DSP re-encryption: A flexible mechanism for access control enforcement management in DaaS

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

25 Scopus citations

Abstract

With the popular use of service-oriented technologies, Database as a Service(DaaS) as a new paradigm is becoming a more practical and useful model for those enterprises who can't afford the expensive DBMS products. However access control management by the database service provider(DSP) in the DaaS context is challenging because the DSP may be untrusted for the delegated data contents. In this paper, we first present an approach to implement the flexible access control enforcement management by applying a DSP re-encryption mechanism. Our approach not only can implement the selective access control of the encrypted data by the DSP, but also can relieve the users from the complex key derivation procedure. The underlying idea of our approach is that the DSP uses different re-encryption keys for users of the system to implement flexible access control enforcement management under the DSP re-encryption mechanism. We demonstrate the usefulness and security property of our flexible access control enforcement management, finally we analyze and resolve the possible attacks and information disclosure.

Original languageEnglish
Title of host publicationCLOUD 2009 - 2009 IEEE International Conference on Cloud Computing
Pages25-32
Number of pages8
DOIs
StatePublished - 2009
EventCLOUD 2009 - 2009 IEEE International Conference on Cloud Computing - Bangalore, India
Duration: 21 Sep 200925 Sep 2009

Publication series

NameCLOUD 2009 - 2009 IEEE International Conference on Cloud Computing

Conference

ConferenceCLOUD 2009 - 2009 IEEE International Conference on Cloud Computing
Country/TerritoryIndia
CityBangalore
Period21/09/0925/09/09

Keywords

  • Access control
  • DSP re-encryption mechanism
  • DaaS

Fingerprint

Dive into the research topics of 'DSP re-encryption: A flexible mechanism for access control enforcement management in DaaS'. Together they form a unique fingerprint.

Cite this