Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
Security analysis of cryptographically controlled access to XML documents
Abadi M., Warinschi B. Journal of the ACM55 (2):1-29,2008.Type:Article
Date Reviewed: Aug 25 2008

The ability to enforce policies on online access to data is a crucial ingredient of any viable Web technology. Recently, several elaborate schemes for fine-grained control of access to published Extensible Markup Language (XML) documents were developed. Instead of producing many versions of the same data for each potential user group, these policies avoid data duplication by relying on cryptography. For example, these policies allow users to publish medical records as XML documents so that only authorized users can see their contents.

In 2003, Miklau and Suciu developed a policy query language that implements fine-grained access policies on XML documents and a corresponding logical model based on the concept of protection [1]. They showed how to translate consistent policies into protections and how to subsequently implement protections through XML encryption. Their analysis, however, does not address the question of whether the used cryptographic keys and encryption techniques correctly implement the abstract notion of protection. In this paper, Abadi and Warinschi address and bridge this crucial gap. They replace Miklau and Suciu’s informal concept of data secrecy with a strong cryptographic definition.

The authors use the following notion of security: assume that an adversary is given an arbitrary set of keys and the ability to select two instantiations for the data in all nodes that occur in an XML document; these two instantiations must coincide on the nodes to which the adversary has rightful access according to its keys, but may differ elsewhere. Given the partially encrypted document that corresponds to one of its two documents, the adversary must now decide which of the two instantiations was used in generating the partially encrypted document. Security means that the adversary cannot do much better than picking at random. Using a more formal version of this notion of security, the authors are able to prove that the encryption-based techniques suggested by Miklau and Suciu secure XML data.

After a short introduction in Section 1, the paper reviews XML access control with protections in Section 2. In Section 3, the authors introduce a formal language to represent cryptographic expressions. The main result, showing that protections are secure, is presented in Section 4. Section 5 discusses some extensions, and the conclusions are presented in Section 6.

I highly recommend this well-written paper. It makes a significant contribution, since its approach may serve as a blueprint for other researchers in their attempts to bridge the gap between the design and implementation of online security on one hand, and a strong guarantee of online security on the other.

Reviewer:  Burkhard Englert Review #: CR135987 (0907-0672)
1) Miklau, G.; Suciu, D. Controlling access to published data using cryptography. In Proc. of the 29th International Conference on Very Large Data Bases (Sept., 2003), VLDB Endowment, 2003, 898–909.
Bookmark and Share
  Featured Reviewer  
 
Data Encryption (E.3 )
 
 
Relations Between Models (F.1.1 ... )
 
 
Database Administration (H.2.7 )
 
 
Models Of Computation (F.1.1 )
 
Would you recommend this review?
yes
no
Other reviews under "Data Encryption": Date
ESA/390 integrated cryptographic facility
Yeh P., Ronald M. S. IBM Systems Journal 30(2): 192-205, 1991. Type: Article
Feb 1 1992
Design and implementation of an RSA cryptosystem using multiple DSP chips
Er M., Wong D., Sethu A., Ngeow K. Microprocessors & Microsystems 15(7): 369-378, 1991. Type: Article
Nov 1 1993
An introduction to cryptography
Diffie W. (ed), Hellman M., John Wiley & Sons, Inc., New York, NY, 1984. Type: Book (9780471262336)
Feb 1 1986
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy