Adaptive data management for self-protecting objects in cloud computing systems

作者: Elisa Bertino , Giuseppe Petracca , Anna Cinzia Squicciarini

DOI: 10.5555/2499406.2499423

关键词:

摘要: While Cloud data services are a growing successful business and computing paradigm, privacy security major concerns. One critical problem is to ensure that owners' policies honored, regardless of where the physically stored how often it accessed, modified. This scenario calls for an important requirement be satisfied. Data should managed in accordance preferences, providers service agreements, local regulations may apply. In this work we propose innovative policy enforcement techniques adaptive sharing users' outsourced data. We introduce notion autonomous security-aware objects, by means object-oriented programming techniques, encapsulate sensitive resources assure their protection. Our evaluation demonstrates our approach effective.

参考文章(13)
Mark Lillibridge, Sameh Elnikety, Andrew Birrell, Mike Burrows, Michael Isard, None, A cooperative internet backup scheme usenix annual technical conference. pp. 3- 3 ,(2003)
Henrich C. Pöhls, Verifiable and Revocable Expression of Consent to Processing of Aggregated Personal Data international conference on information and communication security. pp. 279- 293 ,(2008) , 10.1007/978-3-540-88625-9_19
Qian Wang, Cong Wang, Jin Li, Kui Ren, Wenjing Lou, Enabling public verifiability and data dynamics for storage security in cloud computing european symposium on research in computer security. pp. 355- 370 ,(2009) , 10.1007/978-3-642-04444-1_22
John W. Holford, William J. Caelli, Anthony W. Rhodes, Using self-defending objects to develop security aware applications in Java™ ACSC '04 Proceedings of the 27th Australasian conference on Computer science - Volume 26. pp. 341- 349 ,(2004)
Qihua Wang, Hongxia Jin, Data leakage mitigation for discretionary access control in collaboration clouds Proceedings of the 16th ACM symposium on Access control models and technologies - SACMAT '11. pp. 103- 112 ,(2011) , 10.1145/1998441.1998457
Anna Squicciarini, Smitha Sundareswaran, Dan Lin, None, Preventing Information Leakage from Indexing in the Cloud 2010 IEEE 3rd International Conference on Cloud Computing. pp. 188- 195 ,(2010) , 10.1109/CLOUD.2010.82
Elisa Bertino, Piero Andrea Bonatti, Elena Ferrari, TRBAC ACM Transactions on Information and System Security. ,vol. 4, pp. 191- 233 ,(2001) , 10.1145/501978.501979
Giuseppe Ateniese, Randal Burns, Reza Curtmola, Joseph Herring, Lea Kissner, Zachary Peterson, Dawn Song, Provable data possession at untrusted stores computer and communications security. pp. 598- 609 ,(2007) , 10.1145/1315245.1315318
Smitha Sundareswaran, Anna Squicciarini, Dan Lin, Shuo Huang, Promoting Distributed Accountability in the Cloud 2011 IEEE 4th International Conference on Cloud Computing. pp. 113- 120 ,(2011) , 10.1109/CLOUD.2011.57
T.S.J. Schwarz, E.L. Miller, Store, Forget, and Check: Using Algebraic Signatures to Check Remotely Administered Storage international conference on distributed computing systems. ,vol. 26, pp. 12- 12 ,(2006) , 10.1109/ICDCS.2006.80