2017
DOI: 10.14778/3157794.3157796
|View full text |Cite
|
Sign up to set email alerts
|

An authorization model for multi provider queries

Abstract: We present a novel approach for the specification and enforcement of authorizations that enables controlled data sharing for collaborative queries in the cloud. Data authorities can establish authorizations regulating access to their data distinguishing three visibility levels (no visibility, encrypted visibility, and plaintext visibility). Authorizations are enforced in the query execution by possibly restricting operation assignments to other parties and by adjusting visibility of data on-the-fly. Our approa… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
24
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
2
2
1

Relationship

5
0

Authors

Journals

citations
Cited by 8 publications
(25 citation statements)
references
References 24 publications
1
24
0
Order By: Relevance
“…Although several approaches have been designed to protect the privacy of the users (e.g., [18]), this problem is particularly difficult in the data market scenario because the analysis may involve data of different owners with different (possibly contrasting) requirements that should be enforced. Also, since the result of an analysis over a (collection of) dataset(s) can leak sensitive information on the data that have been analyzed (and hence on the individuals to whom data refer), the data market should support data trading while protecting the privacy of all involved parties, thus avoiding both direct and indirect leakage of sensitive information (e.g., [28]).…”
Section: B Data Retrieval and Analyticsmentioning
confidence: 99%
“…Although several approaches have been designed to protect the privacy of the users (e.g., [18]), this problem is particularly difficult in the data market scenario because the analysis may involve data of different owners with different (possibly contrasting) requirements that should be enforced. Also, since the result of an analysis over a (collection of) dataset(s) can leak sensitive information on the data that have been analyzed (and hence on the individuals to whom data refer), the data market should support data trading while protecting the privacy of all involved parties, thus avoiding both direct and indirect leakage of sensitive information (e.g., [28]).…”
Section: B Data Retrieval and Analyticsmentioning
confidence: 99%
“…Given a query formulated by a final user and its query tree plan (e.g., see Figure 2(d)), it is necessary to assign each operation in the tree to a subject respecting the authorizations, while maximizing performance and minimizing economic costs. Note that, as illustrated in [4], encryption can be profitably used to enable the assignment of operations to less expensive, but also less trusted, cloud providers. For instance, considering the example in Figure 2, encryption of attribute ECG would enable Google to evaluate the selection condition.…”
Section: Reference Modelmentioning
confidence: 99%
“…2) Estimate economic costs: the algorithm simulates the operation execution by the candidate and generates the profile of the resulting relation, extended with an estimate of the economic cost. 3) Check uniform visibility: since some operators compare or combine attributes, the algorithm verifies the authorization policy also a posteriori, to check whether uniform visibility is satisfied [4], and possibly restricts the set of valid candidates. 4) Assign candidate: the algorithm, according to the greedy approach, assigns the operation to the valid candidate with the lowest economic cost.…”
Section: A Cost Optimizermentioning
confidence: 99%
See 2 more Smart Citations