Advertisement

Journal of Computer Science and Technology

, Volume 23, Issue 6, pp 988–997 | Cite as

A Semantic Cache Framework for Secure XML Queries

  • Jian-Hua Feng
  • Guo-Liang Li
  • Na Ta
Regular Paper

Abstract

Secure XML query answering to protect data privacy and semantic cache to speed up XML query answering are two hot spots in current research areas of XML database systems. While both issues are explored respectively in depth, they have not been studied together, that is, the problem of semantic cache for secure XML query answering has not been addressed yet. In this paper, we present an interesting joint of these two aspects and propose an efficient framework of semantic cache for secure XML query answering, which can improve the performance of XML database systems under secure circumstances. Our framework combines access control, user privilege management over XML data and the state-of-the-art semantic XML query cache techniques, to ensure that data are presented only to authorized users in an efficient way. To the best of our knowledge, the approach we propose here is among the first beneficial efforts in a novel perspective of combining caching and security for XML database to improve system performance. The efficiency of our framework is verified by comprehensive experiments.

Keywords

computer software XML semantic cache XPath 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Supplementary material

11390_2008_9187_MOESM1_ESM.pdf (80 kb)
(PDF 82.1 kb).

References

  1. [1]
    Fan W, Chan C, Carofalakis M. Secure XML querying with security views. In Proc. the 2004 ACM SIGMOD International Conference on Management of Data, Paris, France, 2004, pp.587–598.Google Scholar
  2. [2]
    Bertino E, Ferrari E. Secure and selective dissemination of XML documents. ACM Transactions on Information and System Security (TISSEC), 2002, 5(3): 290–331.CrossRefGoogle Scholar
  3. [3]
    Cho S, Amer-Yahia S, Lakshmanan L, Srivastava D. Optimizing the secure evaluation of twig queries. In Proc. the 28th International Conference on Very Large Data Bases (VLDB), Hong Kong, China, 2002, pp.490–501.Google Scholar
  4. [4]
    E Damiani, S di Vimercati, S Paraboschi, P Samarati. Securing XML documents. In Proc. the 7th International Conference on Extending Database Technology (EDBT), Konstanz, Germany, 2000, pp.121–135.Google Scholar
  5. [5]
    E Damiani, S di Vimercati, S Paraboschi, P Samarati. A fine-grained access control system for XML documents. ACM Transactions on Information and System Security (TISSEC), 2002, 5(2): 169–202.CrossRefGoogle Scholar
  6. [6]
    Hada S, Kudo M. XML access control language: Provisional authorization for XML documents. http://www.trl.ibm.com/projects/xml/xacl/xacl-spec.html.
  7. [7]
    Murata M, Tozawa A, Kudo M. XML access control using static analysis. In Proc. the 10th ACM Conference on Computer and Communications Security (CCS), Washington DC, USA, 2003, pp.73–84.Google Scholar
  8. [8]
    Oasis. eXtensible access control markup language (XACML). http://www.oasis-open.org/committees/xacml/repository/.
  9. [9]
    Feng J, Ta N, Zhang Y, Li G. Exploit sequencing views in semantic cache to accelerate XPath query evaluation. In Proc. the 16th International World Wide Web Conference (WWW), Banff, Alberta, Canada, 2007, pp.1337–1338.Google Scholar
  10. [10]
  11. [11]
  12. [12]
    Balmin A, Özcan F, Beyer K S, Cochrane R J, Pirahesh H. A framework for using materialized XPath views in XML query processing. In Proc. the 30th International Conference on Very Large Data Bases (VLDB), Toronto, Canada, 2004, pp.60–71.Google Scholar
  13. [13]
    Chen L, Rundensteiner E A. ACE-XQ: A cache-aware XQuery answering system. In Proc. the 5th International Workshop on the Web and Databases (WebDB), Madison, Wisconsin, USA, 2002, pp.31–36.Google Scholar
  14. [14]
    Yang L, Lee M, Hsu W. Efficient mining of XML query patterns for caching. In Proc. the 29th International Conference on Very Large Data Base (VLDB), Berlin, Germany, 2003, pp.69–80.Google Scholar
  15. [15]
    Mandhani B, Suciu D. Query caching and view selection for XML databases. In Proc. the 31st International Conference on Very Large Data Base (VLDB), Trondheim, Norway, 2005, pp.469–480.Google Scholar
  16. [16]
    Miklau G, Suciu D. Containment and equivalence for an XPath fragment. In Proc. the 21st ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database System (PODS), Madison, Wisconsin, USA, 2002, pp.65–76.Google Scholar
  17. [17]
    Neven F, Schwentick T. XPath containment in the presence of disjunction, DTDs and variables. In Proc. the 9th International Conference on Database Theory (ICDT), Siena, Italy, 2003, pp.315–329.Google Scholar
  18. [18]
    Xu W, Ozsoyoglu Z M. Rewriting XPath Queries Using Materialized Views. In Proc. the 31st International Conference on Very Large Data Base (VLDB), Trondheim, Norway, 2005, pp.121–132.Google Scholar
  19. [19]
    Schmidt A R, Waas F, Kersten M L et al. The XML benchmark project. Technical Report INS-R0103, CWI, Amsterdam, The Netherlands, 2001.Google Scholar

Copyright information

© Springer 2008

Authors and Affiliations

  1. 1.Department of Computer Science and TechnologyTsinghua UniversityBeijingChina

Personalised recommendations