Selective and authentic third-party distribution of XML documents

被引:55
作者
Bertino, E
Carminati, B
Ferrari, E
Thuraisingham, B
Gupta, A
机构
[1] Purdue Univ, CERIAS, W Lafayette, IN 47907 USA
[2] Purdue Univ, CS Dept, W Lafayette, IN 47907 USA
[3] Univ Insubria, Dipartimenti Sci Cultura Polit & Informat, I-22100 Como, Italy
[4] MITRE Bedford, Bedford, MA 01730 USA
[5] Univ Arizona, Eller Coll Management, Tucson, AZ 85721 USA
关键词
secure publishing; third-party publication; XML; authentication; completeness;
D O I
10.1109/TKDE.2004.63
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Third-party architectures for data publishing over the Internet today are receiving growing attention, due to their scalability properties and to the ability of efficiently managing large number of subjects and great amount of data. In a third-party architecture, there is a distinction between the Owner and the Publisher of information. The Owner is the producer of information, whereas Publishers are responsible for managing (a portion of) the Owner information and for answering subject queries. A relevant issue in this architecture is how the Owner can ensure a secure and selective publishing of its data, even if the data are managed by a third-party, which can prune some of the nodes of the original document on the basis of subject queries and access control policies. An approach can be that of requiring the Publisher to be trusted with regard to the considered security properties. However, the serious drawback of this solution is that large Web-based systems cannot be easily verified to be secure and can be easily penetrated. For these reasons, in this paper, we propose an alternative approach, based on the use of digital signature techniques, which does not require the Publisher to be trusted. The security properties we consider are authenticity and completeness of a query response, where completeness is intended with regard to the access control policies stated by the information Owner. In particular, we show that, by embedding in the query response one digital signature generated by the Owner and some hash values, a subject is able to locally verify the authenticity of a query response. Moreover, we present an approach that, for a wide range of queries, allows a subject to verify the completeness of query results.
引用
收藏
页码:1263 / 1278
页数:16
相关论文
共 17 条
  • [1] Securing XML documents with author-X
    Bertino, E
    Castano, S
    Ferrari, E
    [J]. IEEE INTERNET COMPUTING, 2001, 5 (03) : 21 - 31
  • [2] Bertino E., 2001, P 6 ACM S ACCESS CON, P57, DOI [10.1145/373256.373264, DOI 10.1145/373256.373264]
  • [3] Bertino E., 2002, P 9 ACM C COMP COMM, P31
  • [4] CHARANJIT S, 1996, P 2 US WORKSH EL COM
  • [5] CRANOR L, 1997, P TEL POL RES C SEPT
  • [6] DEVANBU P, 2000, P 14 ANN IFIP WG 11
  • [7] DEVANBU P, 2001, P 8 ACM C COMP COMM
  • [8] HACIGUMUS H, 2002, P SIGMOD C
  • [9] HACIGUMUS H, 2002, P INT C DAT ENG
  • [10] MARUYAMA H, 2004, DIGEST VALUES DOM DO