publication . Preprint . 2012

Stream on the Sky: Outsourcing Access Control Enforcement for Stream Data to the Cloud

Dinh, Tien Tuan Anh; Datta, Anwitaman;
Open Access English
  • Published: 02 Oct 2012
Abstract
There is an increasing trend for businesses to migrate their systems towards the cloud. Security concerns that arise when outsourcing data and computation to the cloud include data confidentiality and privacy. Given that a tremendous amount of data is being generated everyday from plethora of devices equipped with sensing capabilities, we focus on the problem of access controls over live streams of data based on triggers or sliding windows, which is a distinct and more challenging problem than access control over archival data. Specifically, we investigate secure mechanisms for outsourcing access control enforcement for stream data to the cloud. We devise a syst...
Subjects
free text keywords: Computer Science - Cryptography and Security, Computer Science - Databases, Computer Science - Systems and Control
Download from
41 references, page 1 of 3

[1] Healthfrontier. www.healthfrontier.com.

[2] Key-policy attribute-based encryption scheme implementation. http:// www.cnsr.ictas.vt.edu/resources.html.

[3] National oceanic and admospheric administration. www.noaa.gov.

[4] Oasis extensible access control markup language (xacml). urlhttps://www.oasis-open.org/committees/xacml/.

[5] The pairing-based cryptography library. http://crypto.standford.edu/pbc.

[6] xignite: on demand financial market data. xignite.com.

[7] Stanford stream data manager. http://infolab.stanford.edu/stream, 2003.

[8] Sun's xacml impelementation. http://sunxacml.sourceforge.net/, 2006.

[9] Daniel J. Abadi, Don Carney, Ugur Cetintemal, Mitch Cherniack, Christian Convey, Sangdon Lee, Michael stonebraker, Nesime Tatbul, and Stand Zdonik. Aurora: a new model and architecture for data stream management. VLDB Journal, 12(2):120-39, 2003.

[10] Arvind Arasu, Mitch Cherniack, Eduardo Galvez, David Maier, Anurag S. Maskey, Esther Ryvkina, Michael Stonebraker, and Richard Tibbetts. Linear road: a stream data management benchmark. In VLDB, pages 480-91, 2004.

[11] Michael Armbrust, Armando Fox, Rean Griffith, Anthony D. Joseph, Randy H. Katz, Andrew Konwinski, Gunho Lee, David A. Patterson, Ariel Rabkin, Ion Stoica, and Matei Zaharia. Above the clouds: a berkeley view of cloud computing. Technical Report UCB/EECS-2009- 28, EECS Department, UCB, 2009.

[12] Nuttapong Attrapadung. Revocation scheme for attribute-based encryption. RCIS Workshop, http://www.rcis.aist.go.jp/files/events/2008/ RCIS2008/RCIS2008 3-5 Nuts.pdf, 2008.

[13] Hitesh Ballani, Paolo Cost, Thomas Karagiannis, and Ant Rowstron. Towards predictable datacenter networks. In SIGCOMM, pages 242-53, 2011.

[14] John Bethencourt, Amit Sahai, and Brent Waters. Ciphertext-policy attribute-based encryption. In IEEE Symposium on Security and Privacy, pages 321-34, 2007.

[15] Matt Blaze, Gerrit Bleumer, and Martin Strauss. Divertible protocols and atomic proxy cryptography. In EUROCRYPT'98, pages 127-44, 1998. [OpenAIRE]

41 references, page 1 of 3
Powered by OpenAIRE Research Graph
Any information missing or wrong?Report an Issue