The Community for Technology Leaders
Green Image
Issue No. 02 - April-June (2010 vol. 7)
ISSN: 1545-5971
pp: 189-202
Yanjiang Yang , Institute for Infocomm Research, Singapore
Yingjiu Li , Singapore Management University, Singapore
Robert H. Deng , Singapore Management University, Singapore
Feng Bao , Institute for Infocomm Rsearch, Singapore
Inference has been a longstanding issue in database security, and inference control, aiming to curb inference, provides an extra line of defense to the confidentiality of databases by complementing access control. However, in traditional inference control architecture, database server is a crucial bottleneck, as it enforces highly computation-intensive auditing for all users who query the protected database. As a result, most auditing methods, though rigorously studied, are not practical for protecting large-scale real-world database systems. In this paper, we shift this paradigm by proposing a new inference control architecture, entrusting inference control to each user's platform that is equipped with trusted computing technology. The trusted computing technology is designed to attest the state of a user's platform to the database server, so as to assure the server that inference control could be enforced as prescribed. A generic protocol is proposed to formalize the interactions between the user's platform and database server. The authentication property of the protocol is formally proven. Since inference control is enforced in a distributed manner, our solution avoids the bottleneck in the traditional architecture, thus can potentially support a large number of users making queries.
Inference control, trusted computing, database, auditing, security protocol.

Y. Yang, Y. Li, F. Bao and R. H. Deng, "Shifting Inference Control to User Side: Architecture and Protocol," in IEEE Transactions on Dependable and Secure Computing, vol. 7, no. , pp. 189-202, 2008.
85 ms
(Ver 3.3 (11022016))