TY - JOUR
T1 - Hiding tree structured data and queries from untrusted data stores
AU - Lin, Ping
AU - Candan, Kasim
PY - 2005
Y1 - 2005
N2 - With the increasing use of Web services, many new challenges concerning data security are becoming critical. Especially in mobile services, where clients are generally thin in terms of computation power and storage space, a remote server can be outsourced for the computation or can act as a data store. Unfortunately, such a data store may not always be trustworthy, and clients with sensitive data and queries may want protection from malicious attacks. This article presents a technique to hide tree-structured data from potentially malicious data stores, while allowing clients to traverse the data to locate an object of interest without leaking information to the data store. The two motivating applications for this approach are hiding (1) tree-like XML data as well as XML queries that are in the form of tree-paths, and (2) tree-structured indexes and queries executed on such data structures. We show that this task is achievable through a one-server protocol that introduces only a limited and adjustable communication overhead. This is especially essential in low-bandwidth (such as wireless) distributed environments. The proposed protocol has desirable communication and concurrency performance, as demonstrated by the experiments we have conducted.
AB - With the increasing use of Web services, many new challenges concerning data security are becoming critical. Especially in mobile services, where clients are generally thin in terms of computation power and storage space, a remote server can be outsourced for the computation or can act as a data store. Unfortunately, such a data store may not always be trustworthy, and clients with sensitive data and queries may want protection from malicious attacks. This article presents a technique to hide tree-structured data from potentially malicious data stores, while allowing clients to traverse the data to locate an object of interest without leaking information to the data store. The two motivating applications for this approach are hiding (1) tree-like XML data as well as XML queries that are in the form of tree-paths, and (2) tree-structured indexes and queries executed on such data structures. We show that this task is achievable through a one-server protocol that introduces only a limited and adjustable communication overhead. This is especially essential in low-bandwidth (such as wireless) distributed environments. The proposed protocol has desirable communication and concurrency performance, as demonstrated by the experiments we have conducted.
UR - http://www.scopus.com/inward/record.url?scp=84876798589&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84876798589&partnerID=8YFLogxK
U2 - 10.1201/1086.1065898X/45528.14.4.20050901/90085.3
DO - 10.1201/1086.1065898X/45528.14.4.20050901/90085.3
M3 - Article
AN - SCOPUS:84876798589
SN - 1939-3555
VL - 14
SP - 10
EP - 26
JO - Information Security Journal
JF - Information Security Journal
IS - 4
ER -