I’ll Trust You – for Now

Martin Gilje Jaatun

2016

Abstract

The pervasiveness of cloud computing paired with big data analytics is fueling privacy fears among the more paranoid users. Cryptography-based solutions such as fully homomorphic encryption and secure multiparty computation are trying to address these fears, but still do not seem to be ready for prime time. This paper presents an alternative approach using encrypted cloud storage by one provider, supplemented by cloud processing of cleartext data on one or more different cloud providers.

References

  1. Adya, A., Bolosky, W. J., Castro, M., Cermak, G., Chaiken, R., Douceur, J. R., Jon, Howell, J., Lorch, J. R., Theimer, M., and Wattenhofer, R. P. (2002). FARSITE: Federated, Available, and Reliable Storage for an Incompletely Trusted Environment. In In Proceedings of the 5th Symposium on Operating Systems Design and Implementation (OSDI, pages 1-14.
  2. Bogdanov, D., Laur, S., and Willemson, J. (2008). Sharemind: a framework for fast privacy-preserving computations. Cryptology ePrint Archive, Report 2008/289. http://eprint.iacr.org/.
  3. Bogetoft, P., Christensen, D., Damga°rd, I., Geisler, M., Jakobsen, T., Krøigaard, M., Nielsen, J., Nielsen, J., Nielsen, K., Pagter, J., Schwartzbach, M., and Toft, T. (2009). Secure multiparty computation goes live. In Dingledine, R. and Golle, P., editors, Financial Cryptography and Data Security, volume 5628 of Lecture Notes in Computer Science, pages 325-343. Springer Berlin / Heidelberg. 10.1007/978-3-642-03549-4 20.
  4. Chu, Z., Gianvecchio, S., Wang, H., and Jajodia, S. (2010). Who is tweeting on twitter: Human, bot, or cyborg? In Proceedings of the 26th Annual Computer Security Applications Conference, ACSAC 7810, pages 21-30, New York, NY, USA. ACM.
  5. Dent, A. W. (2010). Choosing key sizes for cryptography. Inf. Secur. Tech. Rep., 15(1):21-27.
  6. Ferguson, N. and Schneier, B. (2003). Practical Cryptography. John Wiley & Sons, Inc., New York, NY, USA, 1 edition.
  7. Gentry, C. (2009). Fully homomorphic encryption using ideal lattices. In Proceedings of the 41st annual ACM symposium on Theory of Computing, pages 169-178. ACM.
  8. Heller, J. (1961). Catch-22. Simon & Schuster.
  9. Jaatun, M. G., Nyre, A°. A., Tøndel, I. A., and Bernsmed, K. (2012a). Privacy Enhancing Technologies for Information Control. In Yee, G. M., editor, Privacy Protection Measures and Technologies in Business Organizations: Aspects and Standards.
  10. Jaatun, M. G., Pearson, S., Gittler, F., and Leenes, R. (2014). Towards strong accountability for cloud service providers. In Cloud Computing Technology and Science (CloudCom), 2014 IEEE 6th International Conference on, pages 1001-1006.
  11. Jaatun, M. G., Zhao, G., Vasilakos, A., Nyre, A°. A., Alapnes, S., and Tang, Y. (2012b). The design of a redundant array of independent net-storages for improved confidentiality in cloud computing. Journal of Cloud Computing: Advances, Systems and Applications, 1(1):13.
  12. More, A. and Tapaswi, S. (2014). Virtual machine introspection: towards bridging the semantic gap. Journal of Cloud Computing, 3(1).
  13. Pearson, S. (2011). Toward accountability in the cloud. Internet Computing, IEEE, 15(4):64-69.
  14. Pearson, S. and Charlesworth, A. (2009). Accountability as a way forward for privacy protection in the cloud. In Cloud Computing, pages 131-144.
  15. Rhea, S., Eaton, P., Geels, D., Weatherspoon, H., Zhao, B., and Kubiatowicz, J. (2003). Pond: the OceanStore Prototype. In Proceedings of the 2nd USENIX Conference on File and Storage Technologies (FAST 7803).
  16. Rivest, R. L. (1998). Chaffing and winnowing: Confidentiality without encryption. CryptoBytes (RSA laboratories), 4(1):12-17.
  17. Rong, C., Nguyen, S. T., and Jaatun, M. G. (2013). Beyond lightning: A survey on security challenges in cloud computing. Computers & Electrical Engineering, 39(1).
  18. Storer, M. W., Greenan, K. M., Miller, E. L., and Voruganti, K. (2009). Potshards a secure, recoverable, long-term archival storage system. Trans. Storage, 5:5:1-5:35.
  19. Vivian (2015). Ads in gmail. https://support.google .com/- mail/answer/6603?hl=en.
Download


Paper Citation


in Harvard Style

Jaatun M. (2016). I’ll Trust You – for Now . In Proceedings of the International Conference on Internet of Things and Big Data - Volume 1: IoTBD, ISBN 978-989-758-183-0, pages 399-402. DOI: 10.5220/0005953903990402


in Bibtex Style

@conference{iotbd16,
author={Martin Gilje Jaatun},
title={I’ll Trust You – for Now},
booktitle={Proceedings of the International Conference on Internet of Things and Big Data - Volume 1: IoTBD,},
year={2016},
pages={399-402},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0005953903990402},
isbn={978-989-758-183-0},
}


in EndNote Style

TY - CONF
JO - Proceedings of the International Conference on Internet of Things and Big Data - Volume 1: IoTBD,
TI - I’ll Trust You – for Now
SN - 978-989-758-183-0
AU - Jaatun M.
PY - 2016
SP - 399
EP - 402
DO - 10.5220/0005953903990402