DocumentCode :
2361211
Title :
On monitoring information flow of outsourced data
Author :
Kayem, Anne V D M
Author_Institution :
Dept. of Comput. Sci., Univ. of Cape Town, Rondebosch, South Africa
fYear :
2010
fDate :
2-4 Aug. 2010
Firstpage :
1
Lastpage :
8
Abstract :
Data outsourcing is an Internet-based paradigm that allows organizations to share data cost-effectively by transferring data to a third-party service provider for management. Enforcing outsourced data privacy in untrustworthy environments is challenging because the data needs to be kept secret both from unauthorized users and the service provider (SP). Existing approaches propose that the data owner(s) encrypt the data before it is transferred to the service provider to preserve confidentiality. Access is only granted to a user initiated program if the key presented can decrypt the data into a readable format. Therefore the data owner can control access to the data without having to worry about the management costs. However, this approach fails to monitor the data once it has been retrieved from the SP´s end. So, a user can retrieve information from the SP´s end and share it with unauthorized users or even the SP. We propose a conceptual framework, based on the concept of dependence graphs, for monitoring data exchanges between programs in order to prevent unauthorized access. The framework has a distributed architecture which is suitable for data outsourcing environments and the web in general. Each data object contains a cryptographic tag (like an invisible digital watermark) that is computed by using a cryptographic hash function to combine the checksum of the data and the encryption key. In order to execute an operation with a data object the key presented for decryption must match the one associated with the user´s role and generate a cryptographic tag that matches the one embedded into the data. Tracing data exchanges, in this way, can leverage data privacy for organizations that transfer data management to third party service providers.
Keywords :
Internet; cryptography; data privacy; electronic data interchange; information retrieval; outsourcing; Internet based paradigm; cryptographic hash function; cryptographic tag; data decryption; data encryption; data exchange; data management; data monitoring; data outsourcing; data privacy; dependence graph; distributed architecture; information retrieve; management cost; monitoring information flow; outsourced data privacy; service provider; unauthorized user; untrustworthy environment; Access control; Cryptography; Data privacy; Monitoring; Organizations; Service oriented architecture;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Information Security for South Africa (ISSA), 2010
Conference_Location :
Sandton, Johannesburg
Print_ISBN :
978-1-4244-5493-8
Type :
conf
DOI :
10.1109/ISSA.2010.5588602
Filename :
5588602
Link To Document :
بازگشت