QShield: Protecting Outsourced Cloud Data Queries With Multi-User Access Control Based on SGX
نویسندگان
چکیده
Due to the concern on cloud security, digital encryption is applied before outsourcing data for utilization. This introduces a challenge about how efficiently perform queries over ciphertexts. Crypto-based solutions currently suffer from limited operation support, high computational complexity, weak generality, and poor verifiability. An alternative method that utilizes hardware-assisted Trusted Execution Environment (TEE), i.e., Intel SGX, has emerged offer efficiency, generality flexibility. However, SGX-based lack support multi-user query control security compromises caused by untrustworthy TEE function invocation, e.g., key revocation failure, incorrect results, sensitive information leakage. In this article, we leverage SGX propose secure efficient SQL-style framework named QShield. Notably, novel lightweight secret sharing scheme in QShield enable control; it effectively circumvents avoids cumbersome remote attestation authentication. We further embed trust-proof mechanism into guarantee trustworthiness of invocation; ensures correctness results alleviates side-channel attacks. Through formal analysis, proof-of-concept implementation performance evaluation, show can securely outsourced with efficiency scalable support.
منابع مشابه
A Method for Protecting Access Pattern in Outsourced Data
Protecting the information access pattern, which means preventing the disclosure of data and structural details of databases, is very important in working with data, especially in the cases of outsourced databases and databases with Internet access. The protection of the information access pattern indicates that mere data confidentiality is not sufficient and the privacy of queries and accesses...
متن کاملProtecting Location Privacy for Outsourced Spatial Data in Cloud Storage
As cloud computing services and location-aware devices are fully developed, a large amount of spatial data needs to be outsourced to the cloud storage provider, so the research on privacy protection for outsourced spatial data gets increasing attention from academia and industry. As a kind of spatial transformation method, Hilbert curve is widely used to protect the location privacy for spatial...
متن کاملOver-encryption: Management of Access Control Evolution on Outsourced Data
Data outsourcing is emerging today as a successful paradigm allowing users and organizations to exploit external services for the distribution of resources. A crucial problem to be addressed in this context concerns the enforcement of selective authorization policies and the support of policy updates in dynamic scenarios. In this paper, we present a novel solution to the enforcement of access c...
متن کاملA Survey of Attribute-based Access Control with User Revocation in Cloud Data Storage
Cloud storage service is one of cloud services where cloud service provider can provide storage space to customers. Because cloud storage service has many advantages which include convenience, high computation and capacity, it attracts the user to outsource data in the cloud. However, the user outsources data directly in cloud storage service that is unsafe when outsourcing data is sensitive fo...
متن کاملSecure Multi Authority Cloud Storage Based on CP- ABE and Data Access Control
now a days, plenty of users area unit storing their data’s in cloud, as a result of it provides storage flexibility. However the most drawbacks in cloud are information security. Cipher text-Policy Attribute-based cryptography (CP-ABE) is thought to be one among the foremost appropriate technologies for information access management in cloud storage; as a result of it offers information house o...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Transactions on Parallel and Distributed Systems
سال: 2021
ISSN: ['1045-9219', '1558-2183', '2161-9883']
DOI: https://doi.org/10.1109/tpds.2020.3024880