skip to main content
10.1145/2699026.2699134acmconferencesArticle/Chapter ViewAbstractPublication PagescodaspyConference Proceedingsconference-collections
poster

CryptStream: Cryptographic Access Controls for Streaming Data

Published:02 March 2015Publication History

ABSTRACT

With data becoming available in larger quantities and at higher rates, new data processing paradigms have been proposed to handle large and fast data. Data Stream Processing is one such paradigm wherein transient data flows as streams through sets of continuous queries, only returning results when data is of interest to the querier, allowing uninteresting data to be ignored. To process these data streams, users are employing third party computational platforms or large private platforms to reduce the individual cost for querying and computing over data streams. Utilizing third parties for outsourcing computation means data being processed is available to the third party as well, which could violate the data provider's privacy. There has been research done into access control for streaming data, and these works provide a good first step, but fall short of a complete system. In this paper, we introduce CryptStream for cryptographically enforcing access controls over streaming data. CryptStream combines data providers access control policies with ones prescribed by the data consumer and the server as well. We show that CryptStream improves over earlier work in the same design space while providing smaller overheads and more flexibility.

References

  1. D. T. T. Anh and A. Datta. Streamforce: outsourcing access control enforcement for stream data to the clouds. In Proceedings of the 4th ACM conference on Data and application security and privacy, pages 13--24. ACM, 2014. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. R. Nehme, E. A. Rundensteiner, and E. Bertino. A security punctuation framework for enforcing access control on streaming data. In Data Engineering, 2008. ICDE 2008. IEEE 24th International Conference on, pages 406--415. IEEE, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. CryptStream: Cryptographic Access Controls for Streaming Data

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      CODASPY '15: Proceedings of the 5th ACM Conference on Data and Application Security and Privacy
      March 2015
      362 pages
      ISBN:9781450331913
      DOI:10.1145/2699026

      Copyright © 2015 Owner/Author

      Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 2 March 2015

      Check for updates

      Qualifiers

      • poster

      Acceptance Rates

      CODASPY '15 Paper Acceptance Rate19of91submissions,21%Overall Acceptance Rate149of789submissions,19%

      Upcoming Conference

      CODASPY '24

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader