An encrypted database with enforced access control and blockchain validation

Zhimei Sui*, Shangqi Lai, Cong Zuo, Xingliang Yuan, Joseph K. Liu, Haifeng Qian

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

5 Citations (Scopus)

Abstract

Data privacy and integrity is top of mind for modern data applications. To tackle with the above issue, we propose an encrypted database system with access control capabilities and blockchain validation in this paper. Compared to the existing encrypted database system, our design proposes a proxy-free architecture, which avoids the need for a trusted proxy for access control. In order to protect the integrity of user data, our system leverages the blockchain technology to realize a tampering protection mechanism. The mechanism ensures that modification logging is compulsory and public-available but hardened. Users can validate and easily detect the tampered data. Finally, we implement a prototype system and conduct evaluations on each component of the proposed system.

Original languageEnglish
Title of host publicationInformation Security and Cryptology - 14th International Conference, Inscrypt 2018, Revised Selected Papers
EditorsMoti Yung, Xinyi Huang, Fuchun Guo
PublisherSpringer Verlag
Pages260-273
Number of pages14
ISBN (Print)9783030142339
DOIs
Publication statusPublished - 2019
Externally publishedYes
Event14th International Conference on Information Security and Cryptology, Inscrypt 2018 - Fuzhou, China
Duration: 14 Dec 201817 Dec 2018

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume11449 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference14th International Conference on Information Security and Cryptology, Inscrypt 2018
Country/TerritoryChina
CityFuzhou
Period14/12/1817/12/18

Keywords

  • Access control
  • Blockchain
  • Data privacy
  • Encrypted database

Fingerprint

Dive into the research topics of 'An encrypted database with enforced access control and blockchain validation'. Together they form a unique fingerprint.

Cite this