Enabling Secure Data Exchange

نویسندگان

  • Gerome Miklau
  • Dan Suciu
چکیده

The emergence of diverse networked data sources has created new opportunities for the sharing and exchange of data. In support of this, a fruitful line of research has resulted in distributed data processing and integration systems [19, 17, 29, 30, 3]. However in practice, fear of unauthorized disclosure or malicious tampering requires that data stay safely behind firewalls or remain protected by secure servers. Our goal is to overcome these limitations and enable secure data exchange and sharing in distributed integration scenarios. Such scenarios are characterized by many interacting data sources and many data consumers. Primary sources create and publish data; intermediate sources combine, extract, and modify the data for further dissemination; data consumers query it. This paper describes issues in secure data exchange, and illustrates some solutions proposed in the authors’ own work. The basic requirements of secure data exchange are confidentiality and integrity. Confidentiality means that unauthorized parties are prevented from reading data. In data exchange, confidentiality is provided through encryption and managing keys that allow access. Confidentiality benefits data sources who need to protect data. Integrity (in its basic form) means that unauthorized parties are prevented from modifying data. In data exchange, integrity is provided through digital signatures and data certification techniques. Integrity benefits both data sources (who need to make sure data attributed to them is not modified) and data consumers (who need guarantees that the data they use has not been tampered with). Confidentiality and integrity are distinct goals and the tools for each are different. In particular, techniques for providing confidentiality do not by themselves provide integrity. Participants can guarantee both properties by combining techniques. We describe the basic features of our envisioned framework for secure data exchange below:

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Enabling Secure Interoperability Among Federated National Entities: It's a Matter of Trust

This paper discusses issues relevant to accomplishing secure data sharing among federated national entities. This is an important, timely problem particularly in the defense sector since multi-national operations have become the norm. Similarly, the commercial marketplace today is a global one, requiring the exchange of information in support of transactions on an international scale. Tradition...

متن کامل

Finite-State Security Analysis of OTR Version 2

Off-the-Record messaging is a protocol for enabling secure, authenticated, deniable messaging with perfect forward secrecy, specifically over instant messaging networks. In this paper we describe the results of a finite-state security analysis of the OTR protocol. In addition to finding several security issues in the process of modeling the protocol, our model has discovered security problems i...

متن کامل

SEKEBAN (Secure and Efficient Key Exchange for wireless Body Area Network)

Recent technological advances in sensors, low-power microelectronics and miniaturization, and wireless networking enabled the design and proliferation of wireless sensor networks capable of autonomously monitoring and controlling environments. One of the most promising applications of sensor networks is for human health monitoring. A number of tiny wireless sensors, strategically placed on the ...

متن کامل

Secure Data Exchange: A Marketplace in the Cloud

A vast amount of data belonging to companies and individuals is currently stored in the cloud in encrypted form by trustworthy service providers such as Microsoft, Amazon, and Google. Unfortunately, the only way for the cloud to use the data in computations is to first decrypt it, then compute on it, and finally re-encrypt it, resulting in a problematic trade-off between value/utility and secur...

متن کامل

Efficient and Provably Secure Client-to-Client Password-Based Key Exchange Protocol

We study client-to-client password-authenticated key exchange (C2C-PAKE) enabling two clients in different realms to agree on a common session key using different passwords. Byun et al. first presented C2C-PAKE schemes under the cross-realm setting. However, the schemes were not formally treated, and subsequently found to be flawed. In addition, in the schemes, there are still rooms for improve...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • IEEE Data Eng. Bull.

دوره 27  شماره 

صفحات  -

تاریخ انتشار 2004