Protecting Outsourced Data Privacy with Lifelong Policy Carrying

被引:0
|
作者
Wang, Xiaoguang [1 ]
Yong, Qi [1 ]
Dai, Yuehua [1 ]
Ren, Jianbao [1 ]
Hang, Zhang [1 ]
机构
[1] Xi An Jiao Tong Univ, Dept Comp Sci, Xian 710049, Peoples R China
关键词
data outsourcing; data privacy; policy-carrying data model; access and propagation control;
D O I
10.1109/HPCC.and.EUC.2013.128
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The lack of remote data access control capability and the loss of remote data access trail make data owners hesitate when they have to outsource their sensitive data to remote third party platform. The data owners have no choice but to trust the remote third party software before they ship their data to the remote environment. In this paper we propose a new set of guiding principles for protecting outsourced data with data owner specified policy. Compared with traditional access control mechanism equipped by service providers, which can be regarded as the first layer of confinement, we aim to provide data owner a second layer of confinement on data propagation and access without modifying existing data-access applications. This is achieved by two critical techniques: (1) a policy-carrying data model that binds customer data with logical data access policy; and (2) a remote application running environment which acts as data access verifier and propagation controller. To demonstrate the feasibility of this approach, we build the logical data propagation and access control (LDPAC) system, in which a human-readable policy abstract is provided to formulate data propagation and access. When policy-carrying data is shipped to remote service provider, the per-node LDPAC verifier module conducts the logical proof checking to mediate sensitive data access. Meanwhile, the authorized application which intends to access sensitive data is forced to run in an application container, in order to prevent sensitive data leakage through in-memory data breaches. Our evaluation shows that LDPAC system adds reasonable performance overhead for the remote sensitive data access and propagation mediation, while preserving the original service deployment.
引用
收藏
页码:896 / 905
页数:10
相关论文
共 50 条
  • [1] Protecting Location Privacy for Outsourced Spatial Data in Cloud Storage
    Tian, Feng
    Gui, Xiaolin
    An, Jian
    Yang, Pan
    Zhao, Jianqiang
    Zhang, Xuejun
    [J]. SCIENTIFIC WORLD JOURNAL, 2014,
  • [2] Privacy of Outsourced Data
    di Vimercati, Sabrina De Capitani
    Foresti, Sara
    [J]. PRIVACY AND IDENTITY MANAGEMENT FOR LIFE, 2010, 320 : 174 - 187
  • [3] Privacy-Protecting Index for Outsourced Databases
    Chen, Chung-Min
    Cichocki, Andrzej
    McIntosh, Allen
    Panagos, Euthimios
    [J]. 2013 IEEE 29TH INTERNATIONAL CONFERENCE ON DATA ENGINEERING WORKSHOPS (ICDEW), 2013, : 83 - 87
  • [4] Practical and Privacy-Preserving Policy Compliance for Outsourced Data
    Di Crescenzo, Giovanni
    Feigenbaum, Joan
    Gupta, Debayan
    Panagos, Euthimios
    Perry, Jason
    Wright, Rebecca N.
    [J]. FINANCIAL CRYPTOGRAPHY AND DATA SECURITY: FC 2014 WORKSHOPS, BITCOIN AND WAHC 2014, 2014, 8438 : 181 - 194
  • [5] Data Security and Privacy for Outsourced Data in the Cloud
    Sahin, Cetin
    El Abbadi, Amr
    [J]. 2018 IEEE 34TH INTERNATIONAL CONFERENCE ON DATA ENGINEERING (ICDE), 2018, : 1731 - 1734
  • [6] Hilbert-curve based Cryptographic Transformation Scheme for Protecting Data Privacy on Outsourced Private Spatial Data
    Kim, Hyeong-Il
    Hong, Seung-Tae
    Chang, Jae-Woo
    [J]. 2014 INTERNATIONAL CONFERENCE ON BIG DATA AND SMART COMPUTING (BIGCOMP), 2014, : 77 - 82
  • [7] Outsourced Private Function Evaluation with Privacy Policy Enforcement
    Kunihiro, Noboru
    Nishide, Takashi
    Lu, Wen-Jie
    Sakuma, Jun
    [J]. 2018 17TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (IEEE TRUSTCOM) / 12TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (IEEE BIGDATASE), 2018, : 412 - 423
  • [8] Enforcing Data Privacy in Outsourced Database Services
    Yu, Yonghong
    Bai, Wenyang
    [J]. ADVANCES IN CIVIL ENGINEERING, PTS 1-6, 2011, 255-260 : 2224 - +
  • [9] Enhancing Confidentiality and Privacy of Outsourced Spatial Data
    Talha, Ayesha M.
    Kamel, Ibrahim
    Al Aghbari, Zaher
    [J]. 2015 IEEE 2ND INTERNATIONAL CONFERENCE ON CYBER SECURITY AND CLOUD COMPUTING (CSCLOUD), 2015, : 13 - 18
  • [10] Privacy and ownership preserving of outsourced medical data
    Bertino, E
    Ooi, BC
    Yang, YJ
    Deng, RH
    [J]. ICDE 2005: 21ST INTERNATIONAL CONFERENCE ON DATA ENGINEERING, PROCEEDINGS, 2005, : 521 - 532