Privacy as a Service: Privacy-Aware Data Storage and Processing in Cloud Computing Architectures

被引:103
作者
Itani, Wassim [1 ]
Kayssi, Ayman [1 ]
Chehab, Ali [1 ]
机构
[1] Amer Univ Beirut, Dept Elect & Comp Engn, Beirut 11072020, Lebanon
来源
EIGHTH IEEE INTERNATIONAL CONFERENCE ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING, PROCEEDINGS | 2009年
关键词
privacy; cloud computing; cryptographic coprocessors; security;
D O I
10.1109/DASC.2009.139
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In this paper we present PasS (Privacy as a Service); a set of security protocols for ensuring the privacy and legal compliance of customer data in cloud computing architectures. PasS allows for the secure storage and processing of users' confidential data by leveraging the tamper-proof capabilities of cryptographic coprocessors. Using tamper-proof facilities provides a secure execution domain in the computing cloud that is physically and logically protected from unauthorized access. PasS central design goal is to maximize users' control in managing the various aspects related to the privacy of sensitive data. This is achieved by implementing user-configurable software protection and data privacy mechanisms. Moreover, PasS provides a privacy feedback process which informs users of the different privacy operations applied on their data and makes them aware of any potential risks that may jeopardize the confidentiality of their sensitive information. To the best of our knowledge, PasS is the first practical cloud computing privacy solution that utilizes previous research on cryptographic coprocessors to solve the problem of securely processing sensitive data in cloud computing infrastructures.
引用
收藏
页码:711 / 716
页数:6
相关论文
共 23 条
  • [1] The IBM PCIXCC: A new cryptographic coprocessor for the IBM eServer
    Arnold, TW
    Van Doom, LP
    [J]. IBM JOURNAL OF RESEARCH AND DEVELOPMENT, 2004, 48 (3-4) : 475 - 487
  • [2] BEST R., 1980, Proceedings of the IEEE Spring Compcon, P466
  • [3] BHATTACHARJEE B, 2006, DAMON 06
  • [4] Diffie W., 1992, Designs, Codes and Cryptography, V2, P107, DOI 10.1007/BF00124891
  • [5] Building the IBM 4758 secure coprocessor
    Dyer, JG
    Lindemann, M
    Perez, R
    Sailer, R
    van Doorn, L
    Smith, SW
    Weingart, S
    [J]. COMPUTER, 2001, 34 (10) : 57 - +
  • [6] Garfinkel T., 2003, P 19 ACM S OP SYST P, P14, DOI 10.1145/945445.945464
  • [7] GELMANN R, 2009, WPF REPORT PRIVACY C
  • [8] Fully Homomorphic Encryption Using Ideal Lattices
    Gentry, Craig
    [J]. STOC'09: PROCEEDINGS OF THE 2009 ACM SYMPOSIUM ON THEORY OF COMPUTING, 2009, : 169 - 178
  • [9] GUILLOU LC, 1992, CONT CRYPTOLOGY SCI
  • [10] Gutmann P, 2000, USENIX ASSOCIATION PROCEEDINGS OF THE NINTH USENIX SECURITY SYMPOSIUM, P97