“taxi” and its attributes “t”, “x”, and “y”. Dur-
ing stream-level and attribute-level checking, our sys-
tem will find out that the access control policy “De-
partmentB, taxi, research, taxi.v < 80” allows the
query to be executed, because user “Staff2” is under
user-category “DepartmentB”, and the stream and at-
tributes are under data-category “taxi”, and the pur-
pose is also allowed. The query rewriting function
then will transform the query to the following query
for execution.
SELECT t, x, y FROM taxi WHERE
x
>
103.81 AND x
<
103.86
AND v<80
Note that the condition “taxi.v < 80” in the access
control policy is attached to the query as another se-
lection condition. This makes the query processing
engine to help enforce the tuple-level access control
during query processing time.
The overhead on policy enforcement in our sys-
tem is acceptable. Based on our evaluation, the time
of stream/attribute-level policy checking, i.e., search-
ing user, data and purpose categories, is linear to the
number policies and is constant to the size (fanout and
height) of each category. For the tuple-level access
control enforcement, i.e., query rewriting to incorpo-
rate policy constraints, if the selectivity of original
query is high, policy checking will not bring in any
obvious overhead; if the query selectivity is not high,
the overhead of checking access control policy could
be either positive or negative, depending on the se-
lectivity of the policy. Due to space limit, we do not
describe our prototype implementation and detailed
performance evaluation result in this paper.
5 CONCLUSIONS AND FUTURE
WORK
In this paper, we propose a framework to provide lim-
ited disclosure to data stream management systems
deployed in cloud. The key concept of our design is to
incorporate a privacy policy enforcement component,
which is called privacy controller, into the normal
stream system. In our access control model, users,
data, and data access purposes are organized into hi-
erarchies. The access control model enables each
stream owner to specify who can access what data
for what purpose under what condition. All stream
level, attribute level, and tuple level access controls
are possible. The privacy controller enforces stream-
level and attribute-level access control immediately
when a query is registered into the system. By this
way, unauthorized access to particular streams and at-
tributes can be prevented at the very first time. Then
tuple-level access control is achieved by query rewrit-
ing, i.e., adding tuple-level access control constraints
to original queries.
Another focus of our project is to make our Hip-
pocratic data stream system cloud friendly, i.e., make
it able to scale with elastic computing resources. To
this end, we are investigating the problem of deploy-
ing multiple instances of our Hippocratic data stream
system on multiple (virtual or physical) machines and
making them collaborate with each other to scale with
the dynamic stream rate and query processing load.
ACKNOWLEDGEMENTS
This work was supported by A*STAR Grant No. 102
158 0037.
REFERENCES
Adaikkalavan, R. and Perez, T. (2011). Secure shared con-
tinuous query processing. In SAC, pages 1000–1005.
Agrawal, R., Kiernan, J., Srikant, R., and Xu, Y. (2002).
Hippocratic databases. In VLDB, pages 143–154.
Ashley, P., Hada, S., Karjoth, G., Powers, C., and Schunter,
M. (2003). Enterprise Privacy Authorization Lan-
guage (EPAL 1.2). Technical report, IBM.
Cao, J., Carminati, B., Ferrari, E., and Tan, K.-L.
(2009). ACStream: Enforcing access control over data
streams. In ICDE, pages 1495–1498.
Carminati, B., Ferrari, E., Cao, J., and Tan, K. L. (2010).
A framework to enforce access control over data
streams. ACM Trans. Inf. Syst. Secur., 13:28:1–28:31.
Golab, L. and
¨
Ozsu, M. T. (2003). Issues in data stream
management. SIGMOD Record, 32(2):5–14.
Knauth, T. and Fetzer, C. (2011). Scaling non-elastic ap-
plications using virtual machines. In IEEE CLOUD,
pages 468–475.
Lindner, W. and Meier, J. (2006). Securing the borealis data
stream engine. In IDEAS, pages 137–147.
Nehme, R. V., Lim, H.-S., and Bertino, E. (2010). FENCE:
Continuous access control enforcement in dynamic
data stream environments. In ICDE, pages 940–943.
Nehme, R. V., Lim, H.-S., Bertino, E., and Rundensteiner,
E. A. (2009). StreamShield: a stream-centric ap-
proach towards security and privacy in data stream en-
vironments. In SIGMOD, pages 1027–1030.
Nehme, R. V., Rundensteiner, E. A., and Bertino, E. (2008).
A security punctuation framework for enforcing ac-
cess control on streaming data. In ICDE, pages 406–
415.
Vaquero, L. M., Rodero-Merino, L., Caceres, J., and Lind-
ner, M. (2008). A break in the clouds: towards a
cloud definition. SIGCOMM Comput. Commun. Rev.,
39:50–55.
LIMITINGDISCLOSUREFORDATASTREAMSINTHECLOUD
579