DOI QR코드

DOI QR Code

자원제약적인 모바일 단말기에서 효율적인 질의처리를 위한 접근제어

Access Control for Efficient Query Processing on Limited Resource Mobile Terminal

  • 안동찬 (신안산대학교 멀티미디어컨텐츠과)
  • An, Dong-Chan (Dept. of Multimedia Contents, Shin Ansan University)
  • 투고 : 2011.04.12
  • 심사 : 2011.05.11
  • 발행 : 2011.08.31

초록

과거 접근제어에 대한 연구는 효율적인 측면보다 안전성에 더 많은 초점이 맞추어져 있었다. 본 연구는 배터리나 메모리 등의 자원이 제약적인 개인 휴대용 단말기와 같은 환경에서 XML 데이터 스트림의 효율적이고 안전한 질의처리에 대한 방법을 제안한다. 특히, 본 연구는 접근제어 처리과정에서 발생할 수 있는 추가적인 오버헤드를 각 질의처리 단계별로 찾아내고 최소화하여, 자원의 사용을 최적화하며 안전한 결과를 얻기 위한 최소한의 오버헤드를 갖는 접근제어 처리 방법을 제안한다. 끝으로, 실험을 통해 본 연구에서의 제안방법에 대한 우수성 분석을 하였다.

Access control that has been previously performed mainly on safety, and thus not much effort has been done to consider access control in terms of efficiency. This paper proposes a method for an efficient and secure query processing of XML data streams, such as a personal digital assistant and a portable terminal, at the client side with limited resources. Specifically, this paper proposes an access control processing that possesses a small overhead for attaining a secure result with limited memory and a method to enhance the performance, finding the parts capable of optimizing each processing step for offsetting the overhead caused by the addition of access control processing. The superiority of the new method is analyzed through an experiments.

키워드

참고문헌

  1. T. Bray, J. Paoli, C. M. Sperberg-McQueen, E. Mal er, F. Yergeau eXtensible Markup Language (XML) 1.0, World Wide Web Consortium (W3C), 2004.
  2. A. Berglund, S. Boag, D. Chamberlin, M. F. Fernandez, M. Kay, J. Robie, and J. Simeon XPath 2.0, World Wide Web Consortium (W3C), 2007.
  3. W. Lindner and J. Meier "Towards a Secure Data Str eam Management System," VLDB Workshop TEAA 2005.
  4. E. Damiani, S. Vimercati, S. Paraboachk and P. Sam arati, "Design and Implementation of Access Control Processor for XML Documents", Computer Network, pp. 59-75, 2000.
  5. E. Damiani, S. Vimercati, S. Paraboachk and P. Sa marati, "A Fine-grained Access Control System for XML Documents", ACM Trans Information and System Sec., Vol5, No2, pp. 169-202, May 2002. https://doi.org/10.1145/505586.505590
  6. E. Bertino, S. Castano, E. Ferrari, and M. Mesiti, "Specifying and Enforcing Access Control Policies for XML Document Sources", WWW Journal, Vol3, No3, pp. 139-151, 2000.
  7. E. Bertino, S. Castano, and E. Ferrai "Securing XML documents with Author-x", IEEE Internet Computing, May June, pp. 21-31, 2001.
  8. J. Cai, C. K. Poon, "OrdPathX: Supporting Two Dim ensions of Node Insertion in XML Data", in proceeding of DEXA, pp. 332-339, 2009.
  9. W. Liang, A. Takahashi, H. Yokota, "A Low-Storag e-Consumption XML Labeling Method for Efficient Structural Information Extraction", in proceeding of DEXA, pp. 7-22, 2009.
  10. M. Murata, A. Tozawa, and M. Kudo, "XML Access Control Using Static Analysis", in proceedings of ACM Conference on Computer and Communications Security, pp. 73-84, 2003.
  11. B. Luo, D. W. Lee, W. C. Lee, and P. Liu, "Qfilter: Fine-grained Run-Time XML Access Control via NFA-based Query Rewriting," CIKM'04, pp. 543-552, 2004.
  12. L. Bouganim, F. D. Ngoc, and P. Pucheral, "Client-based access control management for XML documents," VLDB, pp. 84-95, 2004.
  13. F. Rabitti, E. Bertino, W. Kim and D. Woelk, "A Mo del of Authorization for Next-Generation Database Systems", ACM Transaction on Database Systems, 126(1), pp. 88-131, March 1991.
  14. E. Damiani, M. Fansi, A. Gabillon, S. Marrara, "A general approach to securely querying XML", Computer Standards & Interfaces 30(6), pp. 379-389, 2008. https://doi.org/10.1016/j.csi.2008.03.006