Skip to main content

Scalable Distributed Two-Layer Datastore Providing Data Anonymity

  • Conference paper
  • First Online:
Beyond Databases, Architectures and Structures. Advanced Technologies for Data Mining and Knowledge Discovery (BDAS 2015, BDAS 2016)

Abstract

Storing data in a public data systems (mostly in the Cloud) can lead to many considerations about the data privacy. Are our data completely safe? Inspired by these considerations the author started to develop efficient framework which can be used to improve data privacy while storing them in public data storages. The Scalable Distributed Two-Layer Datastore was used as a base for the framework because it proved to be very efficient solution to store huge data sets.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. BitTorrent: BitTorrent. http://www.bittorrent.org/. Accessed 03 Mar 2015

  2. Burrows, M.: The chubby lock service for loosely-coupled distributed systems. In: Proceedings of the 7th Symposium on Operating Systems Design and Implementation, pp. 335–350. USENIX Association (2006)

    Google Scholar 

  3. Chang, F., Dean, J., Ghemawat, S., Hsieh, W.C., Wallach, D.A., Burrows, M., Chandra, T., Fikes, A., Gruber, R.E.: Bigtable: a distributed storage system for structured data. ACM Trans. Comput. Syst. (TOCS) 26(2), 4 (2008)

    Article  Google Scholar 

  4. DeCandia, G., Hastorun, D., Jampani, M., Kakulapati, G., Lakshman, A., Pilchin, A., Sivasubramanian, S., Vosshall, P., Vogels, W.: Dynamo: amazon’s highly available key-value store. ACM SIGOPS Operating Syst. Rev. 41, 205–220 (2007). ACM

    Article  Google Scholar 

  5. Duke, A.: 5 Things to know about the celebrity nude photo hacking scandal. http://edition.cnn.com/2014/09/02/showbiz/hacked-nude-photos-five-things/. Accessed 03 Mar 2015

  6. Goh, E.J., Shacham, H., Modadugu, N., Boneh, D.: SiRiUS: Securing remote untrusted storage. In: NDSS, vol. 3, pp. 131–145 (2003)

    Google Scholar 

  7. Goldschlag, D., Reed, M., Syverson, P.: Onion routing. Commun. ACM 42(2), 39–41 (1999)

    Article  Google Scholar 

  8. Jiang, Z., Zheng, Y., Shi, Y.: Document-oriented database-based privacy data protection architecture. In: 2013 10th Web Information System and Application Conference (WISA), pp. 19–22. IEEE (2013)

    Google Scholar 

  9. Krechowicz, A., Chrobot, A., Deniziak, S., Łukawski, G.: Sd2ds-based datastore for large files. In: Federated Conference on Software Development and Object Technologies (2015, accepted for publication)

    Google Scholar 

  10. Krechowicz, A., Deniziak, S., Bedla, M., Arkadiusz, C., Grzegorz, L.: Scalable distributed two-layer block based datastore. In: Parallel Processing and Applied Mathematics (2015, accepted for publication)

    Google Scholar 

  11. Krechowicz, A., Deniziak, S., Łukawski, G., Bedla, M.: Preserving data consistency in scalable distributed two layer data structures. In: Kozielski, S., Mrozek, D., Kasprowski, P., Kostrzewa, D., Małysiak-Mrozek, B. (eds.) BDAS 2015. CCIS, vol. 521, pp. 126–135. Springer International Publishing, Switzerland (2015). http://dx.doi.org/10.1007/978-3-319-18422-7_11

    Google Scholar 

  12. Lenard, T.M., Rubin, P.H.: The big data revolution: privacy considerations (2013)

    Google Scholar 

  13. Mazurek, M.: Applying NoSQL databases for operationalizing clinical data mining models. In: Kozielski, S., Mrozek, D., Kasprowski, P., Małysiak-Mrozek, B., Kostrzewa, D. (eds.) BDAS 2014. CCIS, vol. 424, pp. 527–536. Springer, Heidelberg (2014). http://dx.doi.org/10.1007/978-3-319-06932-6_51

    Chapter  Google Scholar 

  14. Minkus, T., Ross, K.W.: I know what you’re buying: privacy breaches on eBay. In: Cristofaro, E., Murdoch, S.J. (eds.) PETS 2014. LNCS, vol. 8555, pp. 164–183. Springer, Heidelberg (2014)

    Google Scholar 

  15. Okman, L., Gal-Oz, N., Gonen, Y., Gudes, E., Abramov, J.: Security issues in NoSQL databases. In: 2011 IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), pp. 541–547. IEEE (2011)

    Google Scholar 

  16. Pouwelse, J.A., Garbacki, P., Wang, J., Bakker, A., Yang, J., Iosup, A., Epema, D.H., Reinders, M., Van Steen, M.R., Sips, H.J.: TRIBLER: a social-based peer-to-peer system. Concurrency Comput. Pract. Experience 20(2), 127–138 (2008)

    Article  Google Scholar 

  17. Reed, M.G., Syverson, P.F., Goldschlag, D.M.: Anonymous connections and onion routing. IEEE J. Sel. Areas Commun. 16(4), 482–494 (1998)

    Article  Google Scholar 

  18. Renaud, K., Volkamer, M., Renkema-Padmos, A.: Why doesn’t jane protect her privacy? In: Murdoch, S.J., Cristofaro, E. (eds.) PETS 2014. LNCS, vol. 8555, pp. 244–262. Springer, Heidelberg (2014)

    Google Scholar 

  19. Richelson, J.T.: The Snowden Affair. Web Resource Documents the Latest Firestorm over the National Security Agency. http://www2.gwu.edu/~nsarchiv/NSAEBB/NSAEBB436/. Accessed 03 Mar 2015

  20. Rowstron, A., Druschel, P.: Pastry: scalable, decentralized object location, and routing for large-scale peer-to-peer systems. In: Guerraoui, R. (ed.) Middleware 2001. LNCS, vol. 2218, pp. 329–350. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  21. Sapiecha, K., Lukawski, G., Krechowicz, A.: Enhancing throughput of scalable distributed two-layer data structures. In: 2014 IEEE 13th International Symposium on Parallel and Distributed Computing (ISPDC), pp. 103–110. IEEE (2014)

    Google Scholar 

  22. Takabi, H., Joshi, J.B., Ahn, G.J.: Security and privacy challenges in cloud computing environments. IEEE Secur. Priv. 8(6), 24–31 (2010)

    Article  Google Scholar 

  23. Tor: Tor project. https://www.torproject.org/. Accessed 03 Mar 2015

  24. Zarandioon, S., Yao, D.D., Ganapathy, V.: K2C: cryptographic cloud storage with lazy revocation and anonymous access. In: Rajarajan, M., Piper, F., Wang, H., Kesidis, G. (eds.) SecureComm 2011. LNICST, vol. 96, pp. 59–76. Springer, Heidelberg (2012)

    Chapter  Google Scholar 

  25. Zhao, B.Y., Kubiatowicz, J., Joseph, A.D., et al.: Tapestry: an infrastructure for fault-tolerant wide-area location and routing (2001)

    Google Scholar 

  26. Zhi-hua, Z., Jian-jun, L., Wei, J., Yong, Z., Bei, G.: An new anonymous authentication scheme for cloud computing. In: 2012 7th International Conference on Computer Science and Education (ICCSE), pp. 896–898. IEEE (2012)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Adam Krechowicz .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing Switzerland

About this paper

Cite this paper

Krechowicz, A. (2016). Scalable Distributed Two-Layer Datastore Providing Data Anonymity. In: Kozielski, S., Mrozek, D., Kasprowski, P., Małysiak-Mrozek, B., Kostrzewa, D. (eds) Beyond Databases, Architectures and Structures. Advanced Technologies for Data Mining and Knowledge Discovery. BDAS BDAS 2015 2016. Communications in Computer and Information Science, vol 613. Springer, Cham. https://doi.org/10.1007/978-3-319-34099-9_20

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-34099-9_20

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-34098-2

  • Online ISBN: 978-3-319-34099-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics