2013
DOI: 10.1007/978-3-642-39256-6_20
|View full text |Cite
|
Sign up to set email alerts
|

Rule Enforcement with Third Parties in Secure Cooperative Data Access

Abstract: Abstract. In this paper, we consider the scenario where a set of parties need to cooperate with one another. To safely exchange the information, a set of authorization rules is given to the parties. In some cases, a trusted third party is required to perform the expected operations. Since interactions with the third party can be expensive and there maybe risk of data exposure/misuse, it is important to minimize their use. We formulate the minimization problem and show the problem is in NP -hard. We then propos… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4

Citation Types

0
4
0

Year Published

2013
2013
2016
2016

Publication Types

Select...
3
1
1

Relationship

2
3

Authors

Journals

citations
Cited by 5 publications
(4 citation statements)
references
References 8 publications
0
4
0
Order By: Relevance
“…The algorithm also has some key enhancements so that it is less likely to generate suboptimal query plans. The paper also provides more insights into the single TP case discussed in [15] and extend the analysis to multiple third parties.…”
Section: Introductionmentioning
confidence: 87%
See 1 more Smart Citation
“…The algorithm also has some key enhancements so that it is less likely to generate suboptimal query plans. The paper also provides more insights into the single TP case discussed in [15] and extend the analysis to multiple third parties.…”
Section: Introductionmentioning
confidence: 87%
“…In addition to direct changes to the rules, another way to enforce rules is by introducing trusted third parties (TP) that can obtain the necessary data and do the required manipulations. In [15], we studied the special case of a single TP trusted by all parties. In this paper, we extend the analysis to multiple TPs with partial trust relationships.…”
Section: Introductionmentioning
confidence: 99%
“…Significant effort has been made to protect data confidentiality in mutli-party database networks by enforcing data authorization policies [3,8,9,14]. Previous work has also proposed new query engines that consider query information confidentiality during collaborative query execution [4][5][6].…”
Section: Introductionmentioning
confidence: 99%
“…The consistency problem refers to the fact that if a party is provided access to two relations, say R and S, it is very difficult to prevent it from joining these relations, but the rule may deny access to R S. Our previous research has addressed this issue [12] and here we simply assume that the rules are upwards closed, i.e., access to R and S will automatically enable access to R S. The enforceability problem can be illustrated as follows: If a party P is given access to R S but it and no other party has access to both R and S, it is not possible to actually compute R S. We have examined this problem in [13]. In some cases, enforceability requires introducing a trusted third party [14] that is given sufficient access rights to perform the operation in question (e.g., R S in our example). Third parties bring in their own security risks, and we do not consider them in this paper.…”
Section: Introductionmentioning
confidence: 99%