Updating encrypted XML documents on untrusted machines

被引:0
作者
Reddy, P [1 ]
Mayo, RN [1 ]
O'Brien-Strain, E [1 ]
Rowson, J [1 ]
Xiong, YH [1 ]
机构
[1] Hewlett Packard Labs, Palo Alto, CA 94304 USA
来源
SECURITY AND PROTECTION IN INFORMATION PROCESSING SYSTEMS | 2004年 / 147卷
关键词
XML; security; incremental cryptography; XOR MACS; incremental change support;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With XML and other data types becoming increasingly used in distributed systems, we have a need to update this data in a way that preserves privacy and integrity. Prior work has developed ways of encrypting XML documents for privacy, and adding integrity codes to ensure that the data is not tampered with. In this paper we present an algorithm that allows XML documents, or other tree-structured data, to be updated without decrypting them. In our model of a distributed system, several trusted machines have access to the decrypted form of a document and may request changes to it. These change requests are encrypted and sent to an untrusted update machine for processing. The update machine is able to take the original encrypted document, apply the encrypted changes, and produce an updated encrypted document. In addition, an integrity code is produced that proves the untrusted machine performed the update correctly. In practice, our algorithm allows trusted machines in a distributed system to send incremental updates to a storage server, even if that server is not allowed access to the clear text.
引用
收藏
页码:425 / 439
页数:15
相关论文
共 10 条
[1]  
Bellare M., 1995, XOR MACS NEW METHODS
[2]  
BELLARE M, 1995, P 27 ACM S THEORY CO
[3]  
BELLARE M, CRYPTO 94 P, V839
[4]  
BRAY T, 2000, EXTENSIBLE MARKUP LA
[5]  
FONTAINE RL, MERGING XML FILES NE
[6]  
FREDRICK J, GETTING STARED XML S
[7]  
*IBM CORP, 2003, ALPHAWORKS XML SEC S
[8]  
Tanenbaum A.S., 2002, DISTRIBUTED SYSTEMS
[9]  
*WORLD WID WEB CON, 2002, XML ENCR SYNT PRO
[10]  
*WORLD WID WEB CON, 2002, XML SIGN SYNT PROC