Abstract
Data privacy and integrity is top of mind for modern data applications. To tackle with the above issue, we propose an encrypted database system with access control capabilities and blockchain validation in this paper. Compared to the existing encrypted database system, our design proposes a proxy-free architecture, which avoids the need for a trusted proxy for access control. In order to protect the integrity of user data, our system leverages the blockchain technology to realize a tampering protection mechanism. The mechanism ensures that modification logging is compulsory and public-available but hardened. Users can validate and easily detect the tampered data. Finally, we implement a prototype system and conduct evaluations on each component of the proposed system.
Original language | English |
---|---|
Title of host publication | Information Security and Cryptology |
Subtitle of host publication | 14th International Conference, Inscrypt 2018 Fuzhou, China, December 14–17, 2018 Revised Selected Papers |
Editors | Fuchun Guo, Xinyi Huang, Moti Yung |
Place of Publication | Cham Switzerland |
Publisher | Springer |
Pages | 260-273 |
Number of pages | 14 |
ISBN (Electronic) | 9783030142346 |
ISBN (Print) | 9783030142339 |
DOIs | |
Publication status | Published - 2019 |
Event | International Conference on Information Security and Cryptology 2018 - Fuzhou, China Duration: 14 Dec 2018 → 17 Dec 2018 Conference number: 14th http://xxhb.fjnu.edu.cn/inscrypt2018/ |
Publication series
Name | Lecture Notes in Computer Science |
---|---|
Publisher | Springer |
Volume | 11449 |
ISSN (Print) | 0302-9743 |
ISSN (Electronic) | 1611-3349 |
Conference
Conference | International Conference on Information Security and Cryptology 2018 |
---|---|
Abbreviated title | Inscrypt 2018 |
Country | China |
City | Fuzhou |
Period | 14/12/18 → 17/12/18 |
Internet address |
Keywords
- Access control
- Blockchain
- Data privacy
- Encrypted database
Cite this
}
An encrypted database with enforced access control and blockchain validation. / Sui, Zhimei; Lai, Shangqi; Zuo, Cong; Yuan, Xingliang; Liu, Joseph K.; Qian, Haifeng.
Information Security and Cryptology: 14th International Conference, Inscrypt 2018 Fuzhou, China, December 14–17, 2018 Revised Selected Papers. ed. / Fuchun Guo; Xinyi Huang; Moti Yung. Cham Switzerland : Springer, 2019. p. 260-273 (Lecture Notes in Computer Science ; Vol. 11449 ).Research output: Chapter in Book/Report/Conference proceeding › Conference Paper › Research › peer-review
TY - GEN
T1 - An encrypted database with enforced access control and blockchain validation
AU - Sui, Zhimei
AU - Lai, Shangqi
AU - Zuo, Cong
AU - Yuan, Xingliang
AU - Liu, Joseph K.
AU - Qian, Haifeng
PY - 2019
Y1 - 2019
N2 - Data privacy and integrity is top of mind for modern data applications. To tackle with the above issue, we propose an encrypted database system with access control capabilities and blockchain validation in this paper. Compared to the existing encrypted database system, our design proposes a proxy-free architecture, which avoids the need for a trusted proxy for access control. In order to protect the integrity of user data, our system leverages the blockchain technology to realize a tampering protection mechanism. The mechanism ensures that modification logging is compulsory and public-available but hardened. Users can validate and easily detect the tampered data. Finally, we implement a prototype system and conduct evaluations on each component of the proposed system.
AB - Data privacy and integrity is top of mind for modern data applications. To tackle with the above issue, we propose an encrypted database system with access control capabilities and blockchain validation in this paper. Compared to the existing encrypted database system, our design proposes a proxy-free architecture, which avoids the need for a trusted proxy for access control. In order to protect the integrity of user data, our system leverages the blockchain technology to realize a tampering protection mechanism. The mechanism ensures that modification logging is compulsory and public-available but hardened. Users can validate and easily detect the tampered data. Finally, we implement a prototype system and conduct evaluations on each component of the proposed system.
KW - Access control
KW - Blockchain
KW - Data privacy
KW - Encrypted database
UR - http://www.scopus.com/inward/record.url?scp=85064125771&partnerID=8YFLogxK
U2 - 10.1007/978-3-030-14234-6_14
DO - 10.1007/978-3-030-14234-6_14
M3 - Conference Paper
SN - 9783030142339
T3 - Lecture Notes in Computer Science
SP - 260
EP - 273
BT - Information Security and Cryptology
A2 - Guo, Fuchun
A2 - Huang, Xinyi
A2 - Yung, Moti
PB - Springer
CY - Cham Switzerland
ER -