作者: Xiaoguang Wang , Qi Yong , Yuehua Dai , Jianbao Ren , Zhang Hang
DOI: 10.1109/HPCC.AND.EUC.2013.128
关键词:
摘要: The lack of remote data access control capability and the loss trail make owners hesitate when they have to outsource their sensitive third party platform. no choice but trust software before ship environment. In this paper we propose a new set guiding principles for protecting outsourced with owner specified policy. Compared traditional mechanism equipped by service providers, which can be regarded as first layer confinement, aim provide second confinement on propagation without modifying existing data-access applications. This is achieved two critical techniques: (1) policy-carrying model that binds customer logical policy, (2) application running environment acts verifier controller. To demonstrate feasibility approach, build (LDPAC) system, in human-readable policy abstract provided formulate access. When shipped provider, per-node LDPAC module conducts proof checking mediate Meanwhile, authorized intends forced run an container, order prevent leakage through in-memory breaches. Our evaluation shows system adds reasonable performance overhead mediation, while preserving original deployment.