loading
Papers Papers/2022 Papers Papers/2022

Research.Publish.Connect.

Paper

Paper Unlock

Authors: Ping Lin and K. Selçuk Candan

Affiliation: Arizona State University, United States

Keyword(s): XML, content privacy, access privacy.

Abstract: With the increasing use of web services, many new challenges concerning data security are becoming critical. Especially in mobile services, where clients are generally thin in terms of computation power and storage space, a remote server can be outsourced for the computation or can act as a data store. Unfortunately, such a data store may not always be trustworthy and clients with sensitive data and queries may want to be protected from malicious attacks. In this paper, we present a technique to hide tree structured data from potentially malicious data stores, while allowing clients to traverse the data to locate an object of interest without leaking information to the data store. The two motivating applications for this approach are hiding (1) tree-like XML data as well as XML queries that are in the form of tree-paths, and (2) tree-structured indexes and queries executed on such data structures. We show that this task is achievable through a one-server protocol which introduces onl y a limited and adjustable communication overhead. This is especially essential in low bandwidth (such as wireless) distributed environments. The proposed protocol has desirable communication and concurrency performance as demonstrated by the experiments we have conducted. (More)

CC BY-NC-ND 4.0

Sign In Guest: Register as new SciTePress user now for free.

Sign In SciTePress user: please login.

PDF ImageMy Papers

You are not signed in, therefore limits apply to your IP address 3.133.109.211

In the current month:
Recent papers: 100 available of 100 total
2+ years older papers: 200 available of 200 total

Paper citation in several formats:
Lin, P. and Selçuk Candan, K. (2004). Hiding Traversal of Tree Structured Data from Untrusted Data Stores. In Proceedings of the 2nd International Workshop on Security in Information Systems (ICEIS 2004) - WOSIS; ISBN 972-8865-07-4, SciTePress, pages 314-323. DOI: 10.5220/0002685203140323

@conference{wosis04,
author={Ping Lin. and K. {Sel\c{C}uk Candan}.},
title={Hiding Traversal of Tree Structured Data from Untrusted Data Stores},
booktitle={Proceedings of the 2nd International Workshop on Security in Information Systems (ICEIS 2004) - WOSIS},
year={2004},
pages={314-323},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0002685203140323},
isbn={972-8865-07-4},
}

TY - CONF

JO - Proceedings of the 2nd International Workshop on Security in Information Systems (ICEIS 2004) - WOSIS
TI - Hiding Traversal of Tree Structured Data from Untrusted Data Stores
SN - 972-8865-07-4
AU - Lin, P.
AU - Selçuk Candan, K.
PY - 2004
SP - 314
EP - 323
DO - 10.5220/0002685203140323
PB - SciTePress