QFilter: rewriting insecure XML queries to secure ones using non-deterministic finite automata

被引:7
|
作者
Luo, Bo [1 ]
Lee, Dongwon [2 ]
Lee, Wang-Chien [2 ]
Liu, Peng [2 ]
机构
[1] Univ Kansas, Lawrence, KS 66045 USA
[2] Penn State Univ, University Pk, PA 16802 USA
基金
美国国家科学基金会;
关键词
XML; Security; Access control; NFA; ACCESS-CONTROL;
D O I
10.1007/s00778-010-0202-x
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we ask whether XML access control can be supported when underlying (XML or relational) storage system does not provide adequate security features and propose three alternative solutions-primitive, pre-processing, and post-processing. Toward that scenario, in particular, we advocate a scalable and effective pre-processing approach, called QFilter. QFilter is based on non-deterministic finite automata (NFA) and rewrites user's queries such that parts violating access control rules are pre-pruned. Through analysis and experimental validation, we show that (1) QFilter guarantees that only permissible portion of data is returned to the authorized users, (2) such access controls can be efficiently enforced without relying on security features of underlying storage system, and (3) such independency makes QFilter capable of many emerging applications, such as in-network access control and access control outsourcing.
引用
收藏
页码:397 / 415
页数:19
相关论文
共 4 条
  • [1] QFilter: rewriting insecure XML queries to secure ones using non-deterministic finite automata
    Bo Luo
    Dongwon Lee
    Wang-Chien Lee
    Peng Liu
    The VLDB Journal, 2011, 20 : 397 - 415
  • [2] The Necessary and Sufficient Condition of State Merging in Non-Deterministic Finite Automata
    Zhang, Ming-ming
    Tang, Rui-xue
    PROCEEDINGS OF 2010 ASIA-PACIFIC YOUTH CONFERENCE ON COMMUNICATION, VOLS 1 AND 2, 2010, : 641 - 646
  • [3] Limitations of non-deterministic finite automata imposed by one letter input alphabet
    Mancinska, L
    Ozols, N
    Praude, R
    Zalcmane, A
    FCS '05: PROCEEDINGS OF THE 2005 INTERNATIONAL CONFERENCE ON FOUNDATIONS OF COMPUTER SCIENCE, 2005, : 161 - 166
  • [4] Using Reputation Systems and Non-Deterministic Routing to Secure Wireless Sensor Networks
    Moya, Jose M.
    Carlos Vallejo, Juan
    Fraga, David
    Araujo, Alvaro
    Villanueva, Daniel
    de Goyeneche, Juan-Mariano
    SENSORS, 2009, 9 (05) : 3958 - 3980