Skip to main content
Log in

A Semantic Cache Framework for Secure XML Queries

  • Regular Paper
  • Published:
Journal of Computer Science and Technology Aims and scope Submit manuscript

Abstract

Secure XML query answering to protect data privacy and semantic cache to speed up XML query answering are two hot spots in current research areas of XML database systems. While both issues are explored respectively in depth, they have not been studied together, that is, the problem of semantic cache for secure XML query answering has not been addressed yet. In this paper, we present an interesting joint of these two aspects and propose an efficient framework of semantic cache for secure XML query answering, which can improve the performance of XML database systems under secure circumstances. Our framework combines access control, user privilege management over XML data and the state-of-the-art semantic XML query cache techniques, to ensure that data are presented only to authorized users in an efficient way. To the best of our knowledge, the approach we propose here is among the first beneficial efforts in a novel perspective of combining caching and security for XML database to improve system performance. The efficiency of our framework is verified by comprehensive experiments.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Similar content being viewed by others

References

  1. Fan W, Chan C, Carofalakis M. Secure XML querying with security views. In Proc. the 2004 ACM SIGMOD International Conference on Management of Data, Paris, France, 2004, pp.587–598.

  2. Bertino E, Ferrari E. Secure and selective dissemination of XML documents. ACM Transactions on Information and System Security (TISSEC), 2002, 5(3): 290–331.

    Article  Google Scholar 

  3. Cho S, Amer-Yahia S, Lakshmanan L, Srivastava D. Optimizing the secure evaluation of twig queries. In Proc. the 28th International Conference on Very Large Data Bases (VLDB), Hong Kong, China, 2002, pp.490–501.

  4. E Damiani, S di Vimercati, S Paraboschi, P Samarati. Securing XML documents. In Proc. the 7th International Conference on Extending Database Technology (EDBT), Konstanz, Germany, 2000, pp.121–135.

  5. E Damiani, S di Vimercati, S Paraboschi, P Samarati. A fine-grained access control system for XML documents. ACM Transactions on Information and System Security (TISSEC), 2002, 5(2): 169–202.

    Article  Google Scholar 

  6. Hada S, Kudo M. XML access control language: Provisional authorization for XML documents. http://www.trl.ibm.com/projects/xml/xacl/xacl-spec.html.

  7. Murata M, Tozawa A, Kudo M. XML access control using static analysis. In Proc. the 10th ACM Conference on Computer and Communications Security (CCS), Washington DC, USA, 2003, pp.73–84.

  8. Oasis. eXtensible access control markup language (XACML). http://www.oasis-open.org/committees/xacml/repository/.

  9. Feng J, Ta N, Zhang Y, Li G. Exploit sequencing views in semantic cache to accelerate XPath query evaluation. In Proc. the 16th International World Wide Web Conference (WWW), Banff, Alberta, Canada, 2007, pp.1337–1338.

  10. XPath 2.0. http://www.w3.org/TR/xpath20/.

  11. XQuery 1.0. http://www.w3.org/TR/xquery/.

  12. Balmin A, Özcan F, Beyer K S, Cochrane R J, Pirahesh H. A framework for using materialized XPath views in XML query processing. In Proc. the 30th International Conference on Very Large Data Bases (VLDB), Toronto, Canada, 2004, pp.60–71.

  13. Chen L, Rundensteiner E A. ACE-XQ: A cache-aware XQuery answering system. In Proc. the 5th International Workshop on the Web and Databases (WebDB), Madison, Wisconsin, USA, 2002, pp.31–36.

  14. Yang L, Lee M, Hsu W. Efficient mining of XML query patterns for caching. In Proc. the 29th International Conference on Very Large Data Base (VLDB), Berlin, Germany, 2003, pp.69–80.

  15. Mandhani B, Suciu D. Query caching and view selection for XML databases. In Proc. the 31st International Conference on Very Large Data Base (VLDB), Trondheim, Norway, 2005, pp.469–480.

  16. Miklau G, Suciu D. Containment and equivalence for an XPath fragment. In Proc. the 21st ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database System (PODS), Madison, Wisconsin, USA, 2002, pp.65–76.

  17. Neven F, Schwentick T. XPath containment in the presence of disjunction, DTDs and variables. In Proc. the 9th International Conference on Database Theory (ICDT), Siena, Italy, 2003, pp.315–329.

  18. Xu W, Ozsoyoglu Z M. Rewriting XPath Queries Using Materialized Views. In Proc. the 31st International Conference on Very Large Data Base (VLDB), Trondheim, Norway, 2005, pp.121–132.

  19. Schmidt A R, Waas F, Kersten M L et al. The XML benchmark project. Technical Report INS-R0103, CWI, Amsterdam, The Netherlands, 2001.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jian-Hua Feng.

Additional information

This work is partly supported by the National Natural Science Foundation of China under Grant No. 60573094, the National High Technology Research and Development 863 Program of China under Grant No. 2007AA01Z152, and the National Basic Research 973 Program of China under Grant No. 2006CB303103.

Electronic supplementary material

Below is the link to the electronic supplementary material.

(PDF 82.1 kb).

Rights and permissions

Reprints and permissions

About this article

Cite this article

Feng, JH., Li, GL. & Ta, N. A Semantic Cache Framework for Secure XML Queries. J. Comput. Sci. Technol. 23, 988–997 (2008). https://doi.org/10.1007/s11390-008-9187-y

Download citation

  • Received:

  • Revised:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11390-008-9187-y

Keywords

Navigation