An Effective XML Data Release in Dynamic Environments

As XML is de facto becoming a standard for information representation and exchange in IT world, XML release methods are receiving intense attentions. The crucial requirement of XML release is scalability that affords to manage efficiently large number of users and great amounts of data. Although many existing approaches (e.g. famous SDI approach) have challenged to support XML release, because they have adopted the pre-configured key share approaches, they are not suitable for the dynamic environments characterized by the variant population, such as Peer-to-Peer, Ubiquitous and Ad-hoc networks. In this paper, we suggest a novel method that provides a more effective, reusable key share for dynamic environments by means of authorization, derive key and secret sharing scheme.

[1]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[2]  Sushil Jajodia,et al.  Flexible support for multiple access control policies , 2001, TODS.

[3]  William Stallings,et al.  Network Security Essentials: Applications and Standards , 1999 .

[4]  Laks V. S. Lakshmanan,et al.  Efficient secure query evaluation over encrypted XML databases , 2006, VLDB.

[5]  Andreas Matheus,et al.  How to Declare Access Control Policies for XML Structured Information Objects using OASIS' eXtensible Access Control Markup Language (XACML) , 2005, Proceedings of the 38th Annual Hawaii International Conference on System Sciences.

[6]  William Stallings Zhu,et al.  Network Security Essentials : Applications and Standards , 2007 .

[7]  Steven J. DeRose,et al.  XML Path Language (XPath) Version 1.0 , 1999 .

[8]  Marina Blanton,et al.  Dynamic and Efficient Key Management for Access Hierarchies , 2009, TSEC.

[9]  Mikhail J. Atallah,et al.  Dynamic and efficient key management for access hierarchies , 2005, CCS '05.

[10]  Sushil Jajodia,et al.  Over-encryption: Management of Access Control Evolution on Outsourced Data , 2007, VLDB.

[11]  Rajeev Rastogi,et al.  Efficient filtering of XML documents with XPath expressions , 2002, The VLDB Journal.

[12]  Ian T. Foster,et al.  On Death, Taxes, and the Convergence of Peer-to-Peer and Grid Computing , 2003, IPTPS.

[13]  Hector Garcia-Molina,et al.  The SIFT information dissemination system , 1999, TODS.

[14]  Diomidis Spinellis,et al.  A survey of peer-to-peer content distribution technologies , 2004, CSUR.

[15]  Gustavus J. Simmons,et al.  How to (Really) Share a Secret , 1988, CRYPTO.

[16]  Michael J. Franklin,et al.  Efficient Filtering of XML Documents for Selective Dissemination of Information , 2000, VLDB.

[17]  Detlef Schoder,et al.  Peer-to-peer prospects , 2003, CACM.

[18]  Ralph C. Merkle,et al.  A Certified Digital Signature , 1989, CRYPTO.

[19]  Elisa Bertino,et al.  Secure and selective dissemination of XML documents , 2002, TSEC.

[20]  Ravi S. Sandhu,et al.  The NIST model for role-based access control: towards a unified standard , 2000, RBAC '00.