belonging to the same group. Consequently, it is
important to find an adequate mechanism for non-
relational database and provides property to hide ac-
cess control from the database side. However, in
2005, Sahai and Waters proposed attribute-based en-
cryption (ABE)(Sahai and Waters, 2005), which is
a type of public key encryption, that uses user iden-
tity for encrypting and decrypting data to access con-
trol of document data. ABE can further be classi-
fied into two types: key-policy-ABE(KP-ABE) and
ciphertext-policy-ABE(CP-ABE). In 2006, Goyal de-
veloped KP-ABE (Goyal et al., 2006) and stated that
the ciphertext is associated with a set of attributes with
the secret key associated with access policy (AP). A
user can decrypt data only if the corresponding at-
tributes of ciphertext satisfies the AP of a user’s key.
The disadvantage of this type of ABE is that the Data
Owner cannot determine which users can decrypt the
data. Therefore, KP-ABE is not suitable for applica-
tions which share data. However, in 2007, Bethen-
court developed CP-ABE (Bethencourt et al., 2007)
and stated that the cipher-text is associated with ac-
cess policy (AP) with the secret key associated with a
set of attributes to overcome the disadvantage of KP-
ABE and more suitable for applications. Both KP-
ABE and CP-ABE lack user revocation mechanism.
Though previous studies such as in (Pirretti et al.,
2006; Boldyreva et al., 2008; Liang et al., 2013) have
noted that revocation mechanism has been added to
CP-ABE, it requires either key re-distribution or data
re-encryption. In 2012, Jahid and Borisov proposed
the PIRATTE scheme (Jahid and Borisov, 2012) to
address these limitations as explained on background
section.
7 CONCLUSIONS
This paper presents the main idea of Secure Docu-
ment Database (SDDB) scheme satisfying three main
security database requirements, which are confiden-
tiality, flexible access control and querying over en-
crypted data for a document-based store. Future work
will concentrate on the choice of encryption primi-
tives appropriate to construct onions. Then, SDDB
will be implemented on the MongoDB and trade-off
between security and performance will be evaluated.
ACKNOWLEDGMENTS
Maryam Almarwani was supported by Royal Em-
bassy of Saudi Arabia. Alexei Lisitsa was partially
supported by EPSRC funded RAI Hub FAIR-SPACE
(EP/R026092/1).
REFERENCES
Db-engines ranking. https://db-engines.com/en/ranking.
Accessed: 2018-11-14.
Nosql, rdbms - explore - google trends.
https://trends.google.com/trends/explore?date=all
&q=NoSQL,RDBMS. Accessed: 2018-07-14.
Aburawi, N., Coenen, F., and Lisitsa, A. Traversal-aware
encryption adjustment for graph databases.
Aburawi, N., Lisitsa, A., and Coenen, F. (2018). Querying
encrypted graph databases. In Proceedings of the 4th
International Conference on Information Systems Se-
curity and Privacy, ICISSP 2018, Funchal, Madeira -
Portugal, January 22-24, 2018., pages 447–451.
Bethencourt, J., Sahai, A., and Waters, B. (2007).
Ciphertext-policy attribute-based encryption. In Secu-
rity and Privacy, 2007. SP’07. IEEE Symposium on,
pages 321–334. IEEE.
Boldyreva, A., Goyal, V., and Kumar, V. (2008). Identity-
based encryption with efficient revocation. In Pro-
ceedings of the 15th ACM conference on Computer
and communications security, pages 417–426. ACM.
Ferretti, L., Colajanni, M., and Marchetti, M. (2013). Ac-
cess control enforcement on query-aware encrypted
cloud databases. In 2013 IEEE 5th International Con-
ference on Cloud Computing Technology and Science
(CloudCom), pages 219–219. IEEE.
Goyal, V., Pandey, O., Sahai, A., and Waters, B. (2006).
Attribute-based encryption for fine-grained access
control of encrypted data. In Proceedings of the 13th
ACM conference on Computer and communications
security, pages 89–98. Acm.
Jahid, S. and Borisov, N. (2012). Piratte: Proxy-based
immediate revocation of attribute-based encryption.
arXiv preprint arXiv:1208.4877.
Liang, K., Fang, L., Susilo, W., and Wong, D. S. (2013). A
ciphertext-policy attribute-based proxy re-encryption
with chosen-ciphertext security. In Intelligent Net-
working and Collaborative Systems (INCoS), 2013 5th
International Conference on, pages 552–559. IEEE.
Pirretti, M., Traynor, P., McDaniel, P., and Waters, B.
(2006). Secure attribute-based systems.
Popa, R. A., Redfield, C., Zeldovich, N., and Balakrish-
nan, H. (2011). Cryptdb: protecting confidentiality
with encrypted query processing. In Proceedings of
the Twenty-Third ACM Symposium on Operating Sys-
tems Principles, pages 85–100. ACM.
Sahai, A. and Waters, B. (2005). Fuzzy identity-based
encryption. In Annual International Conference on
the Theory and Applications of Cryptographic Tech-
niques, pages 457–473. Springer.
Sarfraz, M. I., Nabeel, M., Cao, J., and Bertino, E. (2015).
Dbmask: fine-grained access control on encrypted re-
lational databases. In Proceedings of the 5th ACM
Flexible Access Control and Confidentiality over Encrypted Data for Document-based Database
613