Efficient Processing of Secured XML Metadata

  • Ling Feng
  • Willem Jonker
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 2889)

Abstract

Metadata management is a key issue in intelligent Web-based environments. It plays an important role in a wide spectrum of areas, ranging from semantic explication, information handling, knowledge management, multimedia processing to personalized service delivery. As a result, security issues around metadata management needs to be addressed in order to build trust and confidence to ambient environments. The aim of this paper is to bring together the worlds of security and XML-formatted metadata management in such a way that, on the one hand the requirement on secure metadata management is satisfied, while on the other other hand the efficiency on metadata processing can still be guaranteed. To this end, we develop an effective approach to enable efficient search on encrypted XML metadata. The basic idea is to augment encrypted XML metadata with encodings which characterize the topology and content of every tree-structured XML metadata, and then filter out candidate data for decryption and query execution by examining query conditions against these encodings. We describe a generic framework consisting of three phases, namely, query preparation, query pre-processing and query execution, to implement the proposed search strategy.

Keywords

Security metadata XML encryption search 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Altinel, M., Franklin, M.: Efficient filtering of XML documents for selective dissemination of information. In: Proc. the 26th Intl. Conf. on Very Large Data Bases, Cairo, Egypt, September 2000, pp. 53–64 (2000)Google Scholar
  2. 2.
    Chan, C., Felber, P., Carofalakis, M., Rastogi, R.: Efficient filtering of XML documents with XPath expressions. In: Proc. the Intl. Conf. on Data Engineering, California, USA (February 2002)Google Scholar
  3. 3.
    European Commission. Scenarios for ambient intelligence in 2010 (2001), http://www.cordis.lu/ist/istag.htm
  4. 4.
    World Wide Web Consortium. Extensible markup language (XML) 1.0 (October 2000), http://www.w3.org/TR/REC-xml
  5. 5.
    World Wide Web Consortium. XML encryption requirements (March 2002), http://www.w3.org/TR/xml-encryption-req
  6. 6.
    World Wide Web Consortium. XML encryption syntax and processing (August 2002), http://www.w3.org/TR/xmlenc-core/
  7. 7.
    World Wide Web Consortium. XML path language (XPath) 2.0 (November 2002), http://www.w3.org/TR/xpath20/
  8. 8.
    World Wide Web Consortium. XQuery 1.0: an XML query language (November 2002), http://www.w3.org/TR/xquery/
  9. 9.
    Dijkstra, E., Jonker, W., van Gageldonk, H.: Data and content management (chapter). In: Aarts, E., Marzano, S. (eds.) The New Everyday – Views on Ambient Intelligence, Koninklijke Philips Electronics N.V. (2003) ISBN 90-6450-502-0Google Scholar
  10. 10.
    Hacigümüş, H., Lyer, B., Li, C., Mehrotra, S.: Executing SQL over encrypted data in the database-service-provider model. In: Proc. the ACM SIGMOD Intl. Conf. on Management of Data, Wisconsin, USA, June 2002, pp. 216–227 (2002)Google Scholar
  11. 11.
    Hacigümüş, H., Lyer, B., Mehrotra, S.: Providing database as a service. In: Proc. Intl. Conf. on Data Engineering (2002)Google Scholar
  12. 12.
    Jonker, W.: XML and secure data managament in an ambient world. Computer Systems Science & Engineering (2003) (to appear)Google Scholar
  13. 13.
    Song, D., Wagner, D., Perrig, A.: Practical techniques for searches on encrypted data. In: Proc. the IEEE Symposium on Security and Privacy (2000)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2003

Authors and Affiliations

  • Ling Feng
    • 1
  • Willem Jonker
    • 1
    • 2
  1. 1.Dept. of Computer ScienceUniversity of TwenteThe Netherlands
  2. 2.Philips ResearchThe Netherlands

Personalised recommendations