An encrypted database with enforced access control and blockchain validation

Zhimei Sui, Shangqi Lai, Cong Zuo, Xingliang Yuan, Joseph K. Liu, Haifeng Qian

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Abstract

Data privacy and integrity is top of mind for modern data applications. To tackle with the above issue, we propose an encrypted database system with access control capabilities and blockchain validation in this paper. Compared to the existing encrypted database system, our design proposes a proxy-free architecture, which avoids the need for a trusted proxy for access control. In order to protect the integrity of user data, our system leverages the blockchain technology to realize a tampering protection mechanism. The mechanism ensures that modification logging is compulsory and public-available but hardened. Users can validate and easily detect the tampered data. Finally, we implement a prototype system and conduct evaluations on each component of the proposed system.

Original languageEnglish
Title of host publicationInformation Security and Cryptology
Subtitle of host publication14th International Conference, Inscrypt 2018 Fuzhou, China, December 14–17, 2018 Revised Selected Papers
EditorsFuchun Guo, Xinyi Huang, Moti Yung
Place of PublicationCham Switzerland
PublisherSpringer
Pages260-273
Number of pages14
ISBN (Electronic)9783030142346
ISBN (Print)9783030142339
DOIs
Publication statusPublished - 2019
EventInternational Conference on Information Security and Cryptology 2018 - Fuzhou, China
Duration: 14 Dec 201817 Dec 2018
Conference number: 14th
http://xxhb.fjnu.edu.cn/inscrypt2018/

Publication series

NameLecture Notes in Computer Science
PublisherSpringer
Volume11449
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

ConferenceInternational Conference on Information Security and Cryptology 2018
Abbreviated titleInscrypt 2018
CountryChina
CityFuzhou
Period14/12/1817/12/18
Internet address

Keywords

  • Access control
  • Blockchain
  • Data privacy
  • Encrypted database

Cite this

Sui, Z., Lai, S., Zuo, C., Yuan, X., Liu, J. K., & Qian, H. (2019). An encrypted database with enforced access control and blockchain validation. In F. Guo, X. Huang, & M. Yung (Eds.), Information Security and Cryptology: 14th International Conference, Inscrypt 2018 Fuzhou, China, December 14–17, 2018 Revised Selected Papers (pp. 260-273). (Lecture Notes in Computer Science ; Vol. 11449 ). Cham Switzerland: Springer. https://doi.org/10.1007/978-3-030-14234-6_14
Sui, Zhimei ; Lai, Shangqi ; Zuo, Cong ; Yuan, Xingliang ; Liu, Joseph K. ; Qian, Haifeng. / An encrypted database with enforced access control and blockchain validation. Information Security and Cryptology: 14th International Conference, Inscrypt 2018 Fuzhou, China, December 14–17, 2018 Revised Selected Papers. editor / Fuchun Guo ; Xinyi Huang ; Moti Yung. Cham Switzerland : Springer, 2019. pp. 260-273 (Lecture Notes in Computer Science ).
@inproceedings{9807635efd354aaf9bac92ee11c01be9,
title = "An encrypted database with enforced access control and blockchain validation",
abstract = "Data privacy and integrity is top of mind for modern data applications. To tackle with the above issue, we propose an encrypted database system with access control capabilities and blockchain validation in this paper. Compared to the existing encrypted database system, our design proposes a proxy-free architecture, which avoids the need for a trusted proxy for access control. In order to protect the integrity of user data, our system leverages the blockchain technology to realize a tampering protection mechanism. The mechanism ensures that modification logging is compulsory and public-available but hardened. Users can validate and easily detect the tampered data. Finally, we implement a prototype system and conduct evaluations on each component of the proposed system.",
keywords = "Access control, Blockchain, Data privacy, Encrypted database",
author = "Zhimei Sui and Shangqi Lai and Cong Zuo and Xingliang Yuan and Liu, {Joseph K.} and Haifeng Qian",
year = "2019",
doi = "10.1007/978-3-030-14234-6_14",
language = "English",
isbn = "9783030142339",
series = "Lecture Notes in Computer Science",
publisher = "Springer",
pages = "260--273",
editor = "Fuchun Guo and Xinyi Huang and Moti Yung",
booktitle = "Information Security and Cryptology",

}

Sui, Z, Lai, S, Zuo, C, Yuan, X, Liu, JK & Qian, H 2019, An encrypted database with enforced access control and blockchain validation. in F Guo, X Huang & M Yung (eds), Information Security and Cryptology: 14th International Conference, Inscrypt 2018 Fuzhou, China, December 14–17, 2018 Revised Selected Papers. Lecture Notes in Computer Science , vol. 11449 , Springer, Cham Switzerland, pp. 260-273, International Conference on Information Security and Cryptology 2018, Fuzhou, China, 14/12/18. https://doi.org/10.1007/978-3-030-14234-6_14

An encrypted database with enforced access control and blockchain validation. / Sui, Zhimei; Lai, Shangqi; Zuo, Cong; Yuan, Xingliang; Liu, Joseph K.; Qian, Haifeng.

Information Security and Cryptology: 14th International Conference, Inscrypt 2018 Fuzhou, China, December 14–17, 2018 Revised Selected Papers. ed. / Fuchun Guo; Xinyi Huang; Moti Yung. Cham Switzerland : Springer, 2019. p. 260-273 (Lecture Notes in Computer Science ; Vol. 11449 ).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

TY - GEN

T1 - An encrypted database with enforced access control and blockchain validation

AU - Sui, Zhimei

AU - Lai, Shangqi

AU - Zuo, Cong

AU - Yuan, Xingliang

AU - Liu, Joseph K.

AU - Qian, Haifeng

PY - 2019

Y1 - 2019

N2 - Data privacy and integrity is top of mind for modern data applications. To tackle with the above issue, we propose an encrypted database system with access control capabilities and blockchain validation in this paper. Compared to the existing encrypted database system, our design proposes a proxy-free architecture, which avoids the need for a trusted proxy for access control. In order to protect the integrity of user data, our system leverages the blockchain technology to realize a tampering protection mechanism. The mechanism ensures that modification logging is compulsory and public-available but hardened. Users can validate and easily detect the tampered data. Finally, we implement a prototype system and conduct evaluations on each component of the proposed system.

AB - Data privacy and integrity is top of mind for modern data applications. To tackle with the above issue, we propose an encrypted database system with access control capabilities and blockchain validation in this paper. Compared to the existing encrypted database system, our design proposes a proxy-free architecture, which avoids the need for a trusted proxy for access control. In order to protect the integrity of user data, our system leverages the blockchain technology to realize a tampering protection mechanism. The mechanism ensures that modification logging is compulsory and public-available but hardened. Users can validate and easily detect the tampered data. Finally, we implement a prototype system and conduct evaluations on each component of the proposed system.

KW - Access control

KW - Blockchain

KW - Data privacy

KW - Encrypted database

UR - http://www.scopus.com/inward/record.url?scp=85064125771&partnerID=8YFLogxK

U2 - 10.1007/978-3-030-14234-6_14

DO - 10.1007/978-3-030-14234-6_14

M3 - Conference Paper

SN - 9783030142339

T3 - Lecture Notes in Computer Science

SP - 260

EP - 273

BT - Information Security and Cryptology

A2 - Guo, Fuchun

A2 - Huang, Xinyi

A2 - Yung, Moti

PB - Springer

CY - Cham Switzerland

ER -

Sui Z, Lai S, Zuo C, Yuan X, Liu JK, Qian H. An encrypted database with enforced access control and blockchain validation. In Guo F, Huang X, Yung M, editors, Information Security and Cryptology: 14th International Conference, Inscrypt 2018 Fuzhou, China, December 14–17, 2018 Revised Selected Papers. Cham Switzerland: Springer. 2019. p. 260-273. (Lecture Notes in Computer Science ). https://doi.org/10.1007/978-3-030-14234-6_14