Skip to main content

2019 | OriginalPaper | Buchkapitel

An Encrypted Database with Enforced Access Control and Blockchain Validation

verfasst von : Zhimei Sui, Shangqi Lai, Cong Zuo, Xingliang Yuan, Joseph K. Liu, Haifeng Qian

Erschienen in: Information Security and Cryptology

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Data privacy and integrity is top of mind for modern data applications. To tackle with the above issue, we propose an encrypted database system with access control capabilities and blockchain validation in this paper. Compared to the existing encrypted database system, our design proposes a proxy-free architecture, which avoids the need for a trusted proxy for access control. In order to protect the integrity of user data, our system leverages the blockchain technology to realize a tampering protection mechanism. The mechanism ensures that modification logging is compulsory and public-available but hardened. Users can validate and easily detect the tampered data. Finally, we implement a prototype system and conduct evaluations on each component of the proposed system.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Fußnoten
1
For every column, we use a new private key \(key_j\) to encrypt the data.
 
2
Since SKE is deterministic, the SKE ciphertexts are the same if the underlying data is identical.
 
3
The NoSQL database has a wide variety of data models, including key-value, document, columnar and graph formats.
 
Literatur
1.
Zurück zum Zitat Cai, C., Yuan, X., Wang, C.: Hardening distributed and encrypted keyword search via Blockchain. In: IEEE PAC 2017, pp. 119–128 (2017) Cai, C., Yuan, X., Wang, C.: Hardening distributed and encrypted keyword search via Blockchain. In: IEEE PAC 2017, pp. 119–128 (2017)
2.
Zurück zum Zitat Cai, C., Yuan, X., Wang, C.: Towards trustworthy and private keyword search in encrypted decentralized storage. In: IEEE ICC 2017, pp. 1–7 (2017) Cai, C., Yuan, X., Wang, C.: Towards trustworthy and private keyword search in encrypted decentralized storage. In: IEEE ICC 2017, pp. 1–7 (2017)
3.
Zurück zum Zitat Date, C.J., Darwen, H.: A guide to the SQL Standard: A User’s Guide to The Standard Relational Language SQL. Addison-Wesley, Boston (1989) Date, C.J., Darwen, H.: A guide to the SQL Standard: A User’s Guide to The Standard Relational Language SQL. Addison-Wesley, Boston (1989)
4.
Zurück zum Zitat Davida, G.I., Wells, D.L., Kam, J.B.: A database encryption system with subkeys. ACM Trans. Database Syst. 6(2), 312–328 (1981)MathSciNetCrossRef Davida, G.I., Wells, D.L., Kam, J.B.: A database encryption system with subkeys. ACM Trans. Database Syst. 6(2), 312–328 (1981)MathSciNetCrossRef
5.
Zurück zum Zitat Davida, G.I., Wells, D.L., Kam, J.B.: Database Encryption and Decryption Circuit and Method Using Subkeys. U.S. Patent 4,375,579 (1983) Davida, G.I., Wells, D.L., Kam, J.B.: Database Encryption and Decryption Circuit and Method Using Subkeys. U.S. Patent 4,375,579 (1983)
6.
Zurück zum Zitat Delfs, H., Knebl, H.: Symmetric-key encryption. Introduction to Cryptography, pp. 11–31 (2007)MATH Delfs, H., Knebl, H.: Symmetric-key encryption. Introduction to Cryptography, pp. 11–31 (2007)MATH
7.
Zurück zum Zitat Friedlmaier, M., Tumasjan, A., Welpe, I.: Disrupting industries With Blockchain: the industry. Venture Capital Funding, and Regional Distribution of Blockchain Ventures (2016). Accessed 16 Jan 2017 Friedlmaier, M., Tumasjan, A., Welpe, I.: Disrupting industries With Blockchain: the industry. Venture Capital Funding, and Regional Distribution of Blockchain Ventures (2016). Accessed 16 Jan 2017
8.
Zurück zum Zitat Han, J., Haihong, E., Le, G., Du, J.: Survey on NoSQL Database. In: IEEE ICPCA 2011, pp. 363–366 (2011) Han, J., Haihong, E., Le, G., Du, J.: Survey on NoSQL Database. In: IEEE ICPCA 2011, pp. 363–366 (2011)
9.
Zurück zum Zitat Hecht, R., Jablonski, S.: NoSQL evaluation: a use case oriented survey. In: IEEE ICCSC 2011, pp. 336–341 (2011) Hecht, R., Jablonski, S.: NoSQL evaluation: a use case oriented survey. In: IEEE ICCSC 2011, pp. 336–341 (2011)
12.
Zurück zum Zitat Lai, S., et al.: Result pattern hiding searchable encryption for conjunctive queries. In: ACM CCS 2018, pp. 745–762 (2018) Lai, S., et al.: Result pattern hiding searchable encryption for conjunctive queries. In: ACM CCS 2018, pp. 745–762 (2018)
14.
Zurück zum Zitat Lei, A., Cruickshank, H., Cao, Y., Asuquo, P., Ogah, C.P.A., Sun, Z.: Blockchain-based dynamic key management for heterogeneous intelligent transportation systems. IEEE Internet Things J. 4(6), 1832–1843 (2017)CrossRef Lei, A., Cruickshank, H., Cao, Y., Asuquo, P., Ogah, C.P.A., Sun, Z.: Blockchain-based dynamic key management for heterogeneous intelligent transportation systems. IEEE Internet Things J. 4(6), 1832–1843 (2017)CrossRef
17.
Zurück zum Zitat Mettler, M.: Blockchain technology in healthcare: the revolution starts here. In: IEEE HealthCom 2016, pp. 1–3 (2016) Mettler, M.: Blockchain technology in healthcare: the revolution starts here. In: IEEE HealthCom 2016, pp. 1–3 (2016)
18.
Zurück zum Zitat Miller, F.P., Vandome, A.F., McBrewster, J.: Advanced Encryption Standard. Alpha Press, Orlando (2009) Miller, F.P., Vandome, A.F., McBrewster, J.: Advanced Encryption Standard. Alpha Press, Orlando (2009)
21.
Zurück zum Zitat Popa, R.A., Redfield, C., Zeldovich, N., Balakrishnan, H.: CryptDB: protecting confidentiality with encrypted query processing. In: ACM SOSP 2011, pp. 85–100 (2011) Popa, R.A., Redfield, C., Zeldovich, N., Balakrishnan, H.: CryptDB: protecting confidentiality with encrypted query processing. In: ACM SOSP 2011, pp. 85–100 (2011)
22.
Zurück zum Zitat Shmueli, E., Vaisenberg, R., Elovici, Y., Glezer, C.: Database encryption: an overview of contemporary challenges and design considerations. ACM SIGMOD Record 38(3), 29–34 (2010)CrossRef Shmueli, E., Vaisenberg, R., Elovici, Y., Glezer, C.: Database encryption: an overview of contemporary challenges and design considerations. ACM SIGMOD Record 38(3), 29–34 (2010)CrossRef
23.
Zurück zum Zitat Sun, S.F., et al.: Practical backward-secure searchable encryption from symmetric puncturable encryption. In: ACM CCS 2018, pp. 763–780 (2018) Sun, S.F., et al.: Practical backward-secure searchable encryption from symmetric puncturable encryption. In: ACM CCS 2018, pp. 763–780 (2018)
24.
Zurück zum Zitat Wang, C., Chow, S.S., Wang, Q., Ren, K., Lou, W.: Privacy-preserving public auditing for secure cloud storage. IEEE Trans. Comput. 62(2), 362–375 (2013)MathSciNetCrossRef Wang, C., Chow, S.S., Wang, Q., Ren, K., Lou, W.: Privacy-preserving public auditing for secure cloud storage. IEEE Trans. Comput. 62(2), 362–375 (2013)MathSciNetCrossRef
25.
27.
Zurück zum Zitat Zuo, C., Sun, S.-F., Liu, J.K., Shao, J., Pieprzyk, J.: Dynamic searchable symmetric encryption schemes supporting range queries with forward (and backward) security. In: Lopez, J., Zhou, J., Soriano, M. (eds.) ESORICS 2018, Part II. LNCS, vol. 11099, pp. 228–246. Springer, Cham (2018). https://doi.org/10.1007/978-3-319-98989-1_12CrossRef Zuo, C., Sun, S.-F., Liu, J.K., Shao, J., Pieprzyk, J.: Dynamic searchable symmetric encryption schemes supporting range queries with forward (and backward) security. In: Lopez, J., Zhou, J., Soriano, M. (eds.) ESORICS 2018, Part II. LNCS, vol. 11099, pp. 228–246. Springer, Cham (2018). https://​doi.​org/​10.​1007/​978-3-319-98989-1_​12CrossRef
28.
Zurück zum Zitat Zyskind, G., Nathan, O., et al.: Decentralizing privacy: using Blockchain to Protect Personal Data. In: IEEE SPW 2015, pp. 180–184 (2015) Zyskind, G., Nathan, O., et al.: Decentralizing privacy: using Blockchain to Protect Personal Data. In: IEEE SPW 2015, pp. 180–184 (2015)
Metadaten
Titel
An Encrypted Database with Enforced Access Control and Blockchain Validation
verfasst von
Zhimei Sui
Shangqi Lai
Cong Zuo
Xingliang Yuan
Joseph K. Liu
Haifeng Qian
Copyright-Jahr
2019
DOI
https://doi.org/10.1007/978-3-030-14234-6_14