Data Protection in Cloud Scenarios

We present a brief overview of the main challenges related to data protection that need to be addressed when data are stored, processed, or managed in the cloud. We also discuss emerging approaches and directions to address such challenges.

[1]  Brent Waters,et al.  Ciphertext-Policy Attribute-Based Encryption , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).

[2]  Alberto Ceselli,et al.  Modeling and assessing inference exposure in encrypted databases , 2005, TSEC.

[3]  Philip S. Yu,et al.  Dual encryption for query integrity assurance , 2008, CIKM '08.

[4]  Sushil Jajodia,et al.  Authorization enforcement in distributed query evaluation , 2011, J. Comput. Secur..

[5]  Elaine Shi,et al.  Path ORAM: an extremely simple oblivious RAM protocol , 2012, CCS.

[6]  Hakan Hacigümüs,et al.  Executing SQL over encrypted data in the database-service-provider model , 2002, SIGMOD '02.

[7]  Sabrina De Capitani di Vimercati,et al.  Managing and accessing data in the cloud: Privacy risks and approaches , 2012, 2012 7th International Conference on Risks and Security of Internet and Systems (CRiSIS).

[8]  Ying Yin,et al.  Verifying correctness of inner product of vectors in cloud computing , 2013, Cloud Computing '13.

[9]  Sushil Jajodia,et al.  Integrity for distributed queries , 2014, 2014 IEEE Conference on Communications and Network Security.

[10]  Gerardo Pelosi,et al.  Efficient and Private Access to Outsourced Data , 2011, 2011 31st International Conference on Distributed Computing Systems.

[11]  Cong Wang,et al.  Privacy-preserving multi-keyword ranked search over encrypted cloud data , 2011, 2011 Proceedings IEEE INFOCOM.

[12]  Sabrina De Capitani di Vimercati,et al.  Data Security Issues in Cloud Scenarios , 2015, ICISS.

[13]  Sushil Jajodia,et al.  Enforcing Confidentiality Constraints on Sensitive Databases with Lightweight Trusted Clients , 2009, DBSec.

[14]  Reza Curtmola,et al.  Remote data checking using provable data possession , 2011, TSEC.

[15]  Ting Yu,et al.  PAQO: Preference-aware query optimization for decentralized database systems , 2014, 2014 IEEE 30th International Conference on Data Engineering.

[16]  Laks V. S. Lakshmanan,et al.  Efficient secure query evaluation over encrypted XML databases , 2006, VLDB.

[17]  Rajeev Motwani,et al.  Two Can Keep A Secret: A Distributed Architecture for Secure Database Services , 2005, CIDR.

[18]  Sushil Jajodia,et al.  Fragmentation and Encryption to Enforce Privacy in Data Storage , 2007, ESORICS.

[19]  Ari Juels,et al.  Pors: proofs of retrievability for large files , 2007, CCS '07.

[20]  Sushil Jajodia,et al.  Fragmentation in Presence of Data Dependencies , 2014, IEEE Transactions on Dependable and Secure Computing.

[21]  Murat Kantarcioglu,et al.  Sovereign Joins , 2006, 22nd International Conference on Data Engineering (ICDE'06).

[22]  Brent Waters,et al.  Attribute-based encryption for fine-grained access control of encrypted data , 2006, CCS '06.

[23]  Feifei Li,et al.  Authenticated Index Structures for Aggregation Queries , 2010, TSEC.

[24]  Craig Gentry,et al.  Fully homomorphic encryption using ideal lattices , 2009, STOC '09.

[25]  Pierangela Samarati,et al.  Cloud Security: Issues and Concerns , 2016 .

[26]  Gene Tsudik,et al.  Authentication and integrity in outsourced databases , 2006, TOS.

[27]  Vincenzo Piuri,et al.  Fault Tolerance Management in Cloud Computing: A System-Level Perspective , 2013, IEEE Systems Journal.

[28]  Sushil Jajodia,et al.  Keep a Few: Outsourcing Data While Maintaining Confidentiality , 2009, ESORICS.

[29]  Cong Wang,et al.  Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data , 2014 .

[30]  Sushil Jajodia,et al.  Integrity for join queries in the cloud , 2013, IEEE Transactions on Cloud Computing.

[31]  Gerardo Pelosi,et al.  Shuffle Index , 2015, ACM Trans. Storage.

[32]  V. Piuri,et al.  Fault tolerance management in IaaS clouds , 2012, 2012 IEEE First AESS European Conference on Satellite Telecommunications (ESTEL).

[33]  Xiaofeng Meng,et al.  Integrity Auditing of Outsourced Data , 2007, VLDB.

[34]  Kian-Lee Tan,et al.  Verifying completeness of relational query results in data publishing , 2005, SIGMOD '05.

[35]  Jorge Lobo,et al.  Enforcement of Autonomous Authorizations in Collaborative Distributed Query Evaluation , 2015, IEEE Transactions on Knowledge and Data Engineering.

[36]  Vincenzo Piuri,et al.  Supporting Security Requirements for Resource Management in Cloud Computing , 2012, 2012 IEEE 15th International Conference on Computational Science and Engineering.

[37]  Pierangela Samarati Data Security and Privacy in the Cloud , 2014, ISPEC.

[38]  Sushil Jajodia,et al.  Encryption policies for regulating access to outsourced data , 2010, TODS.

[39]  Sushil Jajodia,et al.  Over-encryption: Management of Access Control Evolution on Outsourced Data , 2007, VLDB.

[40]  Stephan Olariu,et al.  Data Integrity Evaluation in Cloud Database-as-a-Service , 2013, 2013 IEEE Ninth World Congress on Services.

[41]  Hari Balakrishnan,et al.  CryptDB: protecting confidentiality with encrypted query processing , 2011, SOSP.

[42]  Sushil Jajodia,et al.  Combining fragmentation and encryption to protect privacy in data storage , 2010, TSEC.

[43]  Ashutosh Saxena,et al.  Correctness Verification in Outsourced Databases: More Reliable Fake Tuples Approach , 2013, ICISS.