2021
DOI: 10.1007/s00778-021-00709-x
|View full text |Cite
|
Sign up to set email alerts
|

An authorization model for query execution in the cloud

Abstract: We present a novel approach for the specification and enforcement of authorizations that enables controlled data sharing for collaborative queries in the cloud. Data authorities can establish authorizations regulating access to their data distinguishing three visibility levels (no visibility, encrypted visibility, and plaintext visibility). Authorizations are enforced accounting for the information content carried in the computation to ensure no information is improperly leaked and adjusting visibility of data… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
4

Relationship

1
3

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 28 publications
0
3
0
Order By: Relevance
“…A recent approach for supporting the collaborative execution of queries over distributed data collections introduces an authorization model regulating the data on which different providers have explicit visibility [51]. This solution supports queries of the general form "select from where group by having" and their execution is performed according to a query plan that is represented as a tree T(N), with N the set of nodes in the tree, whose leaf nodes are base relations and whose internal nodes are the relational operations to be executed to perform the query.…”
Section: Collaborative Queries With Multiple Providersmentioning
confidence: 99%
See 2 more Smart Citations
“…A recent approach for supporting the collaborative execution of queries over distributed data collections introduces an authorization model regulating the data on which different providers have explicit visibility [51]. This solution supports queries of the general form "select from where group by having" and their execution is performed according to a query plan that is represented as a tree T(N), with N the set of nodes in the tree, whose leaf nodes are base relations and whose internal nodes are the relational operations to be executed to perform the query.…”
Section: Collaborative Queries With Multiple Providersmentioning
confidence: 99%
“…Visible and implicit attributes are distinguished between plaintext (i.e., R vp and R ip ) and encrypted (i.e., R ve and R ie ). Note that the profile of a relation can be extended to take into consideration the fact that the attributes used in a query can be renamed and that the relations managed by their data owners can also be stored in encrypted form [51,52].…”
Section: Policy Specification and Relation Profilementioning
confidence: 99%
See 1 more Smart Citation