Abstract
Nowadays, increasing needs for information sharing arise due to extensive collaborations among organizations. Organizations desire to provide data access to their collaborators while preserving full control over the data and comprehensive privacy of their users. A number of information systems have been developed to provide efficient and secure information sharing. However, most of the solutions proposed so far are built atop of conventional data warehousing or distributed database technologies.
Recently, information brokering systems have been proposed to provide privacy-preserving information sharing among loosely federated data sources. However, they are still vulnerable to attribute-correlation attacks during query routing, due to the lack of protection of the routed queries. In this paper, we investigate the problems caused by such an attack, and propose a countermeasure by limiting the view of query content at each intermediate broker. We show that the proposed content-based XPath query routing scheme with level-based encryption and commutative encryption can effectively prevent an attribute-correlation attack originated by compromised brokers, with reasonable overhead.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Abdalla, M., Kiltz, E., Neven, G.: Generalized key delegation for hierarchical identity-based encryption. In: Biskup, J., López, J. (eds.) ESORICS 2007. LNCS, vol. 4734, pp. 139–154. Springer, Heidelberg (2007)
Agrawal, R., Evfimievski, A., Srikant, R.: Information sharing across private databases. In: SIGMOD 2003: Proceedings of the 2003 ACM SIGMOD international conference on Management of data, pp. 86–97. ACM, New York (2003)
Altinel, M., Franklin, M.J.: Efficient filtering of XML documents for selective dissemination of information. The VLDB Journal, 53–64 (2000)
Berglund, A., Boag, S., Chamberlin, D., Fernndez, M.F., Kay, M., Robie, J., Simon, J.: XML path language (XPath) version 2.0 (2003), http://www.w3.org/TR/xpath20/
Calvanese, D., Giacomo, G.D., Lenzerini, M., Nardi, D., Rosati, R.: Source integration in data warehousing. In: DEXA Workshop, pp. 192–197 (1998)
Chan, C.-Y., Felber, P., Garofalakis, M., Rastogi, R.: Efficient filtering of XML documents with XPath expressions. In: ICDE, San Jose, pp. 235–244 (2002)
Clifton, C., Kantarcioglu, M., Vaidya, J., Lin, X., Zhu, M.: Tools for privacy preserving distributed data mining. ACM SIGKDD Explorations 4(2) (2003)
De Capitani di Vimercati, S., Samarati, P.: Authorization specification and enforcement in federated database systems. Journal of Computer Security 5(2), 155–188 (1997)
Fiat, A., Naor, M.: Broadcast encryption. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol. 773, pp. 480–491. Springer, Heidelberg (1994)
Hammer, J., Garcia-Molina, H., Widom, J., Labio, W., Zhuge, Y.: The stanford data warehousing project. IEEE Data Engineering Bulletin 18(2), 41–48 (1995)
Koloniari, G., Pitoura, E.: Content-based routing of path queries in peer-to-peer systems. In: Bertino, E., Christodoulakis, S., Plexousakis, D., Christophides, V., Koubarakis, M., Böhm, K., Ferrari, E. (eds.) EDBT 2004. LNCS, vol. 2992, pp. 29–47. Springer, Heidelberg (2004)
Koudas, N., Rabinovich, M., Srivastava, D., Yu, T.: Routing XML queries. In: Proceedings of 20th International Conference on Data Engineering, p. 844 (2004)
Li, F., Luo, B., Liu, P., Lee, D., Chu, C.-H.: Automaton segmentation: A new approach to preserve privacy in XML information brokering. In: ACM CCS 2007, pp. 508–518 (2007)
Lu, H.Y.S.: Commutative cipher based en-route filtering in wireless sensor networks. In: Vehicular Technology Conference, vol. 2, pp. 1223–1227 (September 2004)
Snoeren, A.C., Conley, K., Gifford, D.K.: Mesh-based content routing using XML. In: Symposium on Operating Systems Principles, pp. 160–173 (2001)
Wiederhold, G.: Mediators in the architecture of future information systems. Computer 25(3), 38–49 (1992)
Wiederhold, G.: Value-added mediation in large-scale information systems. In: DS-6: Proceedings of the Sixth IFIP TC-2 Working Conference on Data Semantics, London, UK, pp. 34–56 (1995)
Yan, T.W., Garcia-Molina, H.: The SIFT information dissemination system. ACM TODS 24(4), 529–565 (1999)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2009 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Li, F., Luo, B., Liu, P., Squicciarini, A.C., Lee, D., Chu, CH. (2009). Defending against Attribute-Correlation Attacks in Privacy-Aware Information Brokering. In: Bertino, E., Joshi, J.B.D. (eds) Collaborative Computing: Networking, Applications and Worksharing. CollaborateCom 2008. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 10. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-03354-4_9
Download citation
DOI: https://doi.org/10.1007/978-3-642-03354-4_9
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-03353-7
Online ISBN: 978-3-642-03354-4
eBook Packages: Computer ScienceComputer Science (R0)