Support for write privileges on outsourced data

10Citations
Citations of this article
9Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

In the last years, data outsourcing has received an increasing attention by the research community thanks to the benefits that it brings in terms of data management. A basic requirement in such a scenario is that outsourced data be made accessible only to authorized users, that is, no unauthorized party (including the storing server) should have access to the data. While existing proposals provide a sound basis for addressing such a need with respect to data dissemination (i.e., enforcement of read authorizations), they fall short on the support of write authorizations. In this paper we address such an open problem and present an approach to enforce write privileges over outsourced data. Our work nicely extends and complements existing solutions, and exploiting key derivation tokens, hashing, and HMAC functions provides efficient and effective controls. © 2012 IFIP International Federation for Information Processing.

Cite

CITATION STYLE

APA

De Capitani Di Vimercati, S., Foresti, S., Jajodia, S., Paraboschi, S., & Samarati, P. (2012). Support for write privileges on outsourced data. In IFIP Advances in Information and Communication Technology (Vol. 376 AICT, pp. 199–210). Springer New York LLC. https://doi.org/10.1007/978-3-642-30436-1_17

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free