%0 Conference Proceedings %T Support for Write Privileges on Outsourced Data %+ Dipartimento di Informatica %+ Center for Secure Information Systems [Fairfax] %+ Ingegneria dell'Informazione e Metodi Matematici (DIMM) %A Capitani Di Vimercati, Sabrina, De %A Foresti, Sara %A Jajodia, Sushil %A Paraboschi, Stefano %A Samarati, Pierangela %Z Part 5: Database Security %< avec comité de lecture %( IFIP Advances in Information and Communication Technology %B 27th Information Security and Privacy Conference (SEC) %C Heraklion, Crete, Greece %Y Dimitris Gritzalis %Y Steven Furnell %Y Marianthi Theoharidou %I Springer %3 Information Security and Privacy Research %V AICT-376 %P 199-210 %8 2012-06-12 %D 2012 %R 10.1007/978-3-642-30436-1_17 %K Data outsourcing %K data protection %K authorization management %Z Computer Science [cs]Conference papers %X In the last years, data outsourcing has received an increasing attention by the research community thanks to the benefits that it brings in terms of data management. A basic requirement in such a scenario is that outsourced data be made accessible only to authorized users, that is, no unauthorized party (including the storing server) should have access to the data. While existing proposals provide a sound basis for addressing such a need with respect to data dissemination (i.e., enforcement of read authorizations), they fall short on the support of write authorizations.In this paper we address such an open problem and present an approach to enforce write privileges over outsourced data. Our work nicely extends and complements existing solutions, and exploiting key derivation tokens, hashing, and HMAC functions provides efficient and effective controls. %G English %2 https://inria.hal.science/hal-01518257/document %2 https://inria.hal.science/hal-01518257/file/978-3-642-30436-1_17_Chapter.pdf %L hal-01518257 %U https://inria.hal.science/hal-01518257 %~ IFIP %~ IFIP-AICT %~ IFIP-TC %~ IFIP-TC11 %~ IFIP-SEC %~ IFIP-AICT-376