skip to main content
10.1145/2046556.2046580acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
research-article
Open access

Privacy of data outsourced to a cloud for selected readers through client-side encryption

Published: 17 October 2011 Publication History

Abstract

We propose a scheme using client-side encryption with symmetric keys for the privacy of data outsourced to the cloud for selected readers. The scheme is safe under the most popular "honest, but curious" model. Readers get the keys from access grants or have them cached. LH* files store cloud data and metadata. Diffie-Hellman scheme authenticates clients. Every client can read any data, but only a grantee decrypts the content. Access to data is usually the fastest possible that is two messages and the decryption, regardless of the cloud scale up. Data or grant creation or update costs are also constant with a few messages and fast processing. All these features serve our main goal: the search speed and scalability yet unmatched to our best knowledge. The scheme is finally intentionally very simple.

References

[1]
Bonifati, A. Liu, R., Wang, H., W. Distributed and Secure Access Control in P2P Databases. DBSec 2010.
[2]
Cloud Security Alliance. Security Guidance for Critical Areas of Focus in Cloud Computing. https://cloudsecurityalliance.org/csaguide.pdf
[3]
Diene, A. W., Litwin. W. Performance Measurements of RP*:A Scalable Distributed Data Structure For Range Partitioning. 2000 Intl. Conf. on Information Society in the 21st Century. Aizu City, Japan, 2000
[4]
ENISA Cloud Computing Risk Assessment. http://www.enisa.europa.eu/act/res/other-areas/
[5]
Foresti, S. Preserving Privacy in Data Outsourcing. Spinger, 2011
[6]
http://www.gemstone.com/products/gemfire.
[7]
Jajodia, S., Litwin, W. & Schwarz, Th. LH*RE: A Scalable Distributed Data Structure with Recoverable Encryption. IEEE-CLOUD 2010.
[8]
Jajodia, S., Litwin, W. & Schwarz, Th. Privacy of Data Outsourcing to a Cloud for Selected Readers. Res. Rep. Lamsade, Feb. 2011.
[9]
Jajodia, S., Smarati, P., Sapino, M. L., Subrahmanian, V. S. Flexible support for multiple access control policies. ACM- TODS, 26(2), 2001.
[10]
Kaufman, Ch., Perlman, R., Speciner, M. Network Security: Private Communication in a Public World. (2nd Ed. Prentice Hall, 2002
[11]
Litwin, W. Moussa, R., Schwarz, Th. LH*RS A Highly-Available Scalable Distributed Data Structure. ACM TODS, 10, 2005.
[12]
Litwin, W., Neimat, M-A., Schneider, D. LH* - A Scalable Distributed Data Structure. ACM TODS. 12, 1996.
[13]
Ousterhout, J. & al. The Case for RAMClouds: Scalable High-Performance Storage Entirely in DRAM. ACM SIGOPS Operating Systems Review, 43 4, 2010.
[14]
Sharepoint 2010. http://sharepoint.microsoft.com/en- us/pages/default.aspx
[15]
Schwarz, Th., Long, D. Clasas: A Key-Store for the Cloud, MASCOTS 2010
[16]
Vimercati, S., Foresti, S., Jajodia, S., Paraboschi, S., Samarati, P. Encryption policies for regulating access to outsourced data. ACM TODS, 35,2, 2010.

Cited By

View all
  • (2021)Cloud Storage Privacy in Health Care Systems Based on IP and Geo-Location Validation Using K-Mean Clustering TechniqueResearch Anthology on Privatizing and Securing Data10.4018/978-1-7998-8954-0.ch041(898-910)Online publication date: 2021
  • (2020)Cloud Storage Privacy in Health Care Systems Based on IP and Geo-Location Validation Using K-Mean Clustering TechniqueInternational Journal of E-Health and Medical Communications10.4018/IJEHMC.201910010510:4(54-65)Online publication date: 1-Oct-2020
  • (2019)Edge Computing for User-Centric Secure Search on Cloud-Based Encrypted Big Data2019 IEEE 21st International Conference on High Performance Computing and Communications; IEEE 17th International Conference on Smart City; IEEE 5th International Conference on Data Science and Systems (HPCC/SmartCity/DSS)10.1109/HPCC/SmartCity/DSS.2019.00100(662-669)Online publication date: Aug-2019
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
WPES '11: Proceedings of the 10th annual ACM workshop on Privacy in the electronic society
October 2011
192 pages
ISBN:9781450310024
DOI:10.1145/2046556
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 17 October 2011

Permissions

Request permissions for this article.

Check for updates

Author Tag

  1. scalable distributed data structure

Qualifiers

  • Research-article

Conference

CCS'11
Sponsor:

Acceptance Rates

Overall Acceptance Rate 106 of 355 submissions, 30%

Upcoming Conference

CCS '25

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)38
  • Downloads (Last 6 weeks)4
Reflects downloads up to 16 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2021)Cloud Storage Privacy in Health Care Systems Based on IP and Geo-Location Validation Using K-Mean Clustering TechniqueResearch Anthology on Privatizing and Securing Data10.4018/978-1-7998-8954-0.ch041(898-910)Online publication date: 2021
  • (2020)Cloud Storage Privacy in Health Care Systems Based on IP and Geo-Location Validation Using K-Mean Clustering TechniqueInternational Journal of E-Health and Medical Communications10.4018/IJEHMC.201910010510:4(54-65)Online publication date: 1-Oct-2020
  • (2019)Edge Computing for User-Centric Secure Search on Cloud-Based Encrypted Big Data2019 IEEE 21st International Conference on High Performance Computing and Communications; IEEE 17th International Conference on Smart City; IEEE 5th International Conference on Data Science and Systems (HPCC/SmartCity/DSS)10.1109/HPCC/SmartCity/DSS.2019.00100(662-669)Online publication date: Aug-2019
  • (2018)Centralized Duplicate Removal Video Storage System with Privacy Preservation in IoTSensors10.3390/s1806181418:6(1814)Online publication date: 4-Jun-2018
  • (2016)A Video Deduplication Scheme with Privacy Preservation in IoTComputational Intelligence and Intelligent Systems10.1007/978-981-10-0356-1_43(409-417)Online publication date: 19-Jan-2016
  • (2013)Recoverable encryption through a noised secret over a large cloudTransactions on Large-Scale Data- and Knowledge-centered systems IX10.5555/2554635.2554638(42-64)Online publication date: 1-Jan-2013
  • (2013)Recoverable Encryption through a Noised Secret over a Large CloudTransactions on Large-Scale Data- and Knowledge-Centered Systems IX10.1007/978-3-642-40069-8_3(42-64)Online publication date: 2013
  • (2013)Making Query Execution Over Encrypted Data PracticalSecure Cloud Computing10.1007/978-1-4614-9278-8_8(171-188)Online publication date: 7-Dec-2013
  • (2012)Recoverable Encryption through Noised Secret over a Large CloudData Management in Cloud, Grid and P2P Systems10.1007/978-3-642-32344-7_2(13-24)Online publication date: 2012

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Login options

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media