Abstract
Storing data in a public data systems (mostly in the Cloud) can lead to many considerations about the data privacy. Are our data completely safe? Inspired by these considerations the author started to develop efficient framework which can be used to improve data privacy while storing them in public data storages. The Scalable Distributed Two-Layer Datastore was used as a base for the framework because it proved to be very efficient solution to store huge data sets.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
BitTorrent: BitTorrent. http://www.bittorrent.org/. Accessed 03 Mar 2015
Burrows, M.: The chubby lock service for loosely-coupled distributed systems. In: Proceedings of the 7th Symposium on Operating Systems Design and Implementation, pp. 335–350. USENIX Association (2006)
Chang, F., Dean, J., Ghemawat, S., Hsieh, W.C., Wallach, D.A., Burrows, M., Chandra, T., Fikes, A., Gruber, R.E.: Bigtable: a distributed storage system for structured data. ACM Trans. Comput. Syst. (TOCS) 26(2), 4 (2008)
DeCandia, G., Hastorun, D., Jampani, M., Kakulapati, G., Lakshman, A., Pilchin, A., Sivasubramanian, S., Vosshall, P., Vogels, W.: Dynamo: amazon’s highly available key-value store. ACM SIGOPS Operating Syst. Rev. 41, 205–220 (2007). ACM
Duke, A.: 5 Things to know about the celebrity nude photo hacking scandal. http://edition.cnn.com/2014/09/02/showbiz/hacked-nude-photos-five-things/. Accessed 03 Mar 2015
Goh, E.J., Shacham, H., Modadugu, N., Boneh, D.: SiRiUS: Securing remote untrusted storage. In: NDSS, vol. 3, pp. 131–145 (2003)
Goldschlag, D., Reed, M., Syverson, P.: Onion routing. Commun. ACM 42(2), 39–41 (1999)
Jiang, Z., Zheng, Y., Shi, Y.: Document-oriented database-based privacy data protection architecture. In: 2013 10th Web Information System and Application Conference (WISA), pp. 19–22. IEEE (2013)
Krechowicz, A., Chrobot, A., Deniziak, S., Łukawski, G.: Sd2ds-based datastore for large files. In: Federated Conference on Software Development and Object Technologies (2015, accepted for publication)
Krechowicz, A., Deniziak, S., Bedla, M., Arkadiusz, C., Grzegorz, L.: Scalable distributed two-layer block based datastore. In: Parallel Processing and Applied Mathematics (2015, accepted for publication)
Krechowicz, A., Deniziak, S., Łukawski, G., Bedla, M.: Preserving data consistency in scalable distributed two layer data structures. In: Kozielski, S., Mrozek, D., Kasprowski, P., Kostrzewa, D., Małysiak-Mrozek, B. (eds.) BDAS 2015. CCIS, vol. 521, pp. 126–135. Springer International Publishing, Switzerland (2015). http://dx.doi.org/10.1007/978-3-319-18422-7_11
Lenard, T.M., Rubin, P.H.: The big data revolution: privacy considerations (2013)
Mazurek, M.: Applying NoSQL databases for operationalizing clinical data mining models. In: Kozielski, S., Mrozek, D., Kasprowski, P., Małysiak-Mrozek, B., Kostrzewa, D. (eds.) BDAS 2014. CCIS, vol. 424, pp. 527–536. Springer, Heidelberg (2014). http://dx.doi.org/10.1007/978-3-319-06932-6_51
Minkus, T., Ross, K.W.: I know what you’re buying: privacy breaches on eBay. In: Cristofaro, E., Murdoch, S.J. (eds.) PETS 2014. LNCS, vol. 8555, pp. 164–183. Springer, Heidelberg (2014)
Okman, L., Gal-Oz, N., Gonen, Y., Gudes, E., Abramov, J.: Security issues in NoSQL databases. In: 2011 IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), pp. 541–547. IEEE (2011)
Pouwelse, J.A., Garbacki, P., Wang, J., Bakker, A., Yang, J., Iosup, A., Epema, D.H., Reinders, M., Van Steen, M.R., Sips, H.J.: TRIBLER: a social-based peer-to-peer system. Concurrency Comput. Pract. Experience 20(2), 127–138 (2008)
Reed, M.G., Syverson, P.F., Goldschlag, D.M.: Anonymous connections and onion routing. IEEE J. Sel. Areas Commun. 16(4), 482–494 (1998)
Renaud, K., Volkamer, M., Renkema-Padmos, A.: Why doesn’t jane protect her privacy? In: Murdoch, S.J., Cristofaro, E. (eds.) PETS 2014. LNCS, vol. 8555, pp. 244–262. Springer, Heidelberg (2014)
Richelson, J.T.: The Snowden Affair. Web Resource Documents the Latest Firestorm over the National Security Agency. http://www2.gwu.edu/~nsarchiv/NSAEBB/NSAEBB436/. Accessed 03 Mar 2015
Rowstron, A., Druschel, P.: Pastry: scalable, decentralized object location, and routing for large-scale peer-to-peer systems. In: Guerraoui, R. (ed.) Middleware 2001. LNCS, vol. 2218, pp. 329–350. Springer, Heidelberg (2001)
Sapiecha, K., Lukawski, G., Krechowicz, A.: Enhancing throughput of scalable distributed two-layer data structures. In: 2014 IEEE 13th International Symposium on Parallel and Distributed Computing (ISPDC), pp. 103–110. IEEE (2014)
Takabi, H., Joshi, J.B., Ahn, G.J.: Security and privacy challenges in cloud computing environments. IEEE Secur. Priv. 8(6), 24–31 (2010)
Tor: Tor project. https://www.torproject.org/. Accessed 03 Mar 2015
Zarandioon, S., Yao, D.D., Ganapathy, V.: K2C: cryptographic cloud storage with lazy revocation and anonymous access. In: Rajarajan, M., Piper, F., Wang, H., Kesidis, G. (eds.) SecureComm 2011. LNICST, vol. 96, pp. 59–76. Springer, Heidelberg (2012)
Zhao, B.Y., Kubiatowicz, J., Joseph, A.D., et al.: Tapestry: an infrastructure for fault-tolerant wide-area location and routing (2001)
Zhi-hua, Z., Jian-jun, L., Wei, J., Yong, Z., Bei, G.: An new anonymous authentication scheme for cloud computing. In: 2012 7th International Conference on Computer Science and Education (ICCSE), pp. 896–898. IEEE (2012)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer International Publishing Switzerland
About this paper
Cite this paper
Krechowicz, A. (2016). Scalable Distributed Two-Layer Datastore Providing Data Anonymity. In: Kozielski, S., Mrozek, D., Kasprowski, P., Małysiak-Mrozek, B., Kostrzewa, D. (eds) Beyond Databases, Architectures and Structures. Advanced Technologies for Data Mining and Knowledge Discovery. BDAS BDAS 2015 2016. Communications in Computer and Information Science, vol 613. Springer, Cham. https://doi.org/10.1007/978-3-319-34099-9_20
Download citation
DOI: https://doi.org/10.1007/978-3-319-34099-9_20
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-34098-2
Online ISBN: 978-3-319-34099-9
eBook Packages: Computer ScienceComputer Science (R0)