[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
Skip to main content

A Mutual and Pseudo Inverse Matrix – Based Authentication Mechanism for Outsourcing Service

  • Conference paper
Intelligent Information and Database Systems (ACIIDS 2011)

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 6591))

Included in the following conference series:

Abstract

Database outsourcing is becoming popular in which the data owners ship their data to external service provider. Such a model provides organizations advantages such as cost savings and service benefits. However, the delegation of database management to service provider, which is not fully trusted, introduces many significant security and privacy issues. They can be referred to as authentication, data confidentiality and integrity, data privacy, secure auditing. Among them, authentication takes an important role and is the first defence to prevent an unauthorized user from accessing to the outsourced data. In this paper, we first propose a novel public key encryption scheme with keyword search based on pseudo inverse matrix, named PEKS-PM. We prove that PEKS-PM is secure and more efficient than the public key encryption scheme with keyword search based on the Decisional Diffie-Hellman (DDH) which is the best searchable encryption scheme known to date. Based on PEKS-PM, we propose a mutual authentication mechanism which can be used to authenticate the user and the server mutually to establish an intended connection but the server learns nothing about the user’s login information. Our proposed authentication mechanism can prevent man-in-the-middle, session high-jacking and replay attacks.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
£29.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
GBP 19.95
Price includes VAT (United Kingdom)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
GBP 35.99
Price includes VAT (United Kingdom)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
GBP 44.99
Price includes VAT (United Kingdom)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Georg, G., Ray, I., France, R.: Using aspects to design a secure system. In: Proc. of 8th Int. Conf. on Engineering of Complex Computer Systems, pp. 117–126 (2002); ISSN 1054-4729

    Google Scholar 

  2. Golle, P., Staddon, J., Waters, B.: Secure Conjunctive Keyword Search over Encrypted Data. In: Jakobsson, M., Yung, M., Zhou, J. (eds.) ACNS 2004. LNCS, vol. 3089, pp. 31–45. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  3. Boneh, D., Crescenzo, G.D., Ostrovsky, R., Persiano, G.: Public-key encryption with keyword search. In: Cachin, C. (ed.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 506–522. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  4. Moore, E.H.: On the reciprocal of the general algebraic matrix. Bulletin of the American Mathematical Society 26, 394–395 (1920)

    Google Scholar 

  5. Penrose, R.: A generalized inverse for matrices. Proc. of the Cambridge Philosophical Society 51, 406–413 (1955)

    Article  MATH  Google Scholar 

  6. Goul, G.H., Charles, F.V.L.: Matrix computations, 3rd edn., pp. 257–258. Johns Hopkins, Baltimore (1996)

    Google Scholar 

  7. Ben-Israel, A., Thomas, N.E.G.: Generalized Inverses. Springer, Heidelberg (2003)

    MATH  Google Scholar 

  8. Menezes, A.J., Oorschot, P.C.V., Vanstone, S.A.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1997)

    MATH  Google Scholar 

  9. Hacigümüs, H., Iyer, B.R., Li, C., Mehrotra, S.: Executing SQL over encrypted data in the database-service-provider model. In: SIGMOD, pp. 216–227 (2002)

    Google Scholar 

  10. Damiani, E., De Capitani di Vimercati, S., Foresti, S., Jajodia, S., Paraboschi, S., Samarati, P.: Key Management for Multi-User Encrypted Databases. In: Proc. of the 2005 ACM Workshop on Storage Security and Survivability, pp. 74–83 (2005)

    Google Scholar 

  11. De Capitani di Vimercati, S., Foresti, S., Jajodia, S., Paraboschi, S., Samarati, P.: Over-encryption: Management of Access Control Evolution on Outsourced Data. In: VLDB, pp. 123–134 (2007)

    Google Scholar 

  12. El-khoury, V., Bennani, N., Ouksel, A.M.: Distributed Key Management in Dynamic Outsourced Databases: a Trie-based Approach. In: First Int. Conf. on Advances in Databases, Knowledge and Data Applications, pp. 56–61 (2009)

    Google Scholar 

  13. Sandhu, R.S.: Cryptographic implementation of a Tree Hierarchy for access control, pp. 95–98. Elsevier, Amsterdam (1988)

    Google Scholar 

  14. Zych, A., Petkovic, M., Jonker, W.: Efficient key management for cryptographically enforced access control, pp. 410–417. Elsevier Science, Amsterdam (2008)

    Google Scholar 

  15. Asonov, D.: Private information retrieval: An overview and current trends. In: ECDPvA Workshop, pp. 889–894 (2001)

    Google Scholar 

  16. Chor, B., Goldreich, O., Kushilevitz, E., Sudan, M.: Private information retrieval. In: FOCS, pp. 41–50 (1995)

    Google Scholar 

  17. Lin, P., Candan, K.S.: Hiding traversal of tree structured data from untrusted data stores. In: Proc. of the 2nd Int. Workshop on Security in Information Systems, Portugal, pp. 314–323 (2004)

    Google Scholar 

  18. Song, D.X., Wagner, D., Perrig, A.: Practical techniques for searches on encrypted data. In: IEEE Symposium on Security and Privacy, pp. 44–55 (2000)

    Google Scholar 

  19. Waters, B.R., Balfanz, D., Durfee, G., Smetters, D.K.: Building an encrypted and searchable audit log. In: 11th Annual Network and Distributed System Security Symposium (2004)

    Google Scholar 

  20. Chang, Y.C., Mitzenmacher, M.: Privacy preserving keyword searches on remote encrypted data, Cryptology ePrint Archive, Report 2004/051 (2004), http://eprint.iacr.org/2004/051/

  21. Thuc, D.N., Hue, T.B.P., Van, H.D.: An Efficient Pseudo Inverse Matrix-Based Solution for Secure Auditing. IEEE-RIVF, 7–12 (2010); ISBN: 978-1-4244-8072-2

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Pham, H.T.B., Nguyen, T.D., Dang, V.H., Echizen, I., Dong, T.T.B. (2011). A Mutual and Pseudo Inverse Matrix – Based Authentication Mechanism for Outsourcing Service. In: Nguyen, N.T., Kim, CG., Janiak, A. (eds) Intelligent Information and Database Systems. ACIIDS 2011. Lecture Notes in Computer Science(), vol 6591. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-20039-7_12

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-20039-7_12

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-20038-0

  • Online ISBN: 978-3-642-20039-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics