Secure Data Exchange and Data Leakage Detection in an Untrusted Cloud

被引:3
|
作者
Ulybyshev, Denis [1 ]
Bhargava, Bharat [1 ]
Oqab-Alsalem, Aala [1 ]
机构
[1] Purdue Univ, Dept Comp Sci, CERIAS, W Lafayette, IN 47907 USA
关键词
Data leakage detection; Access control; Privacy; Cloud security;
D O I
10.1007/978-981-13-2035-4_10
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In service-oriented architecture, services can communicate and share data amongst themselves. It is necessary to provide role-based access control for data. In addition, data leakages made by authorized insiders to unauthorized services should be detected and reported back to the data owner. In this paper, we propose a solution that uses role-and attribute-based access control for data exchange among services, including services hosted by untrusted environments. Our approach provides data leakage prevention and detection for multiple leakage scenarios. We also propose a damage assessment model for data leakages. The implemented prototype supports a privacy-preserving exchange of Electronic Health Records that can be hosted by untrusted cloud providers, as well as detecting leakages made by insiders.
引用
收藏
页码:99 / 113
页数:15
相关论文
共 50 条
  • [1] Secure and efficient data forwarding in untrusted cloud environment
    Balamanigandan Ramachandran
    Kamalraj Subramaniam
    Cluster Computing, 2019, 22 : 3727 - 3735
  • [2] Secure and efficient data forwarding in untrusted cloud environment
    Ramachandran, Balamanigandan
    Subramaniam, Kamalraj
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2019, 22 (02): : S3727 - S3735
  • [3] Secure Data Exchange: A Marketplace in the Cloud
    Gilad-Bachrach, Ran
    Laine, Kim
    Lauter, Kristin
    Rindal, Peter
    Rosulek, Mike
    CCSW'19: PROCEEDINGS OF THE 2019 ACM SIGSAC CONFERENCE ON CLOUD COMPUTING SECURITY WORKSHOP, 2019, : 117 - 128
  • [4] Secure untrusted data repository (SUNDR)
    Li, JY
    Krohn, M
    Mazières, D
    Shasha, D
    USENIX ASSOCIATION PROCEEDINGS OF THE SIXTH SYMPOSIUM ON OPERATING SYSTEMS DESIGN AND IMPLEMENTATION (OSDE '04), 2004, : 121 - 136
  • [5] A Secure Duplicate Data Sharing Method against Untrusted Cloud Service Provider
    Wang, Jiawei
    He, Junjiang
    Li, Wenshan
    Lan, Xiaolong
    Liu, Qian
    Li, Tao
    2023 IEEE 12TH INTERNATIONAL CONFERENCE ON CLOUD NETWORKING, CLOUDNET, 2023, : 352 - 359
  • [6] Detection of Data Leakage in Cloud Computing Environment
    Kumar, Neeraj
    Katta, Vijay
    Mishra, Himanshu
    Garg, Hitendra
    2014 6TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMMUNICATION NETWORKS, 2014, : 803 - 807
  • [7] A Secure Data Assimilation for Large-Scale Sensor Networks Using an Untrusted Cloud
    Xu, Zhiheng
    Zhu, Quanyan
    IFAC PAPERSONLINE, 2017, 50 (01): : 2609 - 2614
  • [8] Data Leakage Detection in cloud using Watermarking Technique
    Naik, Riya
    Gaonkar, Manisha Naik
    2019 INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND INFORMATICS (ICCCI - 2019), 2019,
  • [9] Secure Fine-Grained Access Control of Mobile User Data through Untrusted Cloud
    Zhou, Kai
    Ren, Jian
    2016 25TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS AND NETWORKS (ICCCN), 2016,
  • [10] Privacy - Preserving Data Dissemination in Untrusted Cloud
    Ulybyshev, Denis
    Bhargava, Bharat
    Villarreal-Vasquez, Miguel
    Alsalem, Aala Oqab
    Steiner, Donald
    Li, Leon
    Kobes, Jason
    Halpin, Harry
    Ranchal, Rohit
    2017 IEEE 10TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING (CLOUD), 2017, : 770 - 773