Provable bounds for portable and flexible privacy-preserving access

In this work we address the problem of portable and flexible privacy-preserving access rights for large online data repositories. Privacy-preserving access control means that the service provider can neither learn what access rights a customer has nor link a request to access an item to a particular customer, thus maintaining privacy of both customer activity and customer access rights. Flexible access rights allow any customer to choose any subset of items from the repository and correspondingly be charged only for the items selected. And portability of access rights means that the rights themselves can be stored on small devices of limited storage space and computational capabilities, and therefore the rights must be enforced using the limited resources available.Our main results are solutions to the problem that utilize minimal perfect hash functions and order-preserving minimal perfect hash functions. None of them use expensive cryptography, all require very little space, and they are therefore suitable for computationally weak and space-limited devices such as smartcards, sensors, etc. Performance of the schemes is measured as the probability of false positives (i.e., the probability that access to an unpurchased item will be permitted) for a given storage space bound. Using our techniques, for a data repository of size n and subscription order of m ll n items, we achieve a probability of false positives of m-c using only O(cm) bits of storage space, where c is an adjustable parameter (a constant or otherwise) that can be set to provide the desired performance. This is the first time that such provable bounds are established for this problem, and we believe the techniques we use are of more general interest through the unusual use we make of perfect hashing.

[1]  Mikhail J. Atallah,et al.  Enhanced smart-card based license management , 2003, EEE International Conference on E-Commerce, 2003. CEC 2003..

[2]  Edward A. Fox,et al.  Order-preserving minimal perfect hash functions and information retrieval , 1991, TOIS.

[3]  Giovanni Di Crescenzo,et al.  Communication-efficient anonymous group identification , 1998, CCS '98.

[4]  George Havas,et al.  An Optimal Algorithm for Generating Minimal Perfect Hash Functions , 1992, Inf. Process. Lett..

[5]  Joe Kilian,et al.  Identity Escrow , 1998, CRYPTO.

[6]  Marc Joye,et al.  A Practical and Provably Secure Coalition-Resistant Group Signature Scheme , 2000, CRYPTO.

[7]  Elisa Bertino,et al.  Securing XML Documents with Author-X , 2001, IEEE Internet Comput..

[8]  Jongseong Kim Anonymous Authentication Protocol for Dynamic Groups with Power-Limited Devices , 2002 .

[9]  Elisa Bertino,et al.  Secure and selective dissemination of XML documents , 2002, TSEC.

[10]  Elisa Bertino,et al.  Selective and authentic third-party distribution of XML documents , 2004, IEEE Transactions on Knowledge and Data Engineering.

[11]  Matthew K. Franklin,et al.  Anonymous authentication with subset queries (extended abstract) , 1999, CCS '99.

[12]  Elisa Bertino,et al.  On specifying security policies for web documents with an XML-based language , 2001, SACMAT '01.

[13]  Edward A. Fox,et al.  Practical minimal perfect hash functions for large databases , 1992, CACM.

[14]  Sabrina De Capitani di Vimercati,et al.  A fine-grained access control system for XML documents , 2002, TSEC.

[15]  Michael Mitzenmacher,et al.  Compressed bloom filters , 2001, PODC '01.

[16]  Xiaotie Deng,et al.  Design and Security Analysis of Anonymous Group Identification Protocols , 2002, Public Key Cryptography.

[17]  Dieter Gollmann,et al.  Software License Management with Smart Cards , 1999, Smartcard.

[18]  Paul F. Syverson,et al.  Unlinkable serial transactions: protocols and applications , 1999, TSEC.

[19]  Mikhail J. Atallah,et al.  Succinct specifications of portable document access policies , 2004, SACMAT '04.

[20]  Jan Camenisch,et al.  A Group Signature Scheme with Improved Efficiency , 1998, ASIACRYPT.

[21]  Stuart E. Schechter,et al.  Anonymous Authentication of Membership in Dynamic Groups , 1999, Financial Cryptography.

[22]  David Chaum,et al.  Untraceable electronic mail, return addresses, and digital pseudonyms , 1981, CACM.

[23]  Andrei Broder,et al.  Network Applications of Bloom Filters: A Survey , 2004, Internet Math..

[24]  Paul F. Syverson,et al.  Unlinkable Serial Transactions , 1997, Financial Cryptography.

[25]  Ivan Visconti,et al.  A secure and private system for subscription-based remote services , 2003, TSEC.

[26]  Edward A. Fox,et al.  A faster algorithm for constructing minimal perfect hash functions , 1992, SIGIR '92.

[27]  Sandra Payette,et al.  Policy-Carrying, Policy-Enforcing Digital Objects , 2000, ECDL.

[28]  Burton H. Bloom,et al.  Space/time trade-offs in hash coding with allowable errors , 1970, CACM.

[29]  Michael Gertz,et al.  Flexible authentication of XML documents , 2001, CCS '01.

[30]  Mikhail J. Atallah,et al.  Portable and Flexible Document Access Control Mechanisms , 2004, ESORICS.

[31]  Li Fan,et al.  Summary cache: a scalable wide-area web cache sharing protocol , 2000, TNET.