skip to main content
10.1145/1996010.1996012acmconferencesArticle/Chapter ViewAbstractPublication PageshpdcConference Proceedingsconference-collections
research-article

Adaptive, secure, and scalable distributed data outsourcing: a vision paper

Published:08 June 2011Publication History

ABSTRACT

The growing trend towards grid computing and cloud computing provides enormous potential for enabling dynamic, distributed and data-intensive applications such as sharing and processing of large-scale scientific data. It also creates an increasing challenge for automatically and dynamically placing the data in the globally distributed computers or data centers in order to optimally utilize resources while minimizing user-perceived latency. This challenge is further complicated by the security and privacy constraints on the data that are potential sensitive. In this paper, we present our vision of an adaptive, secure, and scalable data outsourcing framework for storing and processing massive, dynamic, and potentially sensitive data using distributed resources. We identify the main technical challenges and present some preliminary solutions. The key idea of the framework is that it combines data partitioning, encryption, and data reduction to ensure data confidentiality and privacy while minimizing the cost for data shipping and computation. We believe the framework will provide a holistic conceptual foundation for secure data outsourcing that enables dynamic, distributed, and data-intensive applications and will open up many exciting research challenges.

References

  1. M. Abdalla, M. Bellare, D. Catalano, E. Kiltz, T. Kohno, T. Lange, J. Malone-Lee, G. Neven, P. Paillier, and H. Shi. Searchable encryption revisited: Consistency properties, relation to anonymous ibe, and extensions. Journal of Cryptology, 21:350--391, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. S. Agarwal, J. Dunagan, N. Jain, S. Saroiu, A. Wolman, and H. Bhogan. Volley: automated data placement for geo-distributed cloud services. In Proc. of the 7th USENIX conference on Networked systems design and implementation, NSDI, page 2, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. G. Aggarwal, M. Bawa, P. Ganesan, H. Garcia-Molina, K. Kenthapadi, R. Motwani, U. Srivastava, D. Thomas, and Y. Xu. Two can keep a secret: A distributed architecture for secure database services. In CIDR, pages 186--199, 2005.Google ScholarGoogle Scholar
  4. G. Amanatidis, A. Boldyreva, and A. O'Neill. Provably-secure schemes for basic query support in outsourced databases. In DBSec, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. M. Armbrust, A. Fox, R. Griffith, A. D. Joseph, R. Katz, A. Konwinski, G. Lee, D. Patterson, A. Rabkin, I. Stoica, and M. Zaharia. A view of cloud computing. Commun. ACM, 53:50--58, April 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, and D. Song. Provable data possession at untrusted stores. In Proc. of the 14th ACM Conference on Computer and Communications Security, CCS, pages 598--609, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. D. Boneh, G. Di Crescenzo, R. Ostrovsky, and G. Persiano. Public key encryption with keyword search. In Advances in Cryptology -- EUROCRYPT 2004, volume 3027 of Lecture Notes in Computer Science, pages 506--522. Springer Berlin / Heidelberg, 2004.Google ScholarGoogle Scholar
  8. D. Boneh and B. Waters. Conjunctive, subset, and range queries on encrypted data. In Proc. of the 4th Conference on Theory of Cryptography, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. K. D. Bowers, A. Juels, and A. Oprea. Hail: a high-availability and integrity layer for cloud storage. In Proc. of the 16th ACM Conference on Computer and Communications Security, CCS, pages 187--198, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. M. Canim, M. Kantarcioglu, and A. Inan. Query optimization in encrypted relational databases by vertical schema partitioning. In Proc. of the 6th VLDB Workshop on Secure Data Management, SDM '09, pages 1--16, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. R. Carmichael, P. Braga-Henebry, D. Thain, and S. Emrich. Biocompute: towards a collaborative workspace for data intensive bio-science. In Proc. of the 19th ACM International Symposium on High Performance Distributed Computing, HPDC '10, pages 489--498, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. A. Ceselli, E. Damiani, S. D. C. D. Vimercati, S. Jajodia, S. Paraboschi, and P. Samarati. Modeling and assessing inference exposure in encrypted databases. ACM Trans. Inf. Syst. Secur., 8, February 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Y.-C. Chang and M. Mitzenmacher. Privacy preserving keyword searches on remote encrypted data. In Applied Cryptography and Network Security, volume 3531 of Lecture Notes in Computer Science, pages 442--455. Springer Berlin / Heidelberg, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. V. Ciriani, S. De Capitani di Vimercati, S. Foresti, S. Jajodia, S. Paraboschi, and P. Samarati. Keep a few: Outsourcing data while maintaining confidentiality. In Computer Security -- ESORICS 2009, volume 5789 of Lecture Notes in Computer Science, pages 440--455. Springer Berlin / Heidelberg, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. V. Ciriani, S. D. C. di Vimercati, S. Foresti, S. Jajodia, S. Paraboschi, and P. Samarati. Fragmentation and encryption to enforce privacy in data storage. In Computer Security -- ESORICS 2007, volume 4734 of Lecture Notes in Computer Science, pages 171--186. Springer Berlin / Heidelberg, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. V. Ciriani, S. D. C. d. Vimercati, S. Foresti, S. Jajodia, S. Paraboschi, and P. Samarati. Fragmentation design for efficient query execution over sensitive distributed databases. In ICDCS, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. C. Dwork. Differential privacy. In Automata, Languages and Programming, volume 4052 of Lecture Notes in Computer Science, pages 1--12, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. C. Dwork. Differential privacy: a survey of results. Lecture Notes in Computer Science, 4978:1--19, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. C. Dwork. A firm foundation for private data analysis. Commun. ACM, 54:86--95, January 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. C. Dwork, F. D. McSherry, K. Nissim, and A. Smith. Calibrating noise to sensitivity in private data analysis. In Proc. of the 3rd Theory of Cryptography Conference, pages 265--284, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. C. C. Erway, A. Küpçü, C. Papamanthou, and R. Tamassia. Dynamic provable data possession. In CCS, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. B. C. M. Fung, K. Wang, R. Chen, and P. S. Yu. Privacy-preserving data publishing: A survey of recent developments. ACM Computing Surveys, 42(4), June 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. J. Gardner and L. Xiong. Hide: An integrated system for health information de-identification. In EDBT, 2009.Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. C. Gentry. Fully homomorphic encryption using ideal lattices. In Proc. of the 41st annual ACM Symposium on Theory of Computing, STOC '09, pages 169--178, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. C. Gentry. Computing arbitrary functions of encrypted data. Commun. ACM, 53:97--105, 3 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. L. Glimcher, V. T. Ravi, and G. Agrawal. Supporting load balancing for distributed data-intensive applications. In HiPC, pages 235--244, 2009.Google ScholarGoogle ScholarCross RefCross Ref
  27. P. Golle, J. Staddon, and B. Waters. Secure conjunctive keyword search over encrypted data. In Applied Cryptography and Network Security, volume 3089 of Lecture Notes in Computer Science, pages 31--45. Springer Berlin / Heidelberg, 2004.Google ScholarGoogle ScholarCross RefCross Ref
  28. H. Hacigümüs, B. R. Iyer, C. Li, and S. Mehrotra. Executing sql over encrypted data in the database-service-provider model. In Proc. of the 2002 ACM SIGMOD International Conference on Management of Data, SIGMOD, pages 216--227, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. M. Hay, V. Rastogi, G. Miklau, and D. Suciu. Boosting the accuracy of differentially private histograms through consistency. Proc. VLDB Endow., 3:1021--1032, September 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. M. Kantarcioglu and C. Clifton. Security issues in querying encrypted data. In Data and Applications Security XIX, volume 3654 of Lecture Notes in Computer Science, pages 924--924. Springer Berlin / Heidelberg, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. J. Katz, A. Sahai, and B. Waters. Predicate encryption supporting disjunctions, polynomial equations, and inner products. In Proc. of the Theory and Applications of Cryptographic Techniques 27th annual international conference on Advances in Cryptology, EUROCRYPT, pages 146--162, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. L. M. Kaufman. Data security in the world of cloud computing. IEEE Security and Privacy, 7:61--64, July 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. A. Machanavajjhala, J. Gehrke, D. Kifer, and M. Venkitasubramaniam. L-diversity: Privacy beyond k-anonymity. In ICDE, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  34. F. D. McSherry. Privacy integrated queries: an extensible platform for privacy-preserving data analysis. In SIGMOD, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  35. P. Mell and T. Grance. Nist definition of cloud computing v15, 2009. http://csrc.nist.gov/groups/SNS/cloud-computing/cloud-def-v15.doc.Google ScholarGoogle Scholar
  36. D. Molnar and S. Schechter. Self hosting vs. cloud hosting: Accounting for the security impact of hosting in the cloud. In The Ninth Workshop on the Economics of Information Security (WEIS 2010), 2010.Google ScholarGoogle Scholar
  37. H. Ozbay. Introduction to Feedback Control Theory. CRC Press, Inc., Boca Raton, FL, USA, 1st edition, 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  38. K. P. N. Puttaswamy, C. Kruegel, and B. Y. Zhao. Silverline: Toward data confidentiality in third-party clouds. Technical Report 2010-08, Dept. of Computer Science, University of California Santa Barbara, 8 2010.Google ScholarGoogle Scholar
  39. T. Ristenpart, E. Tromer, H. Shacham, and S. Savage. Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds. In Proc. of the 16th ACM Conference on Computer and Communications Security, CCS, pages 199--212, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  40. I. Roy, S. T. V. Setty, A. Kilzer, V. Shmatikov, and E. Witchel. Airavat: security and privacy for mapreduce. In NSDI, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  41. P. Samarati. Protecting respondents' identities in microdata release. IEEE Trans. on Knowl. and Data Eng., 13, November 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  42. P. Samarati and S. D. C. di Vimercati. Data protection in outsourcing scenarios: issues and directions. In ASIACCS, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  43. A. Shamir. How to share a secret. Commun. ACM, 22:612--613, November 1979. Google ScholarGoogle ScholarDigital LibraryDigital Library
  44. D. X. Song, D. Wagner, and A. Perrig. Practical techniques for searches on encrypted data. In Proc. of the 2000 IEEE Symposium on Security and Privacy, pages 44--55, 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  45. L. Sweeney. k-anonymity: a model for protecting privacy. Int. J. Uncertain. Fuzziness Knowl.-Based Syst., 10, October 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  46. M. van Dijk, C. Gentry, S. Halevi, and V. Vaikuntanathan. Fully homomorphic encryption over the integers. In Advances in Cryptology -- EUROCRYPT 2010, volume 6110 of Lecture Notes in Computer Science, pages 24--43. Springer Berlin / Heidelberg, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  47. Y. Xiao, L. Xiong, and C. Yuan. Differentially private data release through multidimensional partitioning. In Proc. of the 7th VLDB conference on Secure data management, SDM, pages 150--168, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  48. Y. Yu, P. K. Gunda, and M. Isard. Distributed aggregation for data-parallel computing: interfaces and implementations. In Proc. of the ACM SIGOPS 22nd symposium on Operating systems principles, SOSP '09, pages 247--260, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Adaptive, secure, and scalable distributed data outsourcing: a vision paper

                Recommendations

                Comments

                Login options

                Check if you have access through your login credentials or your institution to get full access on this article.

                Sign in
                • Published in

                  cover image ACM Conferences
                  3DAPAS '11: Proceedings of the 2011 workshop on Dynamic distributed data-intensive applications, programming abstractions, and systems
                  June 2011
                  24 pages
                  ISBN:9781450307055
                  DOI:10.1145/1996010
                  • General Chairs:
                  • Daniel S. Katz,
                  • Shantenu Jha,
                  • Jon Weissman

                  Copyright © 2011 ACM

                  Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

                  Publisher

                  Association for Computing Machinery

                  New York, NY, United States

                  Publication History

                  • Published: 8 June 2011

                  Permissions

                  Request permissions about this article.

                  Request Permissions

                  Check for updates

                  Qualifiers

                  • research-article

                  Upcoming Conference

                PDF Format

                View or Download as a PDF file.

                PDF

                eReader

                View online with eReader.

                eReader