Advertisement

Dissemination of Authenticated Tree-Structured Data with Privacy Protection and Fine-Grained Control in Outsourced Databases

  • Jianghua Liu
  • Jinhua Ma
  • Wanlei Zhou
  • Yang Xiang
  • Xinyi Huang
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 11099)

Abstract

The advent of cloud computing has inspired an increasing number of users outsourcing their data to remote servers to enjoy flexible and affordable data management services. However, storing data in a remote cloud server raises data privacy and security concerns, i.e., the integrity and origin of the query results. Although some solutions have been proposed to address these issues, none of them consider the arbitrary dissemination control of authenticated tree-structured data while disseminating to other users.

To address the above concerns, in this paper, we first propose a novel and efficient redactable signature scheme which features editable homomorphic operation and redaction control on tree-structured data. Subsequently, we prove the security properties of our scheme and conduct extensive theoretical and experimental analyses. The experimental results show that our scheme outperforms the existing solutions in disseminating of authenticated tree-structured data with privacy protection and dissemination control in outsourced database (ODB) model.

Notes

Acknowledgment

We thank several anonymous reviewers for their excellent feedback. This work is supported by National Natural Science Foundation of China (61472083, 61771140) and Distinguished Young Scholars Fund of Fujian (2016J06013).

References

  1. 1.
    Beimel, A.: Secure schemes for secret sharing and key distribution. Ph.D. thesis, Israel Institute of Technology, Technion, Haifa, Israel (1996)Google Scholar
  2. 2.
    Boneh, D., Gentry, C., Lynn, B., Shacham, H.: Aggregate and verifiably encrypted signatures from bilinear maps. In: Biham, E. (ed.) EUROCRYPT 2003. LNCS, vol. 2656, pp. 416–432. Springer, Heidelberg (2003).  https://doi.org/10.1007/3-540-39200-9_26CrossRefGoogle Scholar
  3. 3.
    Boneh, D., Lynn, B., Shacham, H.: Short signatures from the weil pairing. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol. 2248, pp. 514–532. Springer, Heidelberg (2001).  https://doi.org/10.1007/3-540-45682-1_30CrossRefGoogle Scholar
  4. 4.
    Brzuska, C., et al.: Redactable signatures for tree-structured data: definitions and constructions. In: Zhou, J., Yung, M. (eds.) ACNS 2010. LNCS, vol. 6123, pp. 87–104. Springer, Heidelberg (2010).  https://doi.org/10.1007/978-3-642-13708-2_6CrossRefGoogle Scholar
  5. 5.
    Bull, L., Squire, D.M.G., Zheng, Y.: A hierarchical extraction policy for content extraction signatures. Int. J. Digit. Libr. 4(3), 208–222 (2004)CrossRefGoogle Scholar
  6. 6.
    Fu, Z., Ren, K., Shu, J., Sun, X., Huang, F.: Enabling personalized search over encrypted outsourced data with efficiency improvement. IEEE Trans. Parallel Distrib. Syst. 27(9), 2546–2559 (2016)CrossRefGoogle Scholar
  7. 7.
    Goyal, V., Pandey, O., Sahai, A., Waters, B.: Attribute-based encryption for fine-grained access control of encrypted data. In: Proceedings of the 13th ACM Conference on Computer and Communications Security, pp. 89–98. ACM (2006)Google Scholar
  8. 8.
    Hacigumus, H., Iyer, B., Mehrotra, S.: Providing database as a service. In: 2002 Proceedings of 18th International Conference on Data Engineering, pp. 29–38. IEEE (2002)Google Scholar
  9. 9.
    Jain, R., Prabhakar, S.: Trustworthy data from untrusted databases. In: 2013 IEEE 29th International Conference on Data Engineering (ICDE), pp. 529–540. IEEE (2013)Google Scholar
  10. 10.
    Johnson, R., Molnar, D., Song, D., Wagner, D.: Homomorphic signature schemes. In: Preneel, B. (ed.) CT-RSA 2002. LNCS, vol. 2271, pp. 244–262. Springer, Heidelberg (2002).  https://doi.org/10.1007/3-540-45760-7_17CrossRefGoogle Scholar
  11. 11.
    Karchmer, M., Wigderson, A.: On span programs. In: Proceedings of 1993 Eighth Annual Conference on Structure in Complexity Theory, pp. 102–111. IEEE (1993)Google Scholar
  12. 12.
    Kundu, A., Atallah, M.J., Bertino, E.: Efficient leakage-free authentication of trees, graphs and forests. IACR Cryptology ePrint Archive, vol. 2012, p. 36 (2012)Google Scholar
  13. 13.
    Kundu, A., Atallah, M.J., Bertino, E.: Leakage-free redactable signatures. In: Proceedings of the Second ACM Conference on Data and Application Security and Privacy, pp. 307–316. ACM (2012)Google Scholar
  14. 14.
    Kundu, A., Bertino, E.: Structural signatures for tree data structures. Proc. VLDB Endow. 1(1), 138–150 (2008)CrossRefGoogle Scholar
  15. 15.
    Liu, J., Huang, X., Liu, J.K.: Secure sharing of personal health records in cloud computing: ciphertext-policy attribute-based signcryption. Future Gener. Comput. Syst. 52, 67–76 (2015)CrossRefGoogle Scholar
  16. 16.
    Ma, J., Liu, J., Huang, X., Xiang, Y., Wu, W.: Authenticated data redaction with fine-grained control. IEEE Trans. Emerg. Top. Comput. (2017)Google Scholar
  17. 17.
    Ma, J., Liu, J., Wang, M., Wu, W.: An efficient and secure design of redactable signature scheme with redaction condition control. In: Au, M.H.A., Castiglione, A., Choo, K.-K.R., Palmieri, F., Li, K.-C. (eds.) GPC 2017. LNCS, vol. 10232, pp. 38–52. Springer, Cham (2017).  https://doi.org/10.1007/978-3-319-57186-7_4CrossRefGoogle Scholar
  18. 18.
    de Meer, H., Pöhls, H.C., Posegga, J., Samelin, K.: Redactable signature schemes for trees with signer-controlled non-leaf-redactions. In: Obaidat, M.S., Filipe, J. (eds.) ICETE 2012. CCIS, vol. 455, pp. 155–171. Springer, Heidelberg (2014).  https://doi.org/10.1007/978-3-662-44791-8_10CrossRefGoogle Scholar
  19. 19.
    Merkle, R.C.: A certified digital signature. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 218–238. Springer, New York (1990).  https://doi.org/10.1007/0-387-34805-0_21CrossRefGoogle Scholar
  20. 20.
    Miyazaki, K., Hanaoka, G., Imai, H.: Digitally signed document sanitizing scheme based on bilinear maps. In: Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, pp. 343–354. ACM (2006)Google Scholar
  21. 21.
    Miyazaki, K., Iwamura, M., Matsumoto, T., Sasaki, R., Yoshiura, H., Tezuka, S.: Digitally signed document sanitizing scheme with disclosure condition control. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 88(1), 239–246 (2005)CrossRefGoogle Scholar
  22. 22.
    Samelin, K., Pöhls, H.C., Bilzhause, A., Posegga, J., de Meer, H.: Redactable signatures for independent removal of structure and content. In: Ryan, M.D., Smyth, B., Wang, G. (eds.) ISPEC 2012. LNCS, vol. 7232, pp. 17–33. Springer, Heidelberg (2012).  https://doi.org/10.1007/978-3-642-29101-2_2CrossRefzbMATHGoogle Scholar
  23. 23.
    Samelin, K., Pöhls, H.C., Bilzhause, A., Posegga, J., de Meer, H.: On structural signatures for tree data structures. In: Bao, F., Samarati, P., Zhou, J. (eds.) ACNS 2012. LNCS, vol. 7341, pp. 171–187. Springer, Heidelberg (2012).  https://doi.org/10.1007/978-3-642-31284-7_11CrossRefzbMATHGoogle Scholar
  24. 24.
    Shamir, A.: How to share a secret. Commun. ACM 22(11), 612–613 (1979)MathSciNetCrossRefGoogle Scholar
  25. 25.
    Steinfeld, R., Bull, L., Zheng, Y.: Content extraction signatures. In: Kim, K. (ed.) ICISC 2001. LNCS, vol. 2288, pp. 285–304. Springer, Heidelberg (2002).  https://doi.org/10.1007/3-540-45861-1_22CrossRefGoogle Scholar
  26. 26.
    Wang, Q., Wang, C., Ren, K., Lou, W., Li, J.: Enabling public auditability and data dynamics for storage security in cloud computing. IEEE Trans. Parallel Distrib. Syst. 22(5), 847–859 (2011)CrossRefGoogle Scholar
  27. 27.
    Wu, Z.Y., Hsueh, C.W., Tsai, C.Y., Lai, F., Lee, H.C., Chung, Y.: Redactable signatures for signed CDA documents. J. Med. Syst. 36(3), 1795–1808 (2012)CrossRefGoogle Scholar
  28. 28.
    Xia, Z., Wang, X., Sun, X., Wang, Q.: A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data. IEEE Trans. Parallel Distrib. Syst. 27(2), 340–352 (2016)CrossRefGoogle Scholar

Copyright information

© Springer Nature Switzerland AG 2018

Authors and Affiliations

  • Jianghua Liu
    • 1
  • Jinhua Ma
    • 5
  • Wanlei Zhou
    • 2
  • Yang Xiang
    • 3
    • 4
  • Xinyi Huang
    • 5
  1. 1.School of Information TechnologyDeakin UniversityBurwoodAustralia
  2. 2.School of SoftwareUniversity of Technology SydneyUltimoAustralia
  3. 3.Digital Research and Innovation Capability PlatformSwinburne University of TechnologyMelbourneAustralia
  4. 4.State Key Laboratory of Integrated Service Networks (ISN)Xidian UniversityXi’anChina
  5. 5.School of Mathematics and Computer ScienceFujian Normal UniversityFuzhouChina

Personalised recommendations