Skip to main content

Defending against Attribute-Correlation Attacks in Privacy-Aware Information Brokering

  • Conference paper
Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2008)

Abstract

Nowadays, increasing needs for information sharing arise due to extensive collaborations among organizations. Organizations desire to provide data access to their collaborators while preserving full control over the data and comprehensive privacy of their users. A number of information systems have been developed to provide efficient and secure information sharing. However, most of the solutions proposed so far are built atop of conventional data warehousing or distributed database technologies.

Recently, information brokering systems have been proposed to provide privacy-preserving information sharing among loosely federated data sources. However, they are still vulnerable to attribute-correlation attacks during query routing, due to the lack of protection of the routed queries. In this paper, we investigate the problems caused by such an attack, and propose a countermeasure by limiting the view of query content at each intermediate broker. We show that the proposed content-based XPath query routing scheme with level-based encryption and commutative encryption can effectively prevent an attribute-correlation attack originated by compromised brokers, with reasonable overhead.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Abdalla, M., Kiltz, E., Neven, G.: Generalized key delegation for hierarchical identity-based encryption. In: Biskup, J., López, J. (eds.) ESORICS 2007. LNCS, vol. 4734, pp. 139–154. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  2. Agrawal, R., Evfimievski, A., Srikant, R.: Information sharing across private databases. In: SIGMOD 2003: Proceedings of the 2003 ACM SIGMOD international conference on Management of data, pp. 86–97. ACM, New York (2003)

    Google Scholar 

  3. Altinel, M., Franklin, M.J.: Efficient filtering of XML documents for selective dissemination of information. The VLDB Journal, 53–64 (2000)

    Google Scholar 

  4. Berglund, A., Boag, S., Chamberlin, D., Fernndez, M.F., Kay, M., Robie, J., Simon, J.: XML path language (XPath) version 2.0 (2003), http://www.w3.org/TR/xpath20/

  5. Calvanese, D., Giacomo, G.D., Lenzerini, M., Nardi, D., Rosati, R.: Source integration in data warehousing. In: DEXA Workshop, pp. 192–197 (1998)

    Google Scholar 

  6. Chan, C.-Y., Felber, P., Garofalakis, M., Rastogi, R.: Efficient filtering of XML documents with XPath expressions. In: ICDE, San Jose, pp. 235–244 (2002)

    Google Scholar 

  7. Clifton, C., Kantarcioglu, M., Vaidya, J., Lin, X., Zhu, M.: Tools for privacy preserving distributed data mining. ACM SIGKDD Explorations 4(2) (2003)

    Google Scholar 

  8. De Capitani di Vimercati, S., Samarati, P.: Authorization specification and enforcement in federated database systems. Journal of Computer Security 5(2), 155–188 (1997)

    Article  Google Scholar 

  9. Fiat, A., Naor, M.: Broadcast encryption. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol. 773, pp. 480–491. Springer, Heidelberg (1994)

    Chapter  Google Scholar 

  10. Hammer, J., Garcia-Molina, H., Widom, J., Labio, W., Zhuge, Y.: The stanford data warehousing project. IEEE Data Engineering Bulletin 18(2), 41–48 (1995)

    Google Scholar 

  11. Koloniari, G., Pitoura, E.: Content-based routing of path queries in peer-to-peer systems. In: Bertino, E., Christodoulakis, S., Plexousakis, D., Christophides, V., Koubarakis, M., Böhm, K., Ferrari, E. (eds.) EDBT 2004. LNCS, vol. 2992, pp. 29–47. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  12. Koudas, N., Rabinovich, M., Srivastava, D., Yu, T.: Routing XML queries. In: Proceedings of 20th International Conference on Data Engineering, p. 844 (2004)

    Google Scholar 

  13. Li, F., Luo, B., Liu, P., Lee, D., Chu, C.-H.: Automaton segmentation: A new approach to preserve privacy in XML information brokering. In: ACM CCS 2007, pp. 508–518 (2007)

    Google Scholar 

  14. Lu, H.Y.S.: Commutative cipher based en-route filtering in wireless sensor networks. In: Vehicular Technology Conference, vol. 2, pp. 1223–1227 (September 2004)

    Google Scholar 

  15. Snoeren, A.C., Conley, K., Gifford, D.K.: Mesh-based content routing using XML. In: Symposium on Operating Systems Principles, pp. 160–173 (2001)

    Google Scholar 

  16. Wiederhold, G.: Mediators in the architecture of future information systems. Computer 25(3), 38–49 (1992)

    Article  Google Scholar 

  17. Wiederhold, G.: Value-added mediation in large-scale information systems. In: DS-6: Proceedings of the Sixth IFIP TC-2 Working Conference on Data Semantics, London, UK, pp. 34–56 (1995)

    Google Scholar 

  18. Yan, T.W., Garcia-Molina, H.: The SIFT information dissemination system. ACM TODS 24(4), 529–565 (1999)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering

About this paper

Cite this paper

Li, F., Luo, B., Liu, P., Squicciarini, A.C., Lee, D., Chu, CH. (2009). Defending against Attribute-Correlation Attacks in Privacy-Aware Information Brokering. In: Bertino, E., Joshi, J.B.D. (eds) Collaborative Computing: Networking, Applications and Worksharing. CollaborateCom 2008. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 10. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-03354-4_9

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-03354-4_9

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-03353-7

  • Online ISBN: 978-3-642-03354-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics