Skip to main content

2020 | OriginalPaper | Buchkapitel

Privacy-Preserving Authentication for Tree-Structured Data with Designated Verification in Outsourced Environments

verfasst von : Fei Zhu, Xun Yi, Sharif Abuadbba, Ibrahim Khalil, Xu Yang, Surya Nepal, Xinyi Huang

Erschienen in: Provable and Practical Security

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Nowadays, the use of database outsourcing is on the rise. Since the service provider may not be fully trusted, a crucial requirement in outsourced data sharing is therefore to ensure that users can verify the integrity and authenticity of their query results. In outsourced healthcare data sharing, because the data contains sensitive information, an equally significant issue is to guarantee that the sharing process does not lead to any information leakages. Though some privacy-preserving authentication solutions have been presented to address these issues, unfortunately, none of them consider the risk of privacy leakage during the dissemination of authenticated healthcare data. That is, the queried data may be leaked by the user since any third party getting hold of a signed data would be convinced of its validity. In other words, for privacy concerns, we need a secure mechanism to ensure that only a specific receiver can check the integrity and authenticity of shared outsourced data.
To address the these concerns, in our work, we propose a privacy-preserving authentication scheme with designated verification for tree-structured data (i.e., XML-based healthcare records). We provide the formal definition and related security properties of our scheme. We further put forward our concrete construction and prove its security under the standard cryptographic assumption in the random oracle model. The comparison analysis of theory and practice shows that our scheme provides stronger privacy protection than existing schemes while having the shortest key length and signature size. Therefore, our construction is efficient and practical for outsourced environments.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Anhänge
Nur mit Berechtigung zugänglich
Literatur
3.
Zurück zum Zitat Chatterjee, S., Hankerson, D., Knapp, E., Menezes, A.: Comparing two pairing-based aggregate signature schemes. Des. Codes Crypt. 55(2–3), 141–167 (2010)MathSciNetCrossRef Chatterjee, S., Hankerson, D., Knapp, E., Menezes, A.: Comparing two pairing-based aggregate signature schemes. Des. Codes Crypt. 55(2–3), 141–167 (2010)MathSciNetCrossRef
4.
Zurück zum Zitat Chatterjee, S., Menezes, A.: On cryptographic protocols employing asymmetric pairings - the role of \(\Psi \) revisited. Discret. Appl. Math. 159(13), 1311–1322 (2011)MathSciNetCrossRef Chatterjee, S., Menezes, A.: On cryptographic protocols employing asymmetric pairings - the role of \(\Psi \) revisited. Discret. Appl. Math. 159(13), 1311–1322 (2011)MathSciNetCrossRef
7.
Zurück zum Zitat Goodrich, M.T., Tamassia, R., Triandopoulos, N.: Efficient authenticated data structures for graph connectivity and geometric search problems. Algorithmica 60(3), 505–552 (2011)MathSciNetCrossRef Goodrich, M.T., Tamassia, R., Triandopoulos, N.: Efficient authenticated data structures for graph connectivity and geometric search problems. Algorithmica 60(3), 505–552 (2011)MathSciNetCrossRef
8.
Zurück zum Zitat Groß, T.: Efficient certification and zero-knowledge proofs of knowledge on infrastructure topology graphs. In: CCSW 2014, pp. 69–80. ACM (2014) Groß, T.: Efficient certification and zero-knowledge proofs of knowledge on infrastructure topology graphs. In: CCSW 2014, pp. 69–80. ACM (2014)
9.
Zurück zum Zitat Hachicha, M., Darmont, J.: A survey of XML tree patterns. IEEE Trans. Knowl. Data Eng. 25(1), 29–46 (2013)CrossRef Hachicha, M., Darmont, J.: A survey of XML tree patterns. IEEE Trans. Knowl. Data Eng. 25(1), 29–46 (2013)CrossRef
11.
Zurück zum Zitat Kundu, A., Atallah, M.J., Bertino, E.: Efficient leakage-free authentication of trees, graphs and forests. IACR Cryptology ePrint Archive 2012, 36 (2012) Kundu, A., Atallah, M.J., Bertino, E.: Efficient leakage-free authentication of trees, graphs and forests. IACR Cryptology ePrint Archive 2012, 36 (2012)
12.
Zurück zum Zitat Kundu, A., Atallah, M.J., Bertino, E.: Leakage-free redactable signatures. In: CODASPY 2012, pp. 307–316. ACM (2012) Kundu, A., Atallah, M.J., Bertino, E.: Leakage-free redactable signatures. In: CODASPY 2012, pp. 307–316. ACM (2012)
13.
Zurück zum Zitat Kundu, A., Bertino, E.: Structural signatures for tree data structures. Proc. VLDB Endow. 1(1), 138–150 (2008)CrossRef Kundu, A., Bertino, E.: Structural signatures for tree data structures. Proc. VLDB Endow. 1(1), 138–150 (2008)CrossRef
14.
Zurück zum Zitat Kundu, A., Bertino, E.: How to authenticate graphs without leaking. In: EDBT 2010, pp. 609–620. ACM (2010) Kundu, A., Bertino, E.: How to authenticate graphs without leaking. In: EDBT 2010, pp. 609–620. ACM (2010)
16.
Zurück zum Zitat Liu, J., Ma, J., Zhou, W., Xiang, Y., Huang, X.: Dissemination of authenticated tree-structured data with privacy protection and fine-grained control in outsourced databases. In: Lopez, J., Zhou, J., Soriano, M. (eds.) ESORICS 2018. LNCS, vol. 11099, pp. 167–186. Springer, Cham (2018). https://doi.org/10.1007/978-3-319-98989-1_9CrossRef Liu, J., Ma, J., Zhou, W., Xiang, Y., Huang, X.: Dissemination of authenticated tree-structured data with privacy protection and fine-grained control in outsourced databases. In: Lopez, J., Zhou, J., Soriano, M. (eds.) ESORICS 2018. LNCS, vol. 11099, pp. 167–186. Springer, Cham (2018). https://​doi.​org/​10.​1007/​978-3-319-98989-1_​9CrossRef
19.
Zurück zum Zitat Mihara, A., Tanaka, K.: Universal designated-verifier signature with aggregation. In: ICITA 2005, pp. 514–519. IEEE (2005) Mihara, A., Tanaka, K.: Universal designated-verifier signature with aggregation. In: ICITA 2005, pp. 514–519. IEEE (2005)
24.
Zurück zum Zitat Uzunkol, O., Kiraz, M.S.: Still wrong use of pairings in cryptography. Appl. Math. Comput. 333, 467–479 (2018)MathSciNetCrossRef Uzunkol, O., Kiraz, M.S.: Still wrong use of pairings in cryptography. Appl. Math. Comput. 333, 467–479 (2018)MathSciNetCrossRef
25.
Zurück zum Zitat Wang, J., Chen, X., Huang, X., You, I., Xiang, Y.: Verifiable auditing for outsourced database in cloud computing. IEEE Trans. Comput. 64(11), 3293–3303 (2015)MathSciNetCrossRef Wang, J., Chen, X., Huang, X., You, I., Xiang, Y.: Verifiable auditing for outsourced database in cloud computing. IEEE Trans. Comput. 64(11), 3293–3303 (2015)MathSciNetCrossRef
26.
Zurück zum Zitat Zhu, F., Wu, W., Zhang, Y., Chen, X.: Privacy-preserving authentication for general directed graphs in industrial IoT. Inf. Sci. 502, 218–228 (2019)MathSciNetCrossRef Zhu, F., Wu, W., Zhang, Y., Chen, X.: Privacy-preserving authentication for general directed graphs in industrial IoT. Inf. Sci. 502, 218–228 (2019)MathSciNetCrossRef
Metadaten
Titel
Privacy-Preserving Authentication for Tree-Structured Data with Designated Verification in Outsourced Environments
verfasst von
Fei Zhu
Xun Yi
Sharif Abuadbba
Ibrahim Khalil
Xu Yang
Surya Nepal
Xinyi Huang
Copyright-Jahr
2020
DOI
https://doi.org/10.1007/978-3-030-62576-4_8