Privacy-preserving Data Sharing in Portable Clouds

Clemens Zeidler, Muhammad Rizwan Asghar

Abstract

Cloud storage is a cheap and reliable solution for users to share data with their contacts. However, the lack of standardisation and migration tools makes it difficult for users to migrate to another Cloud Service Provider (CSP) without losing contacts, thus resulting in a vendor lock-in problem. In this work, we aim at providing a generic framework, named PortableCloud, that is flexible enough to enable users to migrate seamlessly to a different CSP keeping all their data and contacts. To preserve privacy of users, the data in the portable cloud is concealed from the CSP by employing encryption techniques. Moreover, we introduce a migration agent that assists users in automatically finding a suitable CSP that can satisfy their needs.

References

  1. Armbrust, M., Fox, A., Griffith, R., Joseph, A. D., Katz, R., Konwinski, A., Lee, G., Patterson, D., Rabkin, A., Stoica, I., and Zaharia, M. (2010). A view of cloud computing. Commun. ACM, 53(4):50-58.
  2. Asghar, M. R. (2013). Privacy Preserving Enforcement of Sensitive Policies in Outsourced and Distributed Environments. PhD thesis, University of Trento.
  3. Asghar, M. R., Ion, M., Russello, G., and Crispo, B. (2012). Securing data provenance in the cloud. In Open Problems in Network Security, volume 7039 of Lecture Notes in CS, pages 145-160.
  4. Asghar, M. R., Russello, G., Crispo, B., and Ion, M. (2013). Supporting complex queries and access policies for multi-user encrypted databases. CCSW 7813, pages 77-88.
  5. Bessani, A., Correia, M., Quaresma, B., André, F., and Sousa, P. (2011). Depsky: Dependable and secure storage in a cloud-of-clouds. EuroSys 7811, pages 31- 46.
  6. Burr, W. E., Nazario, N. A., and Polk, W. T. (1996). A proposed federal PKI using X.509 v3 certificates. NIST.
  7. Butoi, A. and Tomai, N. (2014). Secret sharing scheme for data confidentiality preserving in a public-private hybrid cloud storage approach. UCC'14, pages 992- 997.
  8. De Capitani di Vimercati, S., Foresti, S., Jajodia, S., Paraboschi, S., Pelosi, G., and Samarati, P. (2008). Preserving confidentiality of security policies in data outsourcing. WPES 7808, pages 75-84.
  9. De Chaves, S., Uriarte, R., and Westphall, C. (2011). Toward an architecture for monitoring private clouds. Communications Magazine, IEEE, 49(12):130-137.
  10. Ferretti, L., Colajanni, M., and Marchetti, M. (2014). Distributed, concurrent, and independent access to encrypted cloud databases. Parallel and Distributed Systems, 25(2):437-446.
  11. Garfinkel, S. (1995). PGP: pretty good privacy.
  12. Goldreich, O. and Ostrovsky, R. (1996). Software protection and simulation on oblivious rams. J. ACM, 43(3):431-473.
  13. Hacigümüs¸, H., Iyer, B., and Mehrotra, S. (2004). Ensuring the integrity of encrypted databases in the databaseas-a-service model. In Data and Applications Security 17, volume 142, pages 61-74.
  14. Joint, A., Baker, E., and Eccles, E. (2009). Hey, you, get off of that cloud? Computer Law & Security Review, 25(3):270 - 274.
  15. Josefsson, S. (2011). PKCS# 5: Password-Based Key Derivation Function 2 (PBKDF2) test vectors. Technical report.
  16. Khajeh-Hosseini, A., Sommerville, I., Bogaerts, J., and Teregowda, P. (2011). Decision support tools for cloud migration in the enterprise. In Cloud Computing (CLOUD), pages 541-548.
  17. Khan, S. and Hamlen, K. (2012). Anonymouscloud: A data ownership privacy provider framework in cloud computing. In Trust, Security and Privacy in Computing and Communications (TrustCom), pages 170-176.
  18. Liu, X., Zhang, Y., Wang, B., and Yan, J. (2013). Mona: Secure multi-owner data sharing for dynamic groups in the cloud. Parallel and Distributed Systems, 24(6):1182-1191.
  19. Menzel, M. and Ranjan, R. (2012). CloudGenius: Decision support for web server cloud migration. WWW 7812, pages 979-988.
  20. Ng, W. S., Ooi, B. C., Tan, K.-L., and Zhou, A. (2003). PeerDB: A P2P-based system for distributed data sharing. In Data Engineering, pages 633-644.
  21. Sandhu, R. S., Coyne, E. J., Feinstein, H. L., and Youman, C. E. (1996). Role-based access control models. Computer, 29(2):38-47.
  22. Satzger, B., Hummer, W., Inzinger, C., Leitner, P., and Dustdar, S. (2013). Winds of change: From vendor lock-in to the meta cloud. IEEE Internet Computing, 17(1):69-73.
  23. Stefanov, E., van Dijk, M., Shi, E., Fletcher, C., Ren, L., Yu, X., and Devadas, S. (2013). Path ORAM: An extremely simple oblivious ram protocol. CCS 7813, pages 299-310.
  24. Takabi, H., Joshi, J. B., and Ahn, G.-J. (2010). Security and privacy challenges in cloud computing environments. Security & Privacy, 8(6):24-31.
  25. Wang, G., Liu, Q., Wu, J., and Guo, M. (2011). Hierarchical attribute-based encryption and scalable user revocation for sharing data in cloud servers. Computers & Security, 30(5):320 - 331.
  26. Ward, C., Aravamudan, N., Bhattacharya, K., Cheng, K., Filepp, R., Kearney, R., Peterson, B., Shwartz, L., and Young, C. (2010). Workload migration into clouds challenges, experiences, opportunities. In Cloud Computing (CLOUD), pages 164-171.
  27. Zarandioon, S., Yao, D., and Ganapathy, V. (2012). K2C: Cryptographic cloud storage with lazy revocation and anonymous access. In Security and Privacy in Communication Networks, volume 96, pages 59-76.
  28. Zhao, G., Rong, C., Li, J., Zhang, F., and Tang, Y. (2010). Trusted data sharing over untrusted cloud storage providers. In Cloud Computing Technology and Science (CloudCom), pages 97-103.
  29. Zhao, J.-F. and Zhou, J.-T. (2014). Strategies and methods for cloud migration. International Journal of Automation and Computing, 11(2):143-152.
Download


Paper Citation


in Harvard Style

Zeidler C. and Asghar M. (2016). Privacy-preserving Data Sharing in Portable Clouds . In Proceedings of the 6th International Conference on Cloud Computing and Services Science - Volume 2: CLOSER, ISBN 978-989-758-182-3, pages 274-281. DOI: 10.5220/0005863602740281


in Bibtex Style

@conference{closer16,
author={Clemens Zeidler and Muhammad Rizwan Asghar},
title={Privacy-preserving Data Sharing in Portable Clouds},
booktitle={Proceedings of the 6th International Conference on Cloud Computing and Services Science - Volume 2: CLOSER,},
year={2016},
pages={274-281},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0005863602740281},
isbn={978-989-758-182-3},
}


in EndNote Style

TY - CONF
JO - Proceedings of the 6th International Conference on Cloud Computing and Services Science - Volume 2: CLOSER,
TI - Privacy-preserving Data Sharing in Portable Clouds
SN - 978-989-758-182-3
AU - Zeidler C.
AU - Asghar M.
PY - 2016
SP - 274
EP - 281
DO - 10.5220/0005863602740281