Distributed Shuffle Index in the Cloud: Implementation and Evaluation

The distributed shuffle index strengthens the guarantees of access confidentiality provided by the shuffle index through the distribution of data among three cloud providers. In this paper, we analyze architectural and design issues and describe an implementation of the distributed shuffle index integrated with different cloud providers (i.e., Amazon S3, OpenStack Swift, Google Cloud Storage, and EMC Elastic Cloud Storage). The experimental results obtained with our implementation confirm the protection guarantees provided by the distributed shuffle index and its limited performance overhead, demonstrating its practical applicability in cloud scenarios.

[1]  Gerardo Pelosi,et al.  A Dynamic Tree-Based Data Structure for Access Privacy in the Cloud , 2016, 2016 IEEE International Conference on Cloud Computing Technology and Science (CloudCom).

[2]  Keke Gai,et al.  Dynamic energy-aware cloudlet-based mobile cloud computing model for green computing , 2016, J. Netw. Comput. Appl..

[3]  Vincenzo Piuri,et al.  Supporting Security Requirements for Resource Management in Cloud Computing , 2012, 2012 IEEE 15th International Conference on Computational Science and Engineering.

[4]  Ling Ren,et al.  Path ORAM , 2012, J. ACM.

[5]  Marco Rosa,et al.  Managing Data Sharing in OpenStack Swift with Over-Encryption , 2016, WISCS@CCS.

[6]  Gerardo Pelosi,et al.  Distributed Shuffling for Preserving Access Confidentiality , 2013, ESORICS.

[7]  Sara Foresti,et al.  Preserving Privacy in Data Outsourcing , 2010, Advances in Information Security.

[8]  Gerardo Pelosi,et al.  Shuffle Index , 2015, ACM Trans. Storage.

[9]  Elaine Shi,et al.  Onion ORAM: A Constant Bandwidth Blowup Oblivious RAM , 2016, TCC.

[10]  Silvio Micali,et al.  Computationally Private Information Retrieval with Polylogarithmic Communication , 1999, EUROCRYPT.

[11]  Gerardo Pelosi,et al.  Three-Server Swapping for Access Confidentiality , 2018, IEEE Transactions on Cloud Computing.

[12]  Murat Kantarcioglu,et al.  Inference attack against encrypted range queries on outsourced databases , 2014, CODASPY '14.

[13]  Cong Wang,et al.  Enabling Secure and Efficient Ranked Keyword Search over Outsourced Cloud Data , 2012, IEEE Transactions on Parallel and Distributed Systems.

[14]  Elaine Shi,et al.  Multi-cloud oblivious storage , 2013, CCS.

[15]  Sabrina De Capitani di Vimercati,et al.  Managing and accessing data in the cloud: Privacy risks and approaches , 2012, 2012 7th International Conference on Risks and Security of Internet and Systems (CRiSIS).

[16]  Rafail Ostrovsky,et al.  A Survey of Single-Database Private Information Retrieval: Techniques and Applications , 2007, Public Key Cryptography.