Privacy Preserving Cloud Transactions

  • Debmalya Biswas
  • Krishnamurthy Vidyasankar
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 7566)


Cloud computing as an outsourced data storage platform is becoming popular by the day with multiple service offerings by companies such as Amazon, Microsoft, among others. However to gain wide- spread enterprise level acceptance, cloud providers still need to address the following significant challenges: (a) Data confidentiality: Organizations do not trust cloud providers with their confidential data. One way of ensuring data confidentiality is of course to store data in encrypted form. This in turn requires that data be decrypted before each access. Further, decryption should be enabled only to authorized users. (b) Transactions: Consistent, concurrent and reliable access to data should be provided via transactions, as with traditional databases. (c) User confidentiality: It should be possible to keep the identity of the users executing transactions confidential from the ‘owners’ of data and vice versa.

In this work, we aim to integrate the above objectives providing transactional guarantees over encrypted outsourced data. More specifically, we propose concurrency control protocols for the different cloud sharing configurations, with different confidentiality requirements. Experimental results are given to validate the scalability of the proposed protocols.


Cloud Provider Abort Rate Data Owner Encrypt Data Cloud Computing Environment 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Weikum, G., Vossen, G.: Transactional Information Systems: Theory, Algorithms, and the Practice of Concurrency Control and Recovery. Morgan Kaufmann Publishers (2011)Google Scholar
  2. 2.
    Kossmann, D., Kraska, T., Loesing, S.: An evaluation of Alternative Architectures for Transaction Processing in the Cloud. In: Proceedings of the ACM SIGMOD International Conference on Management of Data, pp. 579–590 (2010)Google Scholar
  3. 3.
    Levandoski, J., Lomet, D., Mokbel, M., Zhao, K.: Deuteronomy: Transaction Support for Cloud Data. In: Proceedings of the Biennial Conference on Innovative Data Systems Research (CIDR), pp. 123–133 (2011)Google Scholar
  4. 4.
    Williams, P., Sion, R., Shasha, D.: The Blind Stone Tablet: Outsourcing Durability to Untrusted Parties. In: Proceedings of the Network and Distributed System Security Symposium (NDSS) (2009)Google Scholar
  5. 5.
    Tan, C., Liu, Q., Wu, J.: Secure Locking for Untrusted Clouds. In: Proceedings of the IEEE International Conference on Cloud Computing (CLOUD), pp. 131–138 (2011)Google Scholar
  6. 6.
    Biswas, D., Haller, S., Kerschbaum, F.: Privacy-Preserving Outsourced Profiling. In: Proceedings of the IEEE International Conference on E-Commerce Technology (CEC), pp. 136–143 (2010)Google Scholar
  7. 7.
    Camenisch, J., Kohlweiss, M., Rial, A., Sheedy, C.: Blind and Anonymous Identity-Based Encryption and Authorised Private Searches on Public Key Encrypted Data. In: Jarecki, S., Tsudik, G. (eds.) PKC 2009. LNCS, vol. 5443, pp. 196–214. Springer, Heidelberg (2009)CrossRefGoogle Scholar
  8. 8.
    Vidyasankar, K.: Serializability. In: Encyclopedia of Database Systems, pp. 2626–2632 (2009)Google Scholar
  9. 9.
    Vidyasankar, K., Vossen, G.: A Multi-Level Model for Web Service Composition. In: Proceedings of the IEEE International Conference on Web Services (ICWS), pp. 462–469 (2004)Google Scholar
  10. 10.
    Biswas, D., Vidyasankar, K.: Spheres of Visibility. In: Proceedings of the IEEE European Conference on Web Services (ECOWS), pp. 2–13 (2005)Google Scholar
  11. 11.
    Ivan, A., Dodis, Y.: Proxy Cryptography Revisited. In: Proceedings of the Network and Distributed System Security Symposium (NDSS) (2003)Google Scholar
  12. 12.
    Paillier, P.: Public-Key Cryptosystems Based on Composite Degree Residuosity Classes. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 223–238. Springer, Heidelberg (1999)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2012

Authors and Affiliations

  • Debmalya Biswas
    • 1
  • Krishnamurthy Vidyasankar
    • 2
  1. 1.Nokia Research CenterLausanneSwitzerland
  2. 2.Dept. of Computer ScienceMemorial UniversitySt. John’sCanada

Personalised recommendations