skip to main content
10.1145/2557547.2557556acmconferencesArticle/Chapter ViewAbstractPublication PagescodaspyConference Proceedingsconference-collections
research-article

Streamforce: outsourcing access control enforcement for stream data to the clouds

Published:03 March 2014Publication History

ABSTRACT

In this paper, we focus on the problem of data privacy on the cloud, particularly on access controls over stream data. The nature of stream data and the complexity of sharing data make access control a more challenging issue than in traditional archival databases. We present Streamforce -- a system allowing data owners to securely outsource their data to an untrusted (curious-but-honest) cloud. The owner specifies fine-grained policies which are enforced by the cloud. The latter performs most of the heavy computations, while learning nothing about the data content. To this end, we employ a number of encryption schemes, including deterministic encryption, proxy-based attribute based encryption and sliding-window encryption. In Streamforce, access control policies are modeled as secure continuous queries, which entails minimal changes to existing stream processing engines, and allows for easy expression of a wide-range of policies. In particular, Streamforce comes with a number of secure query operators including Map, Filter, Join and Aggregate. Finally, we implement Streamforce over an open-source stream processing engine (Esper) and evaluate its performance on a cloud platform. The results demonstrate practical performance for many real-world applications, and although the security overhead is visible, Streamforce is highly scalable.

References

  1. Key-policy attribute-based encryption scheme implementation. http://www.cnsr.ictas.vt.edu/resources.html.Google ScholarGoogle Scholar
  2. Apache. S4 - distributed stream computing platform. incubator.apache.org/s4.Google ScholarGoogle Scholar
  3. N. Attrapadung. Revocation scheme for attribute-based encryption. RCIS Workshop, 2008.Google ScholarGoogle Scholar
  4. B. Carminati, E. Ferrari, J. Cao, and K. L. Tan. A framework to enforce access control over data streams. ACM ToIS, 2010.Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. G. P. Cheek and M. Shehab. Policy-by-example for online social networks. In SACMAT, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Yao Chen and Radu Sion. On securing untrusted clouds with cryptography. DEB, 2012.Google ScholarGoogle Scholar
  7. T. T. A. Dinh and A. Datta. The blind enforcer: on fine-grained access control enforcement on untrusted clouds. DEB, 2013.Google ScholarGoogle Scholar
  8. C. Dwork. Differential privacy. In ICALP, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Rault Castro Fernandez, Metteo Migliavacca, Evangelia Kalyvianaki, and Peter Pietzuch. Integrating scale out and fault toelerance in stream processing using operator state management. In SIGMOD, 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. C. Gentry. Fully homomorphic encryption using ideal lattices. In SOTC, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. V. Goyal, O. Pandey, A. Sahai, and B. Waters. Attribute-based encryption for fine-grained access control of encrypted data. In CCS'06, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. M. Green, S. Hohenberger, and B. Waters. Outsourcing the decryption of abe ciphertexts. In USENIX Security, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. M. Kallahalla, E. Riedel, R. Swaminathan, Q. Wang, and K. Fu. Plutus: scalable secure file sharing on untrusted storage. In FAST, pages 29--42, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. H. Lim, Y. Han, and S. Babu. How to fit when no one size fits. In CIDR, 2013.Google ScholarGoogle Scholar
  15. Y. Lu. Privacy-preserving logarithmic-time search on encrypted data in cloud. In NDSS, 2013.Google ScholarGoogle Scholar
  16. R. Ostrovsky, A. Sahai, and B. Waters. Attribute-based encryption with non-monotonic access structures. In CCS'07, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. R. A. Popa, N. Zeldovich, and H. Balakrishnan. Cryptdb: a practical encrypted relational dbms. Technical Report MIT-CSAIL-TR-2011-005, CSAIL, MIT, 2011.Google ScholarGoogle Scholar
  18. E. Shi, T. H. Chan, E. R. FxPal, R. Chow, and D. Song. Privacy-preserving aggregation of time-series data. In NDSS, 2011.Google ScholarGoogle Scholar
  19. S. Yu, C. Wang, K. Ren, and W. Lou. Achieving secure, scalable and fine-grained data access control in cloud computing. In INFOCOM, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Streamforce: outsourcing access control enforcement for stream data to the clouds

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        CODASPY '14: Proceedings of the 4th ACM conference on Data and application security and privacy
        March 2014
        368 pages
        ISBN:9781450322782
        DOI:10.1145/2557547

        Copyright © 2014 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 3 March 2014

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article

        Acceptance Rates

        CODASPY '14 Paper Acceptance Rate19of119submissions,16%Overall Acceptance Rate149of789submissions,19%

        Upcoming Conference

        CODASPY '24

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader