Skip to main content
Top

2019 | OriginalPaper | Chapter

An Encrypted Database with Enforced Access Control and Blockchain Validation

Authors : Zhimei Sui, Shangqi Lai, Cong Zuo, Xingliang Yuan, Joseph K. Liu, Haifeng Qian

Published in: Information Security and Cryptology

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Data privacy and integrity is top of mind for modern data applications. To tackle with the above issue, we propose an encrypted database system with access control capabilities and blockchain validation in this paper. Compared to the existing encrypted database system, our design proposes a proxy-free architecture, which avoids the need for a trusted proxy for access control. In order to protect the integrity of user data, our system leverages the blockchain technology to realize a tampering protection mechanism. The mechanism ensures that modification logging is compulsory and public-available but hardened. Users can validate and easily detect the tampered data. Finally, we implement a prototype system and conduct evaluations on each component of the proposed system.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Footnotes
1
For every column, we use a new private key \(key_j\) to encrypt the data.
 
2
Since SKE is deterministic, the SKE ciphertexts are the same if the underlying data is identical.
 
3
The NoSQL database has a wide variety of data models, including key-value, document, columnar and graph formats.
 
Literature
1.
go back to reference Cai, C., Yuan, X., Wang, C.: Hardening distributed and encrypted keyword search via Blockchain. In: IEEE PAC 2017, pp. 119–128 (2017) Cai, C., Yuan, X., Wang, C.: Hardening distributed and encrypted keyword search via Blockchain. In: IEEE PAC 2017, pp. 119–128 (2017)
2.
go back to reference Cai, C., Yuan, X., Wang, C.: Towards trustworthy and private keyword search in encrypted decentralized storage. In: IEEE ICC 2017, pp. 1–7 (2017) Cai, C., Yuan, X., Wang, C.: Towards trustworthy and private keyword search in encrypted decentralized storage. In: IEEE ICC 2017, pp. 1–7 (2017)
3.
go back to reference Date, C.J., Darwen, H.: A guide to the SQL Standard: A User’s Guide to The Standard Relational Language SQL. Addison-Wesley, Boston (1989) Date, C.J., Darwen, H.: A guide to the SQL Standard: A User’s Guide to The Standard Relational Language SQL. Addison-Wesley, Boston (1989)
4.
go back to reference Davida, G.I., Wells, D.L., Kam, J.B.: A database encryption system with subkeys. ACM Trans. Database Syst. 6(2), 312–328 (1981)MathSciNetCrossRef Davida, G.I., Wells, D.L., Kam, J.B.: A database encryption system with subkeys. ACM Trans. Database Syst. 6(2), 312–328 (1981)MathSciNetCrossRef
5.
go back to reference Davida, G.I., Wells, D.L., Kam, J.B.: Database Encryption and Decryption Circuit and Method Using Subkeys. U.S. Patent 4,375,579 (1983) Davida, G.I., Wells, D.L., Kam, J.B.: Database Encryption and Decryption Circuit and Method Using Subkeys. U.S. Patent 4,375,579 (1983)
6.
go back to reference Delfs, H., Knebl, H.: Symmetric-key encryption. Introduction to Cryptography, pp. 11–31 (2007)MATH Delfs, H., Knebl, H.: Symmetric-key encryption. Introduction to Cryptography, pp. 11–31 (2007)MATH
7.
go back to reference Friedlmaier, M., Tumasjan, A., Welpe, I.: Disrupting industries With Blockchain: the industry. Venture Capital Funding, and Regional Distribution of Blockchain Ventures (2016). Accessed 16 Jan 2017 Friedlmaier, M., Tumasjan, A., Welpe, I.: Disrupting industries With Blockchain: the industry. Venture Capital Funding, and Regional Distribution of Blockchain Ventures (2016). Accessed 16 Jan 2017
8.
go back to reference Han, J., Haihong, E., Le, G., Du, J.: Survey on NoSQL Database. In: IEEE ICPCA 2011, pp. 363–366 (2011) Han, J., Haihong, E., Le, G., Du, J.: Survey on NoSQL Database. In: IEEE ICPCA 2011, pp. 363–366 (2011)
9.
go back to reference Hecht, R., Jablonski, S.: NoSQL evaluation: a use case oriented survey. In: IEEE ICCSC 2011, pp. 336–341 (2011) Hecht, R., Jablonski, S.: NoSQL evaluation: a use case oriented survey. In: IEEE ICCSC 2011, pp. 336–341 (2011)
12.
go back to reference Lai, S., et al.: Result pattern hiding searchable encryption for conjunctive queries. In: ACM CCS 2018, pp. 745–762 (2018) Lai, S., et al.: Result pattern hiding searchable encryption for conjunctive queries. In: ACM CCS 2018, pp. 745–762 (2018)
14.
go back to reference Lei, A., Cruickshank, H., Cao, Y., Asuquo, P., Ogah, C.P.A., Sun, Z.: Blockchain-based dynamic key management for heterogeneous intelligent transportation systems. IEEE Internet Things J. 4(6), 1832–1843 (2017)CrossRef Lei, A., Cruickshank, H., Cao, Y., Asuquo, P., Ogah, C.P.A., Sun, Z.: Blockchain-based dynamic key management for heterogeneous intelligent transportation systems. IEEE Internet Things J. 4(6), 1832–1843 (2017)CrossRef
17.
go back to reference Mettler, M.: Blockchain technology in healthcare: the revolution starts here. In: IEEE HealthCom 2016, pp. 1–3 (2016) Mettler, M.: Blockchain technology in healthcare: the revolution starts here. In: IEEE HealthCom 2016, pp. 1–3 (2016)
18.
go back to reference Miller, F.P., Vandome, A.F., McBrewster, J.: Advanced Encryption Standard. Alpha Press, Orlando (2009) Miller, F.P., Vandome, A.F., McBrewster, J.: Advanced Encryption Standard. Alpha Press, Orlando (2009)
21.
go back to reference Popa, R.A., Redfield, C., Zeldovich, N., Balakrishnan, H.: CryptDB: protecting confidentiality with encrypted query processing. In: ACM SOSP 2011, pp. 85–100 (2011) Popa, R.A., Redfield, C., Zeldovich, N., Balakrishnan, H.: CryptDB: protecting confidentiality with encrypted query processing. In: ACM SOSP 2011, pp. 85–100 (2011)
22.
go back to reference Shmueli, E., Vaisenberg, R., Elovici, Y., Glezer, C.: Database encryption: an overview of contemporary challenges and design considerations. ACM SIGMOD Record 38(3), 29–34 (2010)CrossRef Shmueli, E., Vaisenberg, R., Elovici, Y., Glezer, C.: Database encryption: an overview of contemporary challenges and design considerations. ACM SIGMOD Record 38(3), 29–34 (2010)CrossRef
23.
go back to reference Sun, S.F., et al.: Practical backward-secure searchable encryption from symmetric puncturable encryption. In: ACM CCS 2018, pp. 763–780 (2018) Sun, S.F., et al.: Practical backward-secure searchable encryption from symmetric puncturable encryption. In: ACM CCS 2018, pp. 763–780 (2018)
24.
go back to reference Wang, C., Chow, S.S., Wang, Q., Ren, K., Lou, W.: Privacy-preserving public auditing for secure cloud storage. IEEE Trans. Comput. 62(2), 362–375 (2013)MathSciNetCrossRef Wang, C., Chow, S.S., Wang, Q., Ren, K., Lou, W.: Privacy-preserving public auditing for secure cloud storage. IEEE Trans. Comput. 62(2), 362–375 (2013)MathSciNetCrossRef
25.
27.
go back to reference Zuo, C., Sun, S.-F., Liu, J.K., Shao, J., Pieprzyk, J.: Dynamic searchable symmetric encryption schemes supporting range queries with forward (and backward) security. In: Lopez, J., Zhou, J., Soriano, M. (eds.) ESORICS 2018, Part II. LNCS, vol. 11099, pp. 228–246. Springer, Cham (2018). https://doi.org/10.1007/978-3-319-98989-1_12CrossRef Zuo, C., Sun, S.-F., Liu, J.K., Shao, J., Pieprzyk, J.: Dynamic searchable symmetric encryption schemes supporting range queries with forward (and backward) security. In: Lopez, J., Zhou, J., Soriano, M. (eds.) ESORICS 2018, Part II. LNCS, vol. 11099, pp. 228–246. Springer, Cham (2018). https://​doi.​org/​10.​1007/​978-3-319-98989-1_​12CrossRef
28.
go back to reference Zyskind, G., Nathan, O., et al.: Decentralizing privacy: using Blockchain to Protect Personal Data. In: IEEE SPW 2015, pp. 180–184 (2015) Zyskind, G., Nathan, O., et al.: Decentralizing privacy: using Blockchain to Protect Personal Data. In: IEEE SPW 2015, pp. 180–184 (2015)
Metadata
Title
An Encrypted Database with Enforced Access Control and Blockchain Validation
Authors
Zhimei Sui
Shangqi Lai
Cong Zuo
Xingliang Yuan
Joseph K. Liu
Haifeng Qian
Copyright Year
2019
DOI
https://doi.org/10.1007/978-3-030-14234-6_14

Premium Partner