skip to main content
10.1145/2462410.2462430acmconferencesArticle/Chapter ViewAbstractPublication PagessacmatConference Proceedingsconference-collections
demonstration

Secure benchmarking in the cloud

Published: 12 June 2013 Publication History

Abstract

Benchmarking is the comparison of one company's key performance indicators (KPI) to the statistics of the same KPIs of its peer group. A KPI is a statistical quantity measuring the performance of a business process. Privacy by means of controlling access to data is of the utmost importance in benchmarking. Companies are reluctant to share their business performance data due to the risk of losing a competitive advantage or being embarrassed. We present a cryptographic protocol for securely computing benchmarks between multiple parties and describe the technical aspects of a proof of concept implementation of SAP's research prototype Global Benchmarking Service (GBS) on Microsoft's cloud technology Windows Azure.

References

[1]
Florian Kerschbaum, Practical Privacy-Preserving Benchmarking, Proceedings of the IFIP TC-11 23rd International Information Security Conference, pp. 17--31, 2008.
[2]
Florian Kerschbaum, Daniel Dahlmeier, Axel Schröpfer, Debmalya Biswas. On the practical importance of communication complexity for secure multi-party computation protocols. Proceedings of the ACM Symposium on Applied Computing, pp. 2008--2015, 2009.
[3]
Brad Calder, Tony Wang, Shane Mainali, and Jason Wu, Windows Azure Blob, May 2009 http://go.microsoft.com/fwlink/~LinkId=153400&clcid=0x409
[4]
David Chappell, Introducing Windows Azure, October 2010, http://go.microsoft.com/~linkid=9682907&clcid=0x409
[5]
George Huey, Scaling Out with SQL Azure Federation, February 2012, http://msdn.microsoft.com/en-us/magazine/hh848258.aspx

Cited By

View all
  • (2019)Optimally Efficient Secure Scalar Product With Applications in Cloud ComputingIEEE Access10.1109/ACCESS.2019.29082307(42798-42815)Online publication date: 2019
  • (2016)Unconditionally Secure, Universally Composable Privacy Preserving Linear AlgebraIEEE Transactions on Information Forensics and Security10.1109/TIFS.2015.247678311:1(59-73)Online publication date: 1-Jan-2016
  • (2013)Formal verification of mandatory access control for privacy cloudProceedings of 2013 3rd International Conference on Computer Science and Network Technology10.1109/ICCSNT.2013.6967116(297-300)Online publication date: Oct-2013

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
SACMAT '13: Proceedings of the 18th ACM symposium on Access control models and technologies
June 2013
278 pages
ISBN:9781450319508
DOI:10.1145/2462410
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 12 June 2013

Permissions

Request permissions for this article.

Check for updates

Qualifiers

  • Demonstration

Conference

SACMAT '13
Sponsor:

Acceptance Rates

SACMAT '13 Paper Acceptance Rate 19 of 62 submissions, 31%;
Overall Acceptance Rate 177 of 597 submissions, 30%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)1
  • Downloads (Last 6 weeks)0
Reflects downloads up to 05 Mar 2025

Other Metrics

Citations

Cited By

View all
  • (2019)Optimally Efficient Secure Scalar Product With Applications in Cloud ComputingIEEE Access10.1109/ACCESS.2019.29082307(42798-42815)Online publication date: 2019
  • (2016)Unconditionally Secure, Universally Composable Privacy Preserving Linear AlgebraIEEE Transactions on Information Forensics and Security10.1109/TIFS.2015.247678311:1(59-73)Online publication date: 1-Jan-2016
  • (2013)Formal verification of mandatory access control for privacy cloudProceedings of 2013 3rd International Conference on Computer Science and Network Technology10.1109/ICCSNT.2013.6967116(297-300)Online publication date: Oct-2013

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media