[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/1871929.1871934acmconferencesArticle/Chapter ViewAbstractPublication PagescikmConference Proceedingsconference-collections
research-article

Towards a data-centric view of cloud security

Published: 30 October 2010 Publication History

Abstract

Cloud security issues have recently gained traction in the research community, with much of the focus primarily concentrated on securing the operating systems and virtual machines on which the services are deployed. In this paper, we take an alternative perspective and propose a data-centric view of cloud security. In particular, we explore the security properties of secure data sharing between applications hosted in the cloud. We discuss data management challenges in the areas of secure distributed query processing, system analysis and forensics, and query correctness assurance, and describe our current efforts towards meeting these challenges using our Declarative Secure Distributed Systems (DS2) platform.

References

[1]
DS2: Declarative Secure Distributed Systems. http://netdb.cis.upenn.edu/ds2/.
[2]
Stanford WebBase. http://diglib.stanford.edu:8091/~testbed/doc2/WebBase/.
[3]
M. Abadi. Logic in Access Control. In Proc. LICS, 2003.
[4]
P. Alvaro, T. Condie, N. Conway, K. Elmeleegy, J. Hellerstein, and R. Sears. BOOM Analytics: Exploring Data-Centric, Declarative Programming for the Cloud. In Proc. EuroSys, 2010.
[5]
The Appleseed Project. http://opensource.appleseedproject.org/.
[6]
N. Bilton. Price of Facebook Privacy? Start Clicking. The New York Times, 12 May 2010.
[7]
P. Buneman, S. Khanna, and W. C. Tan. Why and where: A characterization of data provenance. In Proc. ICDT, 2001.
[8]
M. Christodorescu, R. Sailer, D. L. Schales, D. Sgandurra, and D. Zamboni. Cloud Security is not (just) Virtualization Security. In Proc. CCSW, 2009.
[9]
T. Condie, D. Chu, J. M. Hellerstein, and P. Maniatis. Evita raced: Metacompilation for declarative networks. In Proc. VLDB, 2008.
[10]
J. Dean and S. Ghemawat. Mapreduce: Simplified data processing on large clusters. In Proc. OSDI, 2004.
[11]
J. DeTreville. Binder: A logic-based security language. In Proc. IEEE S&P, 2002.
[12]
Diaspora*. http://www.joindiaspora.com.
[13]
J. Dwyer. Four Nerds and a Cry to Arms Against Facebook. The New York Times, 11 May 2010.
[14]
M. H. Feifei Li and G. Kollios. Dynamic authenticated index structures for outsourced databases. In Proc. SIGMOD, 2006.
[15]
T. J. Green, G. Karvounarakis, Z. G. Ives, and V. Tannen. Update exchange with mappings and provenance. In Proc. VLDB, 2007.
[16]
T. J. Green, G. Karvounarakis, and V. Tannen. Provenance semirings. In Proc. PODS, 2007.
[17]
T. J. Green, G. Karvounarakis, N. E. Taylor, O. Biton, Z. G. Ives, and V. Tannen. ORCHESTRA: Facilitating Collaborative Data Sharing. In Proc. SIGMOD, 2007.
[18]
A. Haeberlen, P. Kuznetsov, and P. Druschel. PeerReview: Practical Accountability for Distributed Systems. In Proc. SOSP, 2007.
[19]
R. Hasan, R. Sion, and M. Winslett. The case of the fake picasso: Preventing history forgery with secure provenance. In Proc. FAST, 2009.
[20]
R. Huebsch, J. M. Hellerstein, N. Lanham, B. T. Loo, S. Shenker, and I. Stoica. Querying the Internet with PIER. In Proc. VLDB, 2003.
[21]
Z. Ives, N. Khandelwal, A. Kapur, and M. Cakir. Orchestra: Rapid, collaborative sharing of dynamic data. In Proc. CIDR, 2005.
[22]
M. Jensen, J. Schwenk, N. Gruschka, and L. L. Iacono. On Technical Security Issues in Cloud Computing. In Proc. CLOUD, 2009.
[23]
G. Karvounarakis, Z. G. Ives, and V. Tannen. Querying data provenance. In Proc. SIGMOD, 2010.
[24]
B. Lampson, M. Abadi, M. Burrows, and E. Wobber. Authentication in Distributed Systems: Theory and Practice. ACM TOCS, 1992.
[25]
M. Liu, N. Taylor, W. Zhou, Z. Ives, and B. T. Loo. Recursive computation of regions and connectivity in networks. In Proc. ICDE, 2009.
[26]
B. T. Loo, T. Condie, J. M. Hellerstein, P. Maniatis, T. Roscoe, and I. Stoica. Implementing Declarative Overlays. In Proc. SOSP, 2005.
[27]
B. T. Loo, J. M. Hellerstein, I. Stoica, and R. Ramakrishnan. Declarative Routing: Extensible Routing with Declarative Queries. In Proc. SIGCOMM, 2005.
[28]
W. R. Marczak, S. S. Huang, M. Bravenboer, M. Sherr, B. T. Loo, and M. Aref. SecureBlox: Customizable Secure Distributed Data Processing. In Proc. SIGMOD, 2010.
[29]
W. R. Marczak, D. Zook, W. Zhou, M. Aref, and B. T. Loo. Declarative reconfigurable trust management. In Proc. CIDR, 2009.
[30]
R. C. Merkle. Secrecy, Authentication, and Public Key Systems. PhD thesis, Stanford University, 1979.
[31]
K. Mouratidis, D. Sacharidis, and H. Pang. Partially materialized digest scheme: an efficient verification method for outsourced databases. VLDB Journal, 2009.
[32]
S. C. Muthukumar, X. Li, C. Liu, J. B. Kopena, M. Oprea, and B. T. Loo. Declarative toolkit for rapid network protocol simulation and experimentation. In SIGCOMM (demo), 2009.
[33]
E. Mykletun, M. Narasimha, and G. Tsudik. Authentication and integrity in outsourced databases. In Proc. NDSS, 2004.
[34]
D. Nurmi, R. Wolski, C. Grzegorczyk, G. Obertelli, S. Soman, L. Youseff, and D. Zagorodnov. The Eucalyptus Open-Source Cloud-Computing System. In Proc. CCGRID, 2009.
[35]
H. Pang and K.-L. Tan. Verifying Completeness of Relational Query Answers from Online Servers. ACM TISSEC, 2008.
[36]
R. Perez, L. van Doorn, and R. Sailer. Virtualization and Hardware-Based Security. In Proc. IEEE S&P, 2008.
[37]
H. Raj, R. Nathuji, A. Singh, and P. England. Resource Management for Isolation Enhanced Cloud Services. In Proc. CCSW, 2009.
[38]
S. Rizvi, A. O. Mendelzon, S. Sudarshan, and P. Roy. Extending query rewriting techniques for fine-grained access control. In Proc. SIGMOD, 2004.
[39]
M. Sherr, A. Mao, W. R. Marczak, W. Zhou, B. T. Loo, and M. Blaze. A3: An Extensible Platform for Application-Aware Anonymity. In Proc. NDSS, 2010.
[40]
I. Stoica, R. Morris, D. Karger, M. F. Kaashoek, and H. Balakrishnan. Chord: A Scalable Peer-to-Peer Lookup Service for Internet Applications. In Proc. SIGCOMM, 2001.
[41]
J. Wei, X. Zhang, G. Ammons, V. Bala, and P. Ning. Managing Security of Virtual Machine Images in a Cloud Environment. In Proc. CCSW, 2009.
[42]
W. Zhou, Y. Mao, B. T. Loo, and M. Abadi. Unified Declarative Platform for Secure Networked Information Systems. In Proc. ICDE, 2009.
[43]
W. Zhou, M. Sherr, T. Tao, X. Li, B. T. Loo, and Y. Mao. Efficient querying and maintenance of network provenance at internet-scale. In Proc. SIGMOD, 2010.
[44]
M. Zuckerberg. From Facebook, Answering Privacy Concerns with New Settings. The Washington Post, 24 May 2010.

Cited By

View all
  • (2020)Communication Pattern Based Data Authentication (CPDA) Designed for Big Data Processing in a Multiple Public Cloud EnvironmentIEEE Access10.1109/ACCESS.2020.30009898(107716-107748)Online publication date: 2020
  • (2017)Enabling Data Sharing in Contextual EnvironmentsProceedings of the 22nd ACM on Symposium on Access Control Models and Technologies10.1145/3078861.3078876(231-238)Online publication date: 7-Jun-2017
  • (2017)Improving data sharing in data rich environments2017 IEEE International Conference on Big Data (Big Data)10.1109/BigData.2017.8258270(2998-3005)Online publication date: Dec-2017
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
CloudDB '10: Proceedings of the second international workshop on Cloud data management
October 2010
72 pages
ISBN:9781450303804
DOI:10.1145/1871929
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 30 October 2010

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. cloud security
  2. declarative networking
  3. secure data processing
  4. system analysis and forensics

Qualifiers

  • Research-article

Conference

CIKM '10

Acceptance Rates

Overall Acceptance Rate 12 of 17 submissions, 71%

Upcoming Conference

CIKM '25

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)9
  • Downloads (Last 6 weeks)1
Reflects downloads up to 12 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2020)Communication Pattern Based Data Authentication (CPDA) Designed for Big Data Processing in a Multiple Public Cloud EnvironmentIEEE Access10.1109/ACCESS.2020.30009898(107716-107748)Online publication date: 2020
  • (2017)Enabling Data Sharing in Contextual EnvironmentsProceedings of the 22nd ACM on Symposium on Access Control Models and Technologies10.1145/3078861.3078876(231-238)Online publication date: 7-Jun-2017
  • (2017)Improving data sharing in data rich environments2017 IEEE International Conference on Big Data (Big Data)10.1109/BigData.2017.8258270(2998-3005)Online publication date: Dec-2017
  • (2016)Two Factor Authentication Using M-Pin Server for Secure Cloud Computing EnvironmentWeb-Based Services10.4018/978-1-4666-9466-8.ch046(1053-1066)Online publication date: 2016
  • (2016)Time synchronizationSecurity and Communication Networks10.1002/sec.10569:6(571-582)Online publication date: 1-Apr-2016
  • (2015)Secure the CloudACM Computing Surveys10.1145/269384147:3(1-30)Online publication date: 17-Feb-2015
  • (2015)Enhancing Cloud Security and PrivacyProceedings of the 2015 IEEE Trustcom/BigDataSE/ISPA - Volume 0110.1109/Trustcom.2015.487(1088-1093)Online publication date: 20-Aug-2015
  • (2014)Two Factor Authentication using M-pin Server for Secure Cloud Computing EnvironmentInternational Journal of Cloud Applications and Computing10.4018/ijcac.20141001044:4(42-54)Online publication date: 1-Oct-2014
  • (2014)A Security Risk Assessment Model for Business Process Deployment in the CloudProceedings of the 2014 IEEE International Conference on Services Computing10.1109/SCC.2014.48(307-314)Online publication date: 27-Jun-2014
  • (2013)Data security in cloud computing2013 International Conference on Green Computing, Communication and Conservation of Energy (ICGCE)10.1109/ICGCE.2013.6823547(822-827)Online publication date: Dec-2013
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media