skip to main content
10.1145/2390021.2390033acmconferencesArticle/Chapter ViewAbstractPublication PagescikmConference Proceedingsconference-collections
research-article

A security aware stream data processing scheme on the cloud and its efficient execution methods

Published:29 October 2012Publication History

ABSTRACT

In order to process a few thousands of streams in real-time, public clouds seem to be an excellent choice since it supports massively amount of computing resources. A public cloud may be managed by a third party and outside the firewall of the organization, which may make it questionable whether data are managed confidentially. This paper proposes a scheme that evaluates queries over encrypted data streams. Our scheme is based on CryptDB and its modification. We describe performance issues incurred by our scheme, and propose an approach to reduce the encryption costs and amounts of transmitted data size, and an approach to reduce memory usage by analyzing a plan tree in an SPE. The result of experiments showed that applying AP-1 reduces 90% memory size, while applying AP-2 reduces 11% memory size.

References

  1. Amazon Elastic Compute Cloud (Amazon EC2). http://aws.amazon.com/jp/ec2/.Google ScholarGoogle Scholar
  2. Microsoft StreamInSight. http://www.microsoft.com/sqlserver/2008/en/us/r2-complex-event.aspx.Google ScholarGoogle Scholar
  3. Microsoft Windows Azure. http://www.microsoft.com/japan/windowsazure/.Google ScholarGoogle Scholar
  4. Oracle CEP. http://www.oracle.com/us/technologies/soa/service-oriented-architecture-066455.html.Google ScholarGoogle Scholar
  5. Paillier's Homomorphic Cryptosystem (Java Implementation). http://www.csee.umbc.edu/~kunliu1/research/Paillier.html.Google ScholarGoogle Scholar
  6. TCPDUMP/LIBPCAP public repository. http://www.tcpdump.org/.Google ScholarGoogle Scholar
  7. uCosminexus Stream Data Platform. http://www.hitachi.co.jp/Prod/comp/soft1/cosminexus/sdp/.Google ScholarGoogle Scholar
  8. A. Arasu, S. Babu, and J. Widom. The cql continuous query language: semantic foundations and query execution. VLDB J., 15(2):121--142, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. A. Boldyreva, N. Chenette, Y. Lee, and A. O'Neill. Order-preserving symmetric encryption. In EUROCRYPT, pages 224--241, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. R. Chow, P. Golle, M. Jakobsson, E. Shi, J. Staddon, R. Masuoka, and J. Molina. Controlling data in the cloud: outsourcing computation without outsourcing control. In CCSW, pages 85--90, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. B. Gedik, H. Andrade, K.-L. Wu, P. S. Yu, and M. Doo. Spade: the system's declarative stream processing engine. In SIGMOD Conference, pages 1123--1134, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. S. Halevi and P. Rogaway. A tweakable enciphering mode. In CRYPTO, pages 482--499, 2003.Google ScholarGoogle ScholarCross RefCross Ref
  13. S. Hildenbrand, D. Kossmann, T. Sanamrad, C. Binnig, F. Faerber, and J. Woehler. Query processing on encrypted data in the cloud. 2011.Google ScholarGoogle Scholar
  14. R. V. Nehme, H.-S. Lim, E. Bertino, and E. A. Rundensteiner. StreamShield: a stream-centric approach towards security and privacy in data stream environments. In SIGMOD Conference, pages 1027--1030, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. P. Paillier. Public-key cryptosystems based on composite degree residuosity classes. In EUROCRYPT, pages 223--238, 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. R. A. Popa, C. M. S. Redfield, N. Zeldovich, and H. Balakrishnan. Cryptdb: protecting confidentiality with encrypted query processing. In SOSP, pages 85--100, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. E. Wu, Y. Diao, and S. Rizvi. High-performance complex event processing over streams. In SIGMOD Conference, pages 407--418, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. A security aware stream data processing scheme on the cloud and its efficient execution methods

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        CloudDB '12: Proceedings of the fourth international workshop on Cloud data management
        October 2012
        74 pages
        ISBN:9781450317085
        DOI:10.1145/2390021

        Copyright © 2012 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 29 October 2012

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article

        Acceptance Rates

        Overall Acceptance Rate12of17submissions,71%

        Upcoming Conference

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader