Protecting Outsourced Data Privacy with Lifelong Policy Carrying

被引:0
|
作者
Wang, Xiaoguang [1 ]
Yong, Qi [1 ]
Dai, Yuehua [1 ]
Ren, Jianbao [1 ]
Hang, Zhang [1 ]
机构
[1] Xi An Jiao Tong Univ, Dept Comp Sci, Xian 710049, Peoples R China
关键词
data outsourcing; data privacy; policy-carrying data model; access and propagation control;
D O I
10.1109/HPCC.and.EUC.2013.128
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The lack of remote data access control capability and the loss of remote data access trail make data owners hesitate when they have to outsource their sensitive data to remote third party platform. The data owners have no choice but to trust the remote third party software before they ship their data to the remote environment. In this paper we propose a new set of guiding principles for protecting outsourced data with data owner specified policy. Compared with traditional access control mechanism equipped by service providers, which can be regarded as the first layer of confinement, we aim to provide data owner a second layer of confinement on data propagation and access without modifying existing data-access applications. This is achieved by two critical techniques: (1) a policy-carrying data model that binds customer data with logical data access policy; and (2) a remote application running environment which acts as data access verifier and propagation controller. To demonstrate the feasibility of this approach, we build the logical data propagation and access control (LDPAC) system, in which a human-readable policy abstract is provided to formulate data propagation and access. When policy-carrying data is shipped to remote service provider, the per-node LDPAC verifier module conducts the logical proof checking to mediate sensitive data access. Meanwhile, the authorized application which intends to access sensitive data is forced to run in an application container, in order to prevent sensitive data leakage through in-memory data breaches. Our evaluation shows that LDPAC system adds reasonable performance overhead for the remote sensitive data access and propagation mediation, while preserving the original service deployment.
引用
收藏
页码:896 / 905
页数:10
相关论文
共 50 条
  • [41] Protecting data privacy in growing neural gas
    Chen, Tingting
    Bansal, Ankur
    Zhong, Sheng
    Chen, Xiaodong
    [J]. NEURAL COMPUTING & APPLICATIONS, 2012, 21 (06): : 1255 - 1262
  • [42] A new verifiable outsourced ciphertext-policy attribute based encryption for big data privacy and access control in cloud
    Premkamal, Praveen Kumar
    Pasupuleti, Syam Kumar
    Alphonse, P. J. A.
    [J]. JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2019, 10 (07) : 2693 - 2707
  • [43] A new verifiable outsourced ciphertext-policy attribute based encryption for big data privacy and access control in cloud
    Praveen Kumar Premkamal
    Syam Kumar Pasupuleti
    P. J. A. Alphonse
    [J]. Journal of Ambient Intelligence and Humanized Computing, 2019, 10 : 2693 - 2707
  • [44] Outsourced Ciphertext-Policy based Privacy Preservation for Mobile Cloud Computing
    Ahmad, Waqas
    Wang, Shengling
    Sheharyar
    Mahmood, Zahid
    [J]. 2017 INTERNATIONAL CONFERENCE ON IDENTIFICATION, INFORMATION AND KNOWLEDGE IN THE INTERNET OF THINGS, 2018, 129 : 128 - 134
  • [45] Outsourced privacy-preserving classification service over encrypted data
    Li, Tong
    Huang, Zhengan
    Li, Ping
    Liu, Zheli
    Jia, Chunfu
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2018, 106 : 100 - 110
  • [46] Outsourced Privacy-Preserving Data Alignment on Vertically Partitioned Database
    Wang, Zhuzhu
    Hu, Cui
    Xiao, Bin
    Liu, Yang
    Li, Teng
    Ma, Zhuo
    Ma, Jianfeng
    [J]. IEEE TRANSACTIONS ON BIG DATA, 2023, 9 (05) : 1408 - 1419
  • [47] Privacy preservation in outsourced mobility traces through compact data structures
    Calderoni, Luca
    Bandini, Samantha
    Maio, Dario
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2020, 55
  • [48] Outsourced Biometric Identification With Privacy
    Hu, Shengshan
    Li, Minghui
    Wang, Qian
    Chow, Sherman S. M.
    Du, Minxin
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2018, 13 (10) : 2448 - 2463
  • [49] Multi-keyword privacy query for outsourced data in cloud environments
    Jia, Qianqian
    Shi, Run-Hua
    Wang, Qingle
    Li, Huijie
    [J]. SCIENTIA SINICA-PHYSICA MECHANICA & ASTRONOMICA, 2024, 54 (03)
  • [50] A secure and efficient outsourced computation on data sharing scheme for privacy computing
    Fan, Kai
    Liu, Tingting
    Zhang, Kuan
    Li, Hui
    Yang, Yintang
    [J]. JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2020, 135 : 169 - 176