The Center for Education and Research in Information Assurance and Security (CERIAS)

The Center for Education and Research in
Information Assurance and Security (CERIAS)

Provable Bounds for Portable and Flexible Privacy-Preserving Access Rights

Download

Download PDF Document
PDF

Author

Marina Blanton and Mikhail Atallah

Tech report number

CERIAS TR 2005-36

Entry type

inproceedings

Abstract

In this work we address the problem of portable and flexible privacy-preserving access rights for large online data repositories. Privacy-preserving access control means that the service provider can neither learn what access rights a customer has nor link a request to access an item to a particular customer, thus maintaining privacy of both customer activity and customer access rights. Flexible access rights allow any customer to choose any subset of items from the repository and correspondingly be charged only for the items selected. And portability of access rights means that the rights themselves can be stored on small devices of limited storage space and computational capabilities, and therefore the rights must be enforced using the limited resources available. Our main results are solutions to the problem that utilize minimal perfect hash functions and order-preserving minimal perfect hash functions. None of them use expensive cryptography, all require very little space, and they are therefore suitable for computationally weak and space-limited devices such as smartcards, sensors, etc. Performance of the schemes is measured as the probability of false positives (i.e., the probability that access to an unpurchased item will be permitted) for a given storage space bound. Using our techniques, for a data repository of size n and subscription order of m << n items, we achieve a probability of false positives of m^-c using only O(cm) bits of storage space, where c is an adjustable parameter (a constant or otherwise) that can be set to provide the desired performance. This is the first time that such provable bounds are established for this problem, and we believe the techniques we use are of more general interest through the unusual use we make of perfect hashing.

Download

PDF

Date

2005 – 06

Address

New York, NY, USA

Booktitle

ACM Symposium on Access Control Models and Technologies (SACMAT'05)

Key alpha

blanton

Pages

95--101

Publisher

ACM Press

Affiliation

Purdue University

Publication Date

2005-06-01

Isbn

1-59593-045-0

Keywords

algorithm analysis, compact policy representation, minimal perfect hash functions, order-preserving minimal perfect hash functions, portable access rights

BibTex-formatted data

To refer to this entry, you may select and copy the text below and paste it into your BibTex document. Note that the text may not contain all macros that BibTex supports.