Advertisement

Design and Implementation of a Cloud-Based Assured Information Sharing System

  • Tyrone Cadenhead
  • Murat Kantarcioglu
  • Vaibhav Khadilkar
  • Bhavani Thuraisingham
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 7531)

Abstract

The advent of cloud computing and the continuing movement toward software as a service (SaaS) paradigms have posed an increasing need for assured information sharing (AIS) as a service in the cloud. This paper describes the first of its kind assured information sharing system that operates in a cloud. The idea is for each organization to store their data and the information sharing policies in a cloud. The information is shared according to the policies. We describe a cloud-based information sharing framework that utilizes Semantic Web technologies; our framework consists of a policy engine that reasons about the policies for information sharing purposes and a secure data engine that stores and queries data in the cloud. We also describe the operation of our system with example policies.

Keywords

Assured Information Sharing Cloud Computing Resource Description Framework Policies 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Thuraisingham, B., Khadilkar, V., Rachapalli, J., Cadenhead, T., Kantarcioglu, M., Hamlen, K., Khan, L., Husain, F.: Cloud-Centric Assured Information Sharing. In: Chau, M., Wang, G.A., Yue, W.T., Chen, H. (eds.) PAISI 2012. LNCS, vol. 7299, pp. 1–26. Springer, Heidelberg (2012)CrossRefGoogle Scholar
  2. 2.
    Klyne, G., Carroll, J., McBride, B.: Resource description framework (RDF): Concepts and abstract syntax. W3C recommendation (2004)Google Scholar
  3. 3.
  4. 4.
    Prud’hommeaux, E., Seaborne, A.: SPARQL Query Language for RDF. W3C Recommendation (January 2008)Google Scholar
  5. 5.
    Braun, U., Shinnar, A., Seltzer, M.: Securing provenance. In: Proceedings of the 3rd Conference on Hot Topics in Security, p. 4 (2008)Google Scholar
  6. 6.
    Cadenhead, T., Khadilkar, V., Kantarcioglu, M., Thuraisingham, B.: A language for Provenance Access Control. In: Proceedings of the First ACM Conference on Data and Application Security and Privacy, pp. 133–144 (2011)Google Scholar
  7. 7.
    Cadenhead, T., Khadilkar, V., Kantarcioglu, M., Thuraisingham, B.: Transforming Provenance Using Redaction. In: Proceedings of the 16th ACM Symposium on Access Control Models and Technologies, pp. 93–102 (2011)Google Scholar
  8. 8.
    Cadenhead, T., Khadilkar, V., Kantarcioglu, M., Thuraisingham, B.: A cloud-based RDF policy engine for assured information sharing. In: Proceedings of the 17th ACM Symposium on Access Control Models and Technologies, pp. 113–116 (2012)Google Scholar
  9. 9.
    Samarati, P., de Capitani di Vimercati, S.: Access Control: Policies, Models, and Mechanisms. In: Focardi, R., Gorrieri, R. (eds.) FOSAD 2000. LNCS, vol. 2171, pp. 137–196. Springer, Heidelberg (2001)CrossRefGoogle Scholar
  10. 10.
    Ehrig, H.: Fundamentals of algebraic graph transformation. Springer-Verlag New York Inc. (2006)Google Scholar
  11. 11.
    Rozenberg, G.: Handbook of graph grammars and computing by graph transformation: Foundations. World Scientific (2003)Google Scholar
  12. 12.
    Moreau, L., Clifford, B., Freire, J., Futrelle, J., Gil, Y., Groth, P., Kwasnikowska, N., Miles, S., Missier, P., Myers, J., et al.: The open provenance model core specification (v1. 1). Future Generation Computer Systems, 743–756 (2011)Google Scholar
  13. 13.
    Harris, S., Seaborne, A.: SPARQL 1.1 query language. W3C Working Draft (2010)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2012

Authors and Affiliations

  • Tyrone Cadenhead
    • 1
  • Murat Kantarcioglu
    • 1
  • Vaibhav Khadilkar
    • 1
  • Bhavani Thuraisingham
    • 1
  1. 1.Department of Computer ScienceThe University of Texas at DallasRichardsonUSA

Personalised recommendations