LIMITING DISCLOSURE FOR DATA STREAMS IN THE CLOUD

Wee Siong Ng, Huayu Wu, Wei Wu, Shili Xiang

Abstract

The rapidly increasing number of sensors and surveillance devices as well as the coming of age of pervasive and cloud computing are fostering applications driven by real-time stream data management. As more and more data stream processing engines (and services) will be deployed in the cloud, we feel it is critical to enable the data stream owners to control who can access their data streams for what purposes under what conditions. Therefore, we design an architecture to support data stream management in the cloud with privacy-preserving capabilities. In this paper, we focus on one of the premier principles of data privacy, limited disclosure. We design an access control framework, to define privacy policies and efficiently enforce these privacy policy rules from stream-level to tuple-level granularity.

References

  1. Adaikkalavan, R. and Perez, T. (2011). Secure shared continuous query processing. In SAC, pages 1000-1005.
  2. Agrawal, R., Kiernan, J., Srikant, R., and Xu, Y. (2002). Hippocratic databases. In VLDB, pages 143-154.
  3. Ashley, P., Hada, S., Karjoth, G., Powers, C., and Schunter, M. (2003). Enterprise Privacy Authorization Language (EPAL 1.2). Technical report, IBM.
  4. Cao, J., Carminati, B., Ferrari, E., and Tan, K.-L. (2009). ACStream: Enforcing access control over data streams. In ICDE, pages 1495-1498.
  5. Carminati, B., Ferrari, E., Cao, J., and Tan, K. L. (2010). A framework to enforce access control over data streams. ACM Trans. Inf. Syst. Secur., 13:28:1-28:31.
  6. Golab, L. and O zsu, M. T. (2003). Issues in data stream management. SIGMOD Record, 32(2):5-14.
  7. Knauth, T. and Fetzer, C. (2011). Scaling non-elastic applications using virtual machines. In IEEE CLOUD, pages 468-475.
  8. Lindner, W. and Meier, J. (2006). Securing the borealis data stream engine. In IDEAS, pages 137-147.
  9. Nehme, R. V., Lim, H.-S., and Bertino, E. (2010). FENCE: Continuous access control enforcement in dynamic data stream environments. In ICDE, pages 940-943.
  10. Nehme, R. V., Lim, H.-S., Bertino, E., and Rundensteiner, E. A. (2009). StreamShield: a stream-centric approach towards security and privacy in data stream environments. In SIGMOD, pages 1027-1030.
  11. Nehme, R. V., Rundensteiner, E. A., and Bertino, E. (2008). A security punctuation framework for enforcing access control on streaming data. In ICDE, pages 406- 415.
  12. Vaquero, L. M., Rodero-Merino, L., Caceres, J., and Lindner, M. (2008). A break in the clouds: towards a cloud definition. SIGCOMM Comput. Commun. Rev., 39:50-55.
Download


Paper Citation


in Harvard Style

Ng W., Wu H., Wu W. and Xiang S. (2012). LIMITING DISCLOSURE FOR DATA STREAMS IN THE CLOUD . In Proceedings of the 2nd International Conference on Cloud Computing and Services Science - Volume 1: CLOSER, ISBN 978-989-8565-05-1, pages 574-579. DOI: 10.5220/0003927005740579


in Bibtex Style

@conference{closer12,
author={Wee Siong Ng and Huayu Wu and Wei Wu and Shili Xiang},
title={LIMITING DISCLOSURE FOR DATA STREAMS IN THE CLOUD},
booktitle={Proceedings of the 2nd International Conference on Cloud Computing and Services Science - Volume 1: CLOSER,},
year={2012},
pages={574-579},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0003927005740579},
isbn={978-989-8565-05-1},
}


in EndNote Style

TY - CONF
JO - Proceedings of the 2nd International Conference on Cloud Computing and Services Science - Volume 1: CLOSER,
TI - LIMITING DISCLOSURE FOR DATA STREAMS IN THE CLOUD
SN - 978-989-8565-05-1
AU - Ng W.
AU - Wu H.
AU - Wu W.
AU - Xiang S.
PY - 2012
SP - 574
EP - 579
DO - 10.5220/0003927005740579