Trading Privacy in the Cloud: A Fairer Way to Share Private Information

Millions of people use cloud services for remote storage, events management etc. By using these services, users share and synchronise their information amongst multiple devices seamlessly. Nevertheless, the freemium model that most of them follow, endangers and in many cases invades the privacy of the users. With the aim to avoid privacy issues, which limit social progress, in this article we propose a new privacy-aware protocol and architecture allowing a new and fairer business model based on the concept of Privacy as a Product (PaaP). Our proposal is based on well-known cryptography such as re-encryption, Bloom filters and the Raykova-Vo-Bellowin-Malkin scheme. With our proposal, users gain full control over their privacy and they can allow advertising companies to mine their information. Cloud service providers act as brokers and get revenues from each transaction. Thus, ours is a win-win model overcoming the limitations derived from the privacy invasion of current models.

[1]  Yun Ling,et al.  Anonymous proxy re-encryption , 2012, Secur. Commun. Networks.

[2]  A. Juels,et al.  Universal Re-encryption for Mixnets , 2004, CT-RSA.

[3]  Tal Malkin,et al.  Private search in the real world , 2011, ACSAC '11.

[4]  Matthew Green,et al.  Improved proxy re-encryption schemes with applications to secure distributed storage , 2006, TSEC.

[5]  Cong Wang,et al.  Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing , 2010, 2010 Proceedings IEEE INFOCOM.

[6]  E. Hughes A cypherpunk's manifesto , 1997 .

[7]  Raphael C.-W. Phan,et al.  Proxy Re-encryption with Keyword Search: New Definitions and Algorithms , 2010, FGIT-SecTech/DRBC.

[8]  Agusti Solanas,et al.  Privacy as a Product: A case study in the m-Health sector , 2013, IISA 2013.

[9]  Burton H. Bloom,et al.  Space/time trade-offs in hash coding with allowable errors , 1970, CACM.

[10]  Matt Blaze,et al.  Divertible Protocols and Atomic Proxy Cryptography , 1998, EUROCRYPT.

[11]  Willy Susilo,et al.  Chosen-ciphertext secure anonymous conditional proxy re-encryption with keyword search , 2012, Theor. Comput. Sci..

[12]  Jun Shao,et al.  Anonymous ID-Based Proxy Re-Encryption , 2012, ACISP.

[13]  Z. Zhi-qi Strategy and Action for Cloud Computing of the European Union:Unleashing the Potential of Cloud Computing in Europe , 2013 .

[14]  Xu An Wang,et al.  Further observation on proxy re-encryption with keyword search , 2012, J. Syst. Softw..

[15]  Tal Malkin,et al.  Secure anonymous database search , 2009, CCSW '09.