An Authorization Model for Multi Provider Queries

被引:7
作者
di Vimercati, Sabrina De Capitani [1 ]
Foresti, Sara [1 ]
Jajodia, Sushil [2 ]
Livraga, Giovanni [1 ]
Paraboschi, Stefano [3 ]
Samarati, Pierangela [1 ]
机构
[1] Univ Milan, Milan, Italy
[2] George Mason Univ, Fairfax, VA 22030 USA
[3] Univ Bergamo, Bergamo, Italy
来源
PROCEEDINGS OF THE VLDB ENDOWMENT | 2017年 / 11卷 / 03期
基金
美国国家科学基金会;
关键词
D O I
10.14778/3157794.3157796
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We present a novel approach for the specification and enforcement of all that enables of authorizations that enables controlled data sharing for collaborative queries in the cloud. Data authorities can establish authorizations regulating access to their data distinguishing three visibility levels (no visibility, encrypted visibility, and plaintext visibility). Authorizations are enforced in the query execution by possibly restricting operation assignments to other parties and by adjusting visibility of data on the fly. Our approach enables users and data authorities to fully enjoy the benefits and economic savings of the competitive open cloud market, while maintaining control over data.
引用
收藏
页码:256 / 268
页数:13
相关论文
共 22 条
  • [1] Spark SQL: Relational Data Processing in Spark
    Armbrust, Michael
    Xin, Reynold S.
    Lian, Cheng
    Huai, Yin
    Liu, Davies
    Bradley, Joseph K.
    Meng, Xiangrui
    Kaftan, Tomer
    Franklint, Michael J.
    Ghodsi, Ali
    Zaharia, Matei
    [J]. SIGMOD'15: PROCEEDINGS OF THE 2015 ACM SIGMOD INTERNATIONAL CONFERENCE ON MANAGEMENT OF DATA, 2015, : 1383 - 1394
  • [2] SMCQL: Secure Querying for Federated Databases
    Bater, Johes
    Elliott, Gregory
    Eggen, Craig
    Goel, Satyender
    Kho, Abel
    Rogers, Jennie
    [J]. PROCEEDINGS OF THE VLDB ENDOWMENT, 2017, 10 (06): : 673 - 684
  • [3] Querying with Access Patterns and Integrity Constraints
    Benedikt, Michael
    Leblay, Julien
    Tsamoura, Efthymia
    [J]. PROCEEDINGS OF THE VLDB ENDOWMENT, 2015, 8 (06): : 690 - 701
  • [4] MAD Skills: New Analysis Practices for Big Data
    Cohen, Jeffrey
    Dolan, Brian
    Dunlap, Mark
    Hellerstein, Joseph M.
    Welton, Caleb
    [J]. PROCEEDINGS OF THE VLDB ENDOWMENT, 2009, 2 (02): : 1481 - 1492
  • [5] De Capitani di Vimercati Sabrina, 2016, The New Codebreakers Essays Dedicated to David Kahn on the Occasion of His 85th Birthday. LNCS 9100, P205, DOI 10.1007/978-3-662-49301-4_15
  • [6] Authorization enforcement in distributed query evaluation
    di Vimercati, Sabrina
    Foresti, Sara
    Jajodia, Sushil
    Paraboschi, Stefano
    Samarati, Pierangela
    [J]. JOURNAL OF COMPUTER SECURITY, 2011, 19 (04) : 751 - 794
  • [7] Efficient integrity checks for join queries in the cloud
    di Vimercati, Sabrina De Capitani
    Foresti, Sara
    Jajodia, Sushil
    Paraboschi, Stefano
    Samarati, Pierangela
    [J]. JOURNAL OF COMPUTER SECURITY, 2016, 24 (03) : 347 - 378
  • [8] Fragmentation in Presence of Data Dependencies
    di Vimercati, Sabrina De Capitani
    Foresti, Sara
    Jajodia, Sushil
    Livraga, Giovanni
    Paraboschi, Stefano
    Samarati, Pierangela
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2014, 11 (06) : 510 - 523
  • [9] Farnan NL, 2014, PROC INT CONF DATA, P424, DOI 10.1109/ICDE.2014.6816670
  • [10] Grofig P., 2014, SICHERHEIT 2014, VP-228, P115