Abstract
The problem of supporting privacy preservation of XML databases within very large publish-subscribe systems is rapidly gaining interest for both academic and industrial research. It becomes even more challenging when XML data are managed and delivered according to the P2P paradigm, since malicious accesses and unpredictable attacks could take advantage from the totally-decentralized and untrusted nature of P2P networks. In this paper, we propose XℓPPX, a distributed framework for very large publish-subscribe systems which supports (i) privacy-preserving fragmentation of XML documents stored in P2P XML databases, and (ii) the creation of trusted groups of peers by means of “self-certifying” XPath links. Furthermore, we present algorithms for querying privacy-preserving XML fragments in both schema-aware and schema-less mode, which are common scenarios when P2P XML databases operate in very large publish-subscribe systems. Finally, we complete our analytical contributions with an experimental study showing the effectiveness of our proposed framework.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Aberer, K., Cudre-Mauroux, P., Datta, A., Despotovic, Z., Hauswirth, M., Punceva, M., Schmidt, R.: P-Grid: A Self-Organizing Structured P2P System. SIGMOD Record 32(3), 29–33 (2003)
Abiteboul, S., Alexe, B., Benjelloun, O., Cautis, B., Fundulaki, I., Milo, T., Sahuguet, A., An Electronic Patient Record “on Steroids”: Distributed, Peer-to-Peer, Secure and Privacy-conscious. In: Proc. of VLDB, pp. 1273–1276 (2004)
Bernstein, P.A., Giunchiglia, F., Kementsietsidis, A., Mylopoulos, J., Serafini, L., Zaihrayeu, I.: Data Management for Peer-to-Peer Computing: A Vision. In: Proc. of ACM WebDB, pp. 89–94 (2002)
Bonifati, A., Cuzzocrea, A.: Storing and Retrieving XPath Fragments in Structured P2P Networks. Data & Knowledge Engineering 59(2), 247–269 (2006)
Bremer, J.-M., Gertz, M.: On Distributing XML Repositories. In: Proc. of ACM WebDB, pp. 73–78 (2003)
Broder, A.Z.: Some Applications of Rabin’s Fingerprinting Method. Springer, Heidelberg (1993)
Buchmann, E., Bohm, K.: FairNet - How to Counter Free Riding in Peer-to-Peer Data Structures. In: Proc. of CoopIS/DOA/ODBASE, vol. 1, pp. 337–354 (2004)
Castro, M., Druschel, P., Hu, Y.C., Rowstron, A.: Proximity Neighbor Selection in Tree-based Structured Peer-to-Peer Overlays. Technical Report MSR-TR-2003-52, Microsoft Research (2003)
Crainiceanu, A., Linga, P., Gehrke, J., Shanmugasundaram, J.: Querying Peer-to-Peer Networks Using P-Trees. In: Proc. of ACM WebDB, pp. 25–30 (2004)
Dabek, F., Brunskill, E., Frans Kaashoek, M., Karger, D., Morris, R., Stoica, I., Balakrishnan H.: Building Peer-to-Peer Systems with Chord, a Distributed Lookup Service. In: Proc. of IEEE HotOS, pp. 81–86 (2001)
Jacobsen, H.-A., Llirbat, F.: Publish-Subscribe Systems. Tutorial at IEEE ICDE (2001)
Fu, K., Kaashoek, M.F., Mazieres, D.: Fast and Secure Distributed Read-Only File System. Computer Systems 20(1), 1–24 (2002)
Galanis, L., Wang, Y., Jeffery, S.R., DeWitt, D.J.: Locating Data Sources in Large Distributed Systems. In: Proc. of VLDB, pp. 874–885 (2003)
Gong, X., Yan, Y., Qian, W., Zhou, A.: Bloom Filter-based XML Packets Filtering for Millions of Path Queries. In: Proc. of IEEE ICDE, pp. 890–901 (2005)
Huebsch, R., Hellerstein, J.M., Lanham, N., Loo, B.T., Shenker, S., Stoica, I., Querying the Internet with PIER. In: Proc. of VLDB, pp. 321–332 (2003)
King, R.: Security Maintenance Mediation: a Technology for Preventing Unintended Security Breaches. Concurrency and Computation: Practice and Experience 16(1), 49–60 (2004)
Menezes, A.J., van Oorschot, P.C., Vanstone, S.A.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1996)
Milo, T., Suciu, D.: Index Structures for Path Expressions. In: Beeri, C., Bruneman, P. (eds.) ICDT 1999. LNCS, vol. 1540, pp. 277–295. Springer, Heidelberg (1998)
Narasimha, M., Tsudik, G., Yi, J.H.: On the Utility of Distributed Cryptography in P2P and MANETs: The Case of Membership Control. In: Proc. of IEEE ICNP, pp. 336–345 (2003)
Ooi, B.C., Tan, K.L., Zhou, A.Y., Goh, C.H., Li, Y.G., Liau, C.Y., Ling, B., Ng, W.S., Shu, Y.F., Wang, X.Y., Zhang, M.: PeerDB: Peering into Personal Databases. In: Proc. of ACM SIGMOD, p. 659 (2003)
Pang, X., Catania, B., Tan, K.: Securing Your Data in P2P Systems. In: Proc. of IEEE DASFAA, pp. 55–61 (2003)
Rabin, M.O.: Fingerprinting by Random Polynomials. Technical Report CRCT TR-15-81, Harvard University (1981)
Schmidt, A., Waas, F., Kersten, M., Carey, M., Manolescu, I., Busse, R.: XMark: A Benchmark for XML Data Management. In: Proc. of VLDB, pp. 974–985 (2002)
Sit, E., Morris, R.: Security Considerations for Peer-to-Peer Distributed Hash Tables. In: Druschel, P., Kaashoek, M.F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol. 2429, pp. 261–269. Springer, Heidelberg (2002)
Stoica, I., Morris, R., Karger, D., Frans Kaashoek, M., Balakrishnan, H.: Chord: A Scalable Peer-to-Peer Lookup Service for Internet Applications. In: Proc. of ACM SIGCOMM, pp. 149–160 (2001)
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2007 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Bonifati, A., Cuzzocrea, A. (2007). XℓPPX: A Lightweight Framework for Privacy Preserving P2P XML Databases in Very Large Publish-Subscribe Systems. In: Psaila, G., Wagner, R. (eds) E-Commerce and Web Technologies. EC-Web 2007. Lecture Notes in Computer Science, vol 4655. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-74563-1_3
Download citation
DOI: https://doi.org/10.1007/978-3-540-74563-1_3
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-74562-4
Online ISBN: 978-3-540-74563-1
eBook Packages: Computer ScienceComputer Science (R0)