Browse > Article

An Efficient and Secure Query Processing on Valid XML Streams  

Byun, Chang-Woo (인하공업전문대학 컴퓨터시스템과)
An, Eun-Ju (서강대학교 컴퓨터공학과)
Park, Seog (서강대학교 컴퓨터공학과)
Abstract
As demands intending to treat an access control on a client side that was conventionally controlled at a server are surged. it needs a way to treat query processing in effective and secure manners in an environment that has limited resources. Because the access control having been previously performed was only focused on safety, there was little effort to consider the access control in terms of efficiency. Researches about security including access control are started as the security issues are cropped up in a recent stream environment. This paper proposes a method for efficient and secure query processing of XML data streams like a PDA and a portable terminal at the client that is in limited resources. Specifically, this study suggests (1) an access control processing that possesses small overhead for attaining a secure result in a limited memory and (2) a way to enhance the performance, finding the parts being capable of optimizing in each processing step for offsetting the overhead caused by an addition of the access control processing. Superiority of the new method was analyzed by experiment.
Keywords
XML; resource limited client; XML Access Control; XML Query Processing;
Citations & Related Records
연도 인용수 순위
  • Reference
1 A. Berglund, S. Boag, D. Chamberlin, M. F. Fernandez, M. Kay, J. Robie, and J. Simeon. XPath 2.0, World Wide Web Consortium (W3C), 2007, (http://www.w3.org/TH/xpath20/)
2 E. Damiani, S. Virnercati, S. Paraboachk and P. Samarati, A Fine-grained Access Control System for XML Documents. ACM Trans. Information and System Sec., Vol.5, No.2, pp. 169-202, May 2002   DOI
3 M. Murata, A. Tozawa, and M. Kudo, 'XML Access Control using Static Analysis' ACM CCS, Washington D.C., pp. 73-84, 2003   DOI
4 W. Fan, F. Geerts, X. Jia and A. Kementsietsidis, 'Rewriting Regular XPath Queries on XML views,' ICDE, pp. 666-675, 2007   DOI
5 L. Bouganim, F. D. Ngoc, and P. Pucheral, 'Clientbased access control management for XML documents,' VLDB, pp. 84-95, 2004
6 A. R. Schmidt, F. Waas, M. L. Kersten, D. Florescu, I. Manolescu, M. J. Carey, and R. Busse. The XML Benchmark Project. Technical Report INS-R0103, CWI, April 2001
7 F. Rabitti, E. Bertino, W. Kim and D. Woelk. A Model of Authorization for Next-Generation Database Systems. ACM Transaction on Database Systems, 126(1), pp. 88-131, March 1991   DOI
8 C. Byun and S. Park, 'Two Phase Filtering for XML Access Control,' VLDB Workshop on SDM'06, pp. 115-130, 2006   DOI   ScienceOn
9 T. Bray, .J. Paoli, C. M. Sperberg-McQueen, E. Maler, F. Yergeau. eXtensible Markup Language (XML) 1.0, World Wide Web Consortium (W3C), 2004
10 Jae-Myeong Jeon, Yon Dohn Chung, Myoung Ho Kim, and Yoon joon Lee, Filtering XPath expressions for XML access control. Computers & Security, pp. 591-605, 2004   DOI   ScienceOn
11 E. Bertino, S. Castano, E. Ferrari, and Mv Mesiti. Specifying and Enforcing Access Control Policies for XM.L Document Sources. WWW Journal, Vol.3, No.3, pp. 139-151, 2000   DOI
12 B. Luo, D. W. Lee, W. C. Lee, and P. Liu, 'Qfilter: Fine-grained Run-Time XML Access Control via NFA-based Query Rewriting,' CIKM'04, pp. 543-552, 2004   DOI
13 W. Fan, C. Y. Chan, and M. Garofalakis, 'SMOQE: A system for providing secure access to XML,' VLDB, pp. 1227-1230, 2006
14 E. Damiani, S. Vimercati, S. Paraboachk and P. Samarati. Design and Implementation of Access Control Processor for XML Documents. Computer Network, pp. 59-75, 2000   DOI   ScienceOn
15 E. Bertino, S. Castano, and E. Ferrai. Securing XML documents with Author-x. IEEE Internet Computing, May. June, pp. 21-31, 2001   DOI   ScienceOn
16 W. Lindner and J. Meier. 'Towards a Secure Data Stream Management System,' VLDB Workshop TEAA 2006   DOI   ScienceOn