Distributed access control: a privacy-conscious approach

With more and more information being exchanged or published on the Web or in peer-to-peer, and with the significant growth in numbers of distributed, heterogeneous data sources, issues like access control and data privacy are becoming increasingly complex and difficult to manage. Very often, when dealing with sensitive information in such settings, the specification of access control policies and their enforcement are no longer handled by the actual data sources, and are (partially) delegated to third-parties. Besides practical reasons, this is the case when decisions regarding access depend on factors which overpass the scope and knowledge of some of the entities involved. More specifically, policies may depend on private aspects concerning users (accessing data) or data owners. In this case, the only solution is to entrust some third-party authority with all the information needed to apply access policies. However, as the policies themselves depend on sensitive information, this outsourcing raises new privacy issues, that were not present in centralized environments. In particular, information leaks may occur during access control enforcement. In this paper, we consider these issues and, starting from non-conventional digital signatures, we take a first step towards an implementation solution for such settings where both data and access policies are distributed. Our approach involves rewriting user queries into forms which are authorized, and we illustrate this for both structured (relational) and semi-structured (XML) data and queries.

[1]  Elisa Bertino,et al.  An Update Protocol for XML Documents in Distributed and Cooperative Systems , 2005, 25th IEEE International Conference on Distributed Computing Systems (ICDCS'05).

[2]  Moni Naor,et al.  Anti-persistence: history independent data structures , 2001, STOC '01.

[3]  S. Sudarshan,et al.  Extending query rewriting techniques for fine-grained access control , 2004, SIGMOD '04.

[4]  Christian Damsgaard Jensen,et al.  Partial outsourcing: a new paradigm for access control , 2003, SACMAT '03.

[5]  Hakan Hacigümüs,et al.  Providing database as a service , 2002, Proceedings 18th International Conference on Data Engineering.

[6]  BertinoElisa,et al.  Secure and selective dissemination of XML documents , 2002 .

[7]  Scott Boag,et al.  XQuery 1.0 : An XML Query Language , 2007 .

[8]  Christian Damsgaard Jensen,et al.  Cryptographic access control in a distributed file system , 2003, SACMAT '03.

[9]  Amos Fiat,et al.  Digital signatures for modifiable collections , 2006, First International Conference on Availability, Reliability and Security (ARES'06).

[10]  Sabrina De Capitani di Vimercati,et al.  An access control model for querying XML data , 2005, SWS '05.

[11]  Michael Benedikt,et al.  XPath leashed , 2009, CSUR.

[12]  Sabrina De Capitani di Vimercati,et al.  A fine-grained access control system for XML documents , 2002, TSEC.

[13]  Oded Goldreich,et al.  Foundations of Cryptography: Basic Tools , 2000 .

[14]  Rafail Ostrovsky,et al.  Replication is not needed: single database, computationally-private information retrieval , 1997, Proceedings 38th Annual Symposium on Foundations of Computer Science.

[15]  Laks V. S. Lakshmanan,et al.  Optimizing the Secure Evaluation of Twig Queries , 2002, VLDB.

[16]  Serge Abiteboul,et al.  An Electronic Patient Record "on Steroids": Distributed, Peer-to-Peer, Secure and Privacy-conscious , 2004, VLDB.

[17]  Michael Benedikt,et al.  XML Subtree Queries: Specification and Composition , 2005, DBPL.

[18]  WhitsonGeorge Health Level Seven , 2009, Definitions.

[19]  Elisa Bertino,et al.  An infrastructure for managing secure update operations on XML data , 2003, SACMAT '03.

[20]  Steven J. DeRose,et al.  XML Path Language (XPath) Version 1.0 , 1999 .

[21]  Sushil Jajodia,et al.  Balancing confidentiality and efficiency in untrusted relational DBMSs , 2003, CCS '03.

[22]  Dawn Xiaodong Song,et al.  Homomorphic Signature Schemes , 2002, CT-RSA.

[23]  Dan Suciu,et al.  Containment and equivalence for an XPath fragment , 2002, PODS.

[24]  Elisa Bertino,et al.  Secure and selective dissemination of XML documents , 2002, TSEC.

[25]  Eyal Kushilevitz,et al.  Private information retrieval , 1998, JACM.

[26]  Peter Stañski,et al.  Content extraction signatures using XML digital signatures and custom transforms on-demand , 2003, WWW '03.

[27]  Elisa Bertino,et al.  Selective and authentic third-party distribution of XML documents , 2004, IEEE Transactions on Knowledge and Data Engineering.

[28]  Jan Hidders,et al.  Query Translation for XPath-Based Security Views , 2006, EDBT Workshops.

[29]  Charles A. Shoniregun,et al.  Securing XML Documents , 2004, Australas. J. Inf. Syst..

[30]  Maarten Marx,et al.  Specifying access control policies for XML documents with XPath , 2004, SACMAT '04.

[31]  Sushil Jajodia,et al.  The inference problem: a survey , 2002, SKDD.

[32]  Markus Lupp,et al.  Extensible Markup Language , 2008, Encyclopedia of GIS.

[33]  Alberto O. Mendelzon,et al.  Authorization-Transparent Access Control for XML Under the Non-Truman Model , 2006, EDBT.

[34]  Wenfei Fan,et al.  Secure XML querying with security views , 2004, SIGMOD '04.