Privacy Preserving Cloud Transactions
Cloud computing as an outsourced data storage platform is becoming popular by the day with multiple service offerings by companies such as Amazon, Microsoft, among others. However to gain wide- spread enterprise level acceptance, cloud providers still need to address the following significant challenges: (a) Data confidentiality: Organizations do not trust cloud providers with their confidential data. One way of ensuring data confidentiality is of course to store data in encrypted form. This in turn requires that data be decrypted before each access. Further, decryption should be enabled only to authorized users. (b) Transactions: Consistent, concurrent and reliable access to data should be provided via transactions, as with traditional databases. (c) User confidentiality: It should be possible to keep the identity of the users executing transactions confidential from the ‘owners’ of data and vice versa.
In this work, we aim to integrate the above objectives providing transactional guarantees over encrypted outsourced data. More specifically, we propose concurrency control protocols for the different cloud sharing configurations, with different confidentiality requirements. Experimental results are given to validate the scalability of the proposed protocols.
KeywordsCloud Provider Abort Rate Data Owner Encrypt Data Cloud Computing Environment
Unable to display preview. Download preview PDF.
- 1.Weikum, G., Vossen, G.: Transactional Information Systems: Theory, Algorithms, and the Practice of Concurrency Control and Recovery. Morgan Kaufmann Publishers (2011)Google Scholar
- 2.Kossmann, D., Kraska, T., Loesing, S.: An evaluation of Alternative Architectures for Transaction Processing in the Cloud. In: Proceedings of the ACM SIGMOD International Conference on Management of Data, pp. 579–590 (2010)Google Scholar
- 3.Levandoski, J., Lomet, D., Mokbel, M., Zhao, K.: Deuteronomy: Transaction Support for Cloud Data. In: Proceedings of the Biennial Conference on Innovative Data Systems Research (CIDR), pp. 123–133 (2011)Google Scholar
- 4.Williams, P., Sion, R., Shasha, D.: The Blind Stone Tablet: Outsourcing Durability to Untrusted Parties. In: Proceedings of the Network and Distributed System Security Symposium (NDSS) (2009)Google Scholar
- 5.Tan, C., Liu, Q., Wu, J.: Secure Locking for Untrusted Clouds. In: Proceedings of the IEEE International Conference on Cloud Computing (CLOUD), pp. 131–138 (2011)Google Scholar
- 6.Biswas, D., Haller, S., Kerschbaum, F.: Privacy-Preserving Outsourced Profiling. In: Proceedings of the IEEE International Conference on E-Commerce Technology (CEC), pp. 136–143 (2010)Google Scholar
- 8.Vidyasankar, K.: Serializability. In: Encyclopedia of Database Systems, pp. 2626–2632 (2009)Google Scholar
- 9.Vidyasankar, K., Vossen, G.: A Multi-Level Model for Web Service Composition. In: Proceedings of the IEEE International Conference on Web Services (ICWS), pp. 462–469 (2004)Google Scholar
- 10.Biswas, D., Vidyasankar, K.: Spheres of Visibility. In: Proceedings of the IEEE European Conference on Web Services (ECOWS), pp. 2–13 (2005)Google Scholar
- 11.Ivan, A., Dodis, Y.: Proxy Cryptography Revisited. In: Proceedings of the Network and Distributed System Security Symposium (NDSS) (2003)Google Scholar
- 12.Paillier, P.: Public-Key Cryptosystems Based on Composite Degree Residuosity Classes. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 223–238. Springer, Heidelberg (1999)Google Scholar