Rule Enforcement with Third Parties in Secure Cooperative Data Access

  • Meixing Le
  • Krishna Kant
  • Sushil Jajodia
Part of the Lecture Notes in Computer Science book series (LNCS, volume 7964)


In this paper, we consider the scenario where a set of parties need to cooperate with one another. To safely exchange the information, a set of authorization rules is given to the parties. In some cases, a trusted third party is required to perform the expected operations. Since interactions with the third party can be expensive and there maybe risk of data exposure/misuse, it is important to minimize their use. We formulate the minimization problem and show the problem is in NP-hard. We then propose a greedy algorithm to find close to optimal solutions.


Authorization rule Trusted third party Join Path 


  1. 1.
    Agrawal, R., Asonov, D., Kantarcioglu, M., Li, Y.: Sovereign joins. In: Proceedings of the 22nd International Conference on Data Engineering, ICDE 2006, Atlanta, GA, USA, April 3-8, IEEE Computer Society (2006)Google Scholar
  2. 2.
    Bernstein, P.A., Goodman, N., Wong, E., Reeve, C.L., Rothnie Jr., J.B.: Query processing in a system for distributed databases (SDD-1). ACM Transactions on Database Systems 6(4), 602–625 (1981)zbMATHCrossRefGoogle Scholar
  3. 3.
    Chaudhuri, S.: An overview of query optimization in relational systems. In: Proceedings of the 7th ACM Symposium on Principles of Database Systems (1998)Google Scholar
  4. 4.
    Chow, S.S., Lee, J.-H., Subramanian, L.: Two-party computation model for privacy-preserving queries over distributed databases. In: Proceedings of the 16th Network and Distributed System Security Symposium (2009)Google Scholar
  5. 5.
    De Capitani di Vimercati, S., Foresti, S., Jajodia, S., Paraboschi, S., Samarati, P.: Controlled information sharing in collaborative distributed query processing. In: ICDCS 2008, Beijing, China (June 2008)Google Scholar
  6. 6.
    Kissner, L., Song, D.: Privacy-preserving set operations. In: Shoup, V. (ed.) CRYPTO 2005, vol. 3621, pp. 241–257. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  7. 7.
    Kossmann, D.: The state of the art in distributed query processing. ACM Computer Survey 32(4), 422–469 (2000)CrossRefGoogle Scholar
  8. 8.
    Le, M., Kant, K., Jajodia, S.: Rule configuration checking in secure cooperative data access. In: SafeConfig 2012 (October 2012)Google Scholar
  9. 9.
    Mishra, D.K., Trivedi, P., Shukla, S.: A glance at secure multiparty computation for privacy preserving data mining. International Journal 1 (2009)Google Scholar

Copyright information

© IFIP International Federation for Information Processing 2013

Authors and Affiliations

  • Meixing Le
    • 1
  • Krishna Kant
    • 1
  • Sushil Jajodia
    • 1
  1. 1.George Mason UniversityFairfaxUSA

Personalised recommendations