Revealing the Unseen: How to Expose Cloud Usage While Protecting User Privacy

被引:0
|
作者
Turk, Ata [1 ]
Varia, Mayank [1 ]
Kellaris, Georgios [1 ,2 ]
机构
[1] Boston Univ, Boston, MA 02215 USA
[2] Harvard Univ, Cambridge, MA 02138 USA
基金
美国国家科学基金会;
关键词
D O I
10.1109/ICDMW.2017.143
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud users have little visibility into the performance characteristics and utilization of the physical machines underpinning the virtualized cloud resources they use. This uncertainty forces users and researchers to reverse engineer the inner workings of cloud systems in order to understand and optimize the conditions their applications operate. At Massachusetts Open Cloud (MOC), as a public cloud operator, we'd like to expose the utilization of our physical infrastructure to stop this wasteful effort. Mindful that such exposure can be used maliciously for gaining insight into other users workloads, in this position paper we argue for the need for an approach that balances openness of the cloud overall with privacy for each tenant inside of it. We believe that this approach can be instantiated via a novel combination of several security and privacy technologies. We discuss the potential benefits, implications of transparency for cloud systems and users, and technical challenges/possibilities.
引用
收藏
页码:1011 / 1016
页数:6
相关论文
共 9 条
  • [1] Protecting privacy while revealing data
    Bernardo A. Huberman
    Tad Hogg
    [J]. Nature Biotechnology, 2002, 20 : 332 - 332
  • [2] Protecting privacy while revealing data
    Huberman, BA
    Hogg, T
    [J]. NATURE BIOTECHNOLOGY, 2002, 20 (04) : 332 - 332
  • [3] Securing Bystander Privacy in Mixed Reality While Protecting the User Experience
    Corbett, Matthew
    David-John, Brendan
    Shang, Jiacheng
    Hu, Y. Charlie
    Ji, Bo
    [J]. IEEE SECURITY & PRIVACY, 2024, 22 (01) : 33 - 42
  • [4] PASSPHONE: Outsourcing Phone-Based Web Authentication While Protecting User Privacy
    Potthast, Martin
    Forler, Christian
    List, Eik
    Lucks, Stefan
    [J]. SECURE IT SYSTEMS, NORDSEC 2016, 2016, 10014 : 235 - 255
  • [5] How Far is User Privacy Leakage: A Revisit of Client Certificate Usage
    Yin, Zuyong
    Zhou, Qi
    Qu, Junqiu
    Lv, Fanrong
    [J]. 2023 8TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING AND BIG DATA ANALYTICS, ICCCBDA, 2023, : 279 - 284
  • [6] Preserving privacy while revealing thumbnail for content-based encrypted image retrieval in the cloud
    Chai, Xiuli
    Wang, Yinjing
    Gan, Zhihua
    Chen, Xiuhui
    Zhang, Yushu
    [J]. INFORMATION SCIENCES, 2022, 604 : 115 - 141
  • [7] Compiling Open Datasets in Context of Large Organizations while Protecting User Privacy and Guaranteeing Plausible Deniability
    Jakovljevic, Igor
    Guetl, Christian
    Wagner, Andreas
    Nussbaumer, Alexander
    [J]. PROCEEDINGS OF THE 11TH INTERNATIONAL CONFERENCE ON DATA SCIENCE, TECHNOLOGY AND APPLICATIONS (DATA), 2022, : 301 - 311
  • [8] The Austrian eID ecosystem in the public cloud: How to obtain privacy while preserving practicality
    Zwattendorfer, Bernd
    Slamanig, Daniel
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2016, 27-28 : 35 - 53
  • [9] Privacy Token Technique for Protecting User's Attributes in a Federated Identity Management System for the Cloud Environment
    Abur, Maria M.
    Junaidu, Sahalu B.
    Abdullahi, Saleh E.
    Obiniyi, Afolayan A.
    [J]. 2019 2ND INTERNATIONAL CONFERENCE OF THE IEEE NIGERIA COMPUTER CHAPTER (NIGERIACOMPUTCONF), 2019, : 270 - 279