encrypted data using secret sharing
    Brinkman, R
    Schoenmakers, B
    Doumen, J
    Jonker, W
    SECURE DATA MANAGEMENT, PROCEEDINGS, 2005, 3674 : 33 - 46
  • [38] Databases, data access, and data sharing in paleoanthropology: First steps
    Delson, Eric
    Harcourt-Smith, William E. H.
    Frost, Stephen R.
    Christopher, A.
    EVOLUTIONARY ANTHROPOLOGY, 2007, 16 (05): : 161 - 163
  • [39] Querying Encrypted Graph Databases
    Aburawi, Nahla
    Lisitsa, Alexei
    Coenen, Frans
    ICISSP: PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY, 2018, : 447 - 451
  • [40] Anti-tamper databases: Querying encrypted databases
    Ozsoyoglu, G
    Singer, DA
    Chung, SS
    DATA AND APPLICATIONS SECURITY XVII: STATUS AND PROSPECTS, 2004, 142 : 133 - 146