XFlat: Query Friendly Encrypted XML View Publishing

  • Jun Gao
  • Tengjiao Wang
  • Dongqing Yang
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3841)

Abstract

The security of the published XML data receives high attention due to the sensitive nature of the data in some areas. This paper proposes an XML view publishing method called XFlat. Compared with other methods, XFlat focuses on the efficiency of query evaluation over the published XML view. XFlat decomposes a XML tree into a set of sub-trees with the same accessibility on each node to all users, encrypts and stores each sub-tree in a flat sequential way. This storage strategy can avoid the nested encryption in view construction and decryption in the query evaluation. In addition, we discuss how to generate the user specific schema and minimize the total space cost of XML view with the consideration of the size of the relationship among the sub-trees. The final experimental results demonstrate the effectiveness and efficiency of our method.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Fan, W.F., Chan, C.Y., Garofalakis, M.N.: Secure XML Querying with Security Views. In: Proc. of SIGMOD 2004 (2004)Google Scholar
  2. 2.
    Miklau, G., Suciu, D.: Controlling access to published data using cryptography. In: Proc. of VLDB 2003, pp. 898–909 (2003)Google Scholar
  3. 3.
    Cho, S., Amer Yahia, S., lakshmanman, L., Srivastava, D.: Optimizing the secure evaluation of twig queries. In: Proc. of VLDB 2002 (2002)Google Scholar
  4. 4.
    Damiani, E., Vimercata, S.d., Paraboshi, S., Samarati, P.: A fine-grained access control system for XML documents. TISSEC 5(2), 169–202 (2002)CrossRefGoogle Scholar
  5. 5.
    Bertino, E., Castano, S., Ferrari, E.: Securing XML Documents with Author-X. IEEE Internet Computing 5(3), 21–32 (2001)CrossRefGoogle Scholar
  6. 6.
    Hada, S., Kudo, M.: XML access control language: Provisional authorization for XML documents, http://www.trl.ibm.com/projects/xml/axcl/xacl-spec.html
  7. 7.
    Aoki, K., Lipmaa, H.: Fast implementations of AES Candidates. In: the 3rd AES candidate conference, NIST, pp. 106–120 (2000)Google Scholar
  8. 8.
    Feigenbaum, J., Liberman, M.Y., Wright, R.N.: Cryptographic protection of database and software. In: distributed computing and crypto, pp. 161–172 (1991)Google Scholar
  9. 9.
    Gottlob, G., Koch, C., Pichler, R.: Efficient Algorithms for Processing XPath Queries. In: Proc. of VLDB, pp. 95–106 (2002)Google Scholar
  10. 10.
    Clark, J.: XML Path language(XPath) (1999) available from the W3C, http://www.w3.org/TR/XPath
  11. 11.
    Fernandez, M.F., Suciu, D.: Optimizing Regular Path Expressions Using Graph Schemas. In: Proc. of ICDT, pp. 14–23 (1998)Google Scholar
  12. 12.
    Chan, C., Felber, P., Garofalakis, M., Rastogi, R.: Efficient filtering of XML document with XPath expressions. In: Proc. of ICDE, pp. 235–244 (2002)Google Scholar
  13. 13.
    Gao, J., Yang, D.Q., Tang, S.W., Wang, T.J.: XPath logical optimization based on DTD. Journal of Software 15(12), 1860–1868 (2004)MATHGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • Jun Gao
    • 1
  • Tengjiao Wang
    • 1
  • Dongqing Yang
    • 1
  1. 1.The School of Electronic Engineering and Computer SciencePeking UniversityBeijingChina

Personalised recommendations