Privacy - Preserving Data Dissemination in Untrusted Cloud

被引:7
|
作者
Ulybyshev, Denis [1 ]
Bhargava, Bharat [1 ]
Villarreal-Vasquez, Miguel [1 ]
Alsalem, Aala Oqab [1 ]
Steiner, Donald [2 ]
Li, Leon [2 ]
Kobes, Jason [2 ]
Halpin, Harry [3 ]
Ranchal, Rohit [4 ]
机构
[1] Purdue Univ, Comp Sci Dept, CERIAS, W Lafayette, IN 47907 USA
[2] Northrop Grumman, Mclean, VA USA
[3] MIT, W3C, Boston, MA USA
[4] IBM Watson Hlth Cloud, Cambridge, MA USA
关键词
privacy; trust management; data dissemination; access control; SOA; database privacy; cloud computing;
D O I
10.1109/CLOUD.2017.111
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
B2B (business-to-business) systems often use service-oriented architecture (SOA) with decomposed business services. These services can interact and share data among each other. Service might use a cloud - hosted database, such as a non relational encrypted key - value store. However, the cloud platform hosting the database can be untrusted. Data owner needs to be sure that each service can access only those segments of a shared database for which the service is authorized. Furthermore, data requests can come from a service also hosted by untrusted cloud. Hence, there is a need for designing a cloud enterprise framework that can ensure privacy-preserving data dissemination in SOA and accurately detect data leakages. We design and prototype a solution that ensures privacy - preserving dissemination of data. The solution is based on (a) role-based access control, (b) cryptographic capabilities of client's browser, (c) authentication method, (d) subject's trust level. The prototype enables privacy - preserving dissemination of Electronic Health Records (EHRs) hosted in an untrusted cloud.
引用
收藏
页码:770 / 773
页数:4
相关论文
共 50 条
  • [21] Privacy-Preserving Data Sharing in Cloud Computing
    Hui Wang
    Journal of Computer Science and Technology, 2010, 25 : 401 - 414
  • [22] Privacy-Preserving Access to Big Data in the Cloud
    Li, Peng
    Guo, Song
    Miyazaki, Toshiaki
    Xie, Miao
    Hu, Jiankun
    Zhuang, Weihua
    IEEE CLOUD COMPUTING, 2016, 3 (05): : 34 - 42
  • [23] Preserving Privacy in Public Auditing for Shared Cloud Data
    Anjali, R. S.
    Ravikumar, Aswathy
    2016 INTERNATIONAL CONFERENCE ON INVENTIVE COMPUTATION TECHNOLOGIES (ICICT), VOL 2, 2016, : 11 - 16
  • [24] Cloud Data Security Access with Privacy-Preserving
    Wang, Jingyu
    Gu, Ruichun
    2014 5TH IEEE INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING AND SERVICE SCIENCE (ICSESS), 2014, : 268 - 271
  • [25] Privacy Preserving Data Storage Technique in Cloud Computing
    Kartheeban, K.
    Murugan, A. Durai
    2017 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENT TECHNIQUES IN CONTROL, OPTIMIZATION AND SIGNAL PROCESSING (INCOS), 2017,
  • [26] Privacy-Preserving Social Network for An Untrusted Server
    Do, Hoang-Giang
    Ng, Wee-Keong
    Ma, Zhendong
    2013 IEEE THIRD INTERNATIONAL CONFERENCE ON CLOUD AND GREEN COMPUTING (CGC 2013), 2013, : 472 - 478
  • [27] Verifiable and Privacy Preserving Electronic Voting with Untrusted Machines
    Murshed, Manzur
    Sabrina, Tishna
    Iqbal, Anindya
    Ali, Mortuza
    2013 12TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2013), 2013, : 798 - 804
  • [28] Privacy-Preserving Crowd-Sourced Statistical Data Publishing with An Untrusted Server
    Wang, Zhibo
    Pang, Xiaoyi
    Chen, Yahong
    Shao, Huajie
    Wang, Qian
    Wu, Libing
    Chen, Honglong
    Qi, Hairong
    IEEE TRANSACTIONS ON MOBILE COMPUTING, 2019, 18 (06) : 1356 - 1367
  • [29] Privacy-preserving composite modular exponentiation outsourcing with optimal checkability in single untrusted cloud server
    Fu, Anmin
    Li, Shuai
    Yu, Shui
    Zhang, Yuqing
    Sun, Yinxia
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2018, 118 : 102 - 112
  • [30] Privacy preserving service selection using fully homomorphic encryption scheme on untrusted cloud service platform
    Rahman, Mohammad Saidur
    Khalil, Ibrahim
    Alabdulatif, Abdulatif
    Yi, Xun
    KNOWLEDGE-BASED SYSTEMS, 2019, 180 : 104 - 115