Skip to main content
Log in

Access control scheme with tracing for outsourced databases

  • Research Article
  • Published:
Frontiers of Computer Science Aims and scope Submit manuscript

Abstract

To manage dynamic access control and deter pirate attacks on outsourced databases, a dynamic access control scheme with tracing is proposed. In our scheme, we introduce the traitor tracing idea into outsource databases, and employ a polynomial function and filter function as the basic means of constructing encryption and decryption procedures to reduce computation, communication, and storage overheads. Compared to previous access control schemes for outsourced databases, our scheme can not only protect sensitive data from leaking and perform scalable encryption at the server side without shipping the outsourced data back to the data owner when group membership is changed, but also provide trace-and-revoke features. When malicious users clone and sell their decryption keys for profit, our scheme can trace the decryption keys to the malicious users and revoke them. Furthermore, our scheme avoids massive message exchanges for establishing the decryption key between the data owner and the user. Compared to previously proposed publickey traitor tracing schemes, our scheme can simultaneously achieve full collusion resistance, full recoverability, full revocation, and black-box traceability. The proof of security and analysis of performance show that our scheme is secure and efficient.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Similar content being viewed by others

References

  1. Hacigümüus H, Iyer B, Mehrotra S, Li C. Executing SQL over encrypted data in the database-service-provider model. In: Proceedings of the ACM SIGMOD’2002. 2002, 216–227

  2. Agrawal R, Kierman J, Srikant R, Xu Y. Order preserving encryption for numeric data. In: Proceedings of ACM SIGMOD 2004. 2004, 563–574

  3. Damiani E, Di Vimercati S D C, Foresti S, Jajodia S, Paraboschi S, Samarati P. Metadata management in outsourced encrypted databases. In: Proceedings of the 2nd VLDB Workshop on Secure Data Management. Norway, 2005, 16–32

  4. Brinkman R, Doumen J, Jonker W. Using secret sharing for searching in encrypted data. In: Proceedings of the Secure Data Management Workshop. 2004, 18–27

  5. Paraboschi S, Samarati P. Modeling and assessing inference exposure in encrypted databases. ACM Transactions on Information and System Security, 2005, 8(1): 119–152

    Article  Google Scholar 

  6. Lanovenko A, Guo H. Dynamic group key management in outsourced databases. In: Proceedings of the World Congress on Engineering and Computer Science. 2007, 22–28

  7. Di Vimercati S D C, Foresti S, Jajodia S, Paraboschi S, Samarati P. Over-encryption: management of access control evolution on outsourced data. In: Proceedings of the 33rd International Conference on Very Large Data Bases. 2007, 123–134

  8. Liu S, Li W, Wang LY. Towards efficient over-encryption in outsourced databases using secret sharing. New Technologies, Mobilety and Security, Morocco, 2008, 1–5

    Google Scholar 

  9. Weng J, Chen M R, Chen K F, Deng R H. Cryptanalysis of a hierarchical identity-based encryption scheme. IEICE Transaction, 2010, 94-A(4): 854–856

    Article  Google Scholar 

  10. Wang W, Li Z W, Owens R, Bhargava B. Secure and efficient access to outsourced data. In: Proceedings of the 2009 ACM Workshop on Cloud Computing Security, 2009, 55–56

  11. Dai J, Zhou Q. A PKI-based mechanism for secure and efficient access to outsourced data. Networking and Digital Society, 2010, 640–643

  12. Watanabe Y, Hanaoka G, Imai H. Efficient asymmetric public-key traitor tracing without trusted agents. In: Proceedings of CT-RSA 2001. Berlin: Springer-Verlag, 2001, 392–407

    Google Scholar 

  13. McGregor J P, Yin Y L, Ruby B. A traitor tracing scheme based on RSA for fast decryption. In: Proceedings of ACNS 2005. Berlin: Springer-Verlag, 2005, 56–75

    Google Scholar 

  14. Tatsuyuki M, Hideki I. A public-key black-box traitor tracing scheme with sublinear ciphertext size against self-defensive pirates. In: Proceedings of ASIACRYPT 2004. 2004, 260–275

  15. Tzeng W G, Tzeng Z J. A public-key traitor tracing scheme with revocation using dynamic share. Designs, Codes and Cryptography, 2005, 35(1): 47–61

    Article  MathSciNet  MATH  Google Scholar 

  16. Dodis Y, Fazio N, Kiayias A, Yung M. Scalable public-key tracing and revoking. Distributed Computing, 2005, 17(4): 323–347

    Article  Google Scholar 

  17. Wang Q L, Yang B, Han Z, Geng X H. Collusion-free public-key traitor tracing scheme. Journal on Communications, 2006, 27(12): 6–9

    Google Scholar 

  18. Boneh D, Sahai A, Waters B. Fully collusion resistant traitor tracing with short ciphertexts and private keys. In: Proceedings of the 13th ACM Conf on Computer and Communications Security. 2006, 211–220

  19. Wang Q L, Han Z, Yang B. A traitor tracing scheme based on bilinear map. Journal of Computer Research and Developmen, 2009, 46(3): 384–389

    Google Scholar 

  20. Boneh D, Waters B. A full collusion resistant broadcast, trace, and revoke system. In: Proceedings of EUROCRYPT 2006. Berlin: Springer-Verlag, 2006, 573–592

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Xiaoming Wang.

Additional information

Xiaoming Wang received her PhD in mathematics from Nankai University, China and is currently a professor of the Department of Computer Science at Jinan University, China. Her current research interests include cryptography and information security.

Guoxiang Yao is currently a professor and PhD supervisor of the College of Information Science and Technology at Jinan University, China. His main research fields are network security and cloud computing security.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Wang, X., Yao, G. Access control scheme with tracing for outsourced databases. Front. Comput. Sci. 6, 677–685 (2012). https://doi.org/10.1007/s11704-012-1193-0

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11704-012-1193-0

Keywords

Navigation