• DocumentCode
    688237
  • Title

    Protecting Outsourced Data Privacy with Lifelong Policy Carrying

  • Author

    Xiaoguang Wang ; Qi Yong ; Yuehua Dai ; Jianbao Ren ; Zhang Hang

  • Author_Institution
    Dept. of Comput. Sci., Xi´an Jiaotong Univ., Xi´an, China
  • fYear
    2013
  • fDate
    13-15 Nov. 2013
  • Firstpage
    896
  • Lastpage
    905
  • Abstract
    The lack of remote data access control capability and the loss of remote data access trail make data owners hesitate when they have to outsource their sensitive data to remote third party platform. The data owners have no choice but to trust the remote third party software before they ship their data to the remote environment. In this paper we propose a new set of guiding principles for protecting outsourced data with data owner specified policy. Compared with traditional access control mechanism equipped by service providers, which can be regarded as the first layer of confinement, we aim to provide data owner a second layer of confinement on data propagation and access without modifying existing data-access applications. This is achieved by two critical techniques: (1) a policy-carrying data model that binds customer data with logical data access policy, and (2) a remote application running environment which acts as data access verifier and propagation controller. To demonstrate the feasibility of this approach, we build the logical data propagation and access control (LDPAC) system, in which a human-readable policy abstract is provided to formulate data propagation and access. When policy-carrying data is shipped to remote service provider, the per-node LDPAC verifier module conducts the logical proof checking to mediate sensitive data access. Meanwhile, the authorized application which intends to access sensitive data is forced to run in an application container, in order to prevent sensitive data leakage through in-memory data breaches. Our evaluation shows that LDPAC system adds reasonable performance overhead for the remote sensitive data access and propagation mediation, while preserving the original service deployment.
  • Keywords
    data protection; information retrieval; outsourcing; theorem proving; trusted computing; LDPAC system; access control mechanism; data owner specified policy; human-readable policy abstract; in-memory data breaches; lifelong policy carrying; logical data propagation and access control system; logical proof checking; outsourced data privacy protection; per-node LDPAC verifier module; policy-carrying data; policy-carrying data model; remote data access control capability; remote sensitive data access and propagation mediation; remote service provider; remote third party platform; remote third party software; Access control; Containers; Data models; History; Servers; Software; access and propagation control; data outsourcing; data privacy; policy-carrying data model;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing (HPCC_EUC), 2013 IEEE 10th International Conference on
  • Conference_Location
    Zhangjiajie
  • Type

    conf

  • DOI
    10.1109/HPCC.and.EUC.2013.128
  • Filename
    6832010