Distributed and secure access control in P2P databases

Angela Bonifati, Ruilin Liu, Hui Wang

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

5 Scopus citations

Abstract

The intent of peer data management systems (PDMS) is to share as much data as possible. However, in many applications leveraging sensitive data, users demand adequate mechanisms to restrict the access to authorized parties. In this paper, we study a distributed access control model, where data items are stored, queried and authenticated in a totally decentralized fashion. Our contribution focuses on the design of a comprehensive framework for access control enforcement in PDMS sharing secure data, which blends policy rules defined in a declarative language with distributed key management schemes. The data owner peer decides which data to share and whom to share with by means of such policies, with the data encrypted accordingly. To defend against malicious attackers who can compromise the peers, the decryption keys are decomposed into pieces scattered amongst peers. We discuss the details of how to adapt distributed encryption schemes to PDMS to enforce robust and resilient access control, and demonstrate the efficiency and scalability of our approach by means of an extensive experimental study.

Original languageEnglish
Title of host publicationData and Applications Security and Privacy XXIV - 24th Annual IFIP WG 11.3 Working Conference, Proceedings
Pages113-129
Number of pages17
DOIs
StatePublished - 2010
Event24th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy - Rome, Italy
Duration: 21 Jun 201021 Jun 2010

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume6166 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference24th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy
Country/TerritoryItaly
CityRome
Period21/06/1021/06/10

Fingerprint

Dive into the research topics of 'Distributed and secure access control in P2P databases'. Together they form a unique fingerprint.

Cite this