Abstract
The security of the published XML data receives high attention due to the sensitive nature of the data in some areas. This paper proposes an XML view publishing method called XFlat. Compared with other methods, XFlat focuses on the efficiency of query evaluation over the published XML view. XFlat decomposes a XML tree into a set of sub-trees with the same accessibility on each node to all users, encrypts and stores each sub-tree in a flat sequential way. This storage strategy can avoid the nested encryption in view construction and decryption in the query evaluation. In addition, we discuss how to generate the user specific schema and minimize the total space cost of XML view with the consideration of the size of the relationship among the sub-trees. The final experimental results demonstrate the effectiveness and efficiency of our method.
Project 2005AA4Z3070 supported by the national high-tech research and development of China, Project 60503037 supported by NSFC, Project 4062018 supported by BNSF.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Fan, W.F., Chan, C.Y., Garofalakis, M.N.: Secure XML Querying with Security Views. In: Proc. of SIGMOD 2004 (2004)
Miklau, G., Suciu, D.: Controlling access to published data using cryptography. In: Proc. of VLDB 2003, pp. 898–909 (2003)
Cho, S., Amer Yahia, S., lakshmanman, L., Srivastava, D.: Optimizing the secure evaluation of twig queries. In: Proc. of VLDB 2002 (2002)
Damiani, E., Vimercata, S.d., Paraboshi, S., Samarati, P.: A fine-grained access control system for XML documents. TISSEC 5(2), 169–202 (2002)
Bertino, E., Castano, S., Ferrari, E.: Securing XML Documents with Author-X. IEEE Internet Computing 5(3), 21–32 (2001)
Hada, S., Kudo, M.: XML access control language: Provisional authorization for XML documents, http://www.trl.ibm.com/projects/xml/axcl/xacl-spec.html
Aoki, K., Lipmaa, H.: Fast implementations of AES Candidates. In: the 3rd AES candidate conference, NIST, pp. 106–120 (2000)
Feigenbaum, J., Liberman, M.Y., Wright, R.N.: Cryptographic protection of database and software. In: distributed computing and crypto, pp. 161–172 (1991)
Gottlob, G., Koch, C., Pichler, R.: Efficient Algorithms for Processing XPath Queries. In: Proc. of VLDB, pp. 95–106 (2002)
Clark, J.: XML Path language(XPath) (1999) available from the W3C, http://www.w3.org/TR/XPath
Fernandez, M.F., Suciu, D.: Optimizing Regular Path Expressions Using Graph Schemas. In: Proc. of ICDT, pp. 14–23 (1998)
Chan, C., Felber, P., Garofalakis, M., Rastogi, R.: Efficient filtering of XML document with XPath expressions. In: Proc. of ICDE, pp. 235–244 (2002)
Gao, J., Yang, D.Q., Tang, S.W., Wang, T.J.: XPath logical optimization based on DTD. Journal of Software 15(12), 1860–1868 (2004)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Gao, J., Wang, T., Yang, D. (2006). XFlat: Query Friendly Encrypted XML View Publishing. In: Zhou, X., Li, J., Shen, H.T., Kitsuregawa, M., Zhang, Y. (eds) Frontiers of WWW Research and Development - APWeb 2006. APWeb 2006. Lecture Notes in Computer Science, vol 3841. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11610113_10
Download citation
DOI: https://doi.org/10.1007/11610113_10
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-31142-3
Online ISBN: 978-3-540-32437-9
eBook Packages: Computer ScienceComputer Science (R0)