Authentic Third-party Data Publication
نویسندگان
چکیده
Integrity critical databases, such as financial information, which are used in high-value decisions, are frequently published over the internet. Publishers of such data must satisfy the integrity, authenticity, and non-repudiation requirements of end clients. Providing this protection over public data networks is an expensive proposition. This is, in part, due to the difficulty of building and running secure systems. In practice, large systems can not be verified to be secure and are frequently penetrated. The negative consequences of a system intrusion at the publisher can be severe. The problem is further complicated by data and server replication to satisfy availability and scalability requirements. To our knowledge this work is the first of its kind to give general approaches for reduce the trust required of the publisher of large, infrequently updated databases. To do this, we separate the roles of owner and publisher. With a few digital signatures on the part of the owner and no trust required of the publisher, we give techniques based on Merkle hash trees, that publishers can use to provide authenticity and non-repudiation of the answer to a database query. This is done without requiring a key to be held in an on-line system, thereby reducing the impact due to the likely system penetration. By reducing the trust required of the publisher, our solution is a step towards the publication of large databases in a scalable manner.
منابع مشابه
Certifying Data from Multiple Sources
Data integrity can be problematic when integrating and organizing information from many sources. In this paper we describe efficient mechanisms that enable a group of data owners to contribute data sets to an untrusted third-party publisher, who then answers users’ queries. Each owner gets a proof from the publisher that his data is properly represented, and each user gets a proof that the answ...
متن کاملTesting for Asymmetric Information in Automobile Insurance Market an Iranian Insurance Company
The presence of asymmetric information is an important source of efficiency loss for insurance companies and could reduce profitability. In this paper, we test the conditional independence of coverage choice and risk, where “conditional” means conditional on all variables observed by the insurer. We use two parametric methods: a pair of probits and a bivariate probit model. The data includes al...
متن کاملA General Model for Authentic Data Publication
Query answers from on-line databases can easily be corrupted by hackers or malicious database publishers. Thus it is important to provide mechanisms which allow clients to trust the results from on-line queries. Authentic publication is a novel scheme which allows untrusted publishers to securely answer queries from clients on behalf of trusted o -line data owners. Publishers validate answers u...
متن کاملD2Pt: Privacy-Aware Multiparty Data Publication
Today, publication of medical data faces high legal barriers. On the one hand, publishing medical data is important for medical research. On the other hand, it is neccessary to protect peoples’ privacy by ensuring that the relationship between individuals and their related medical data remains unknown to third parties. Various data anonymization techniques remove as little identifying informati...
متن کاملAn artificial intelligence model based on LS-SVM for third-party logistics provider selection
The use of third-party logistics (3PL) providers is regarded as new strategy in logistics management. The relationships by considering 3PL are sometimes more complicated than any classical logistics supplier relationships. These relationships have taken into account as a well-known way to highlight organizations' flexibilities to regard rapidly uncertain market conditions, follow core competenc...
متن کاملEfficient and Private Three-Party Publish/Subscribe
We consider the problem of modeling and designing publish/subscribe protocols that safeguard the privacy of clients’ subscriptions and of servers’ publications while guaranteeing efficient latency in challenging scenarios (i.e., realtime publication, high data arrival rate, etc.). As general solutions from the theory of secure function evaluation protocols would not achieve satisfactory perform...
متن کامل