DocumentCode :
724631
Title :
Privacy and Access Control for Outsourced Personal Records
Author :
Maffei, Matteo ; Malavolta, Giulio ; Reinert, Manuel ; Schroder, Dominique
fYear :
2015
fDate :
17-21 May 2015
Firstpage :
341
Lastpage :
358
Abstract :
Cloud storage has rapidly become a cornerstone of many IT infrastructures, constituting a seamless solution for the backup, synchronization, and sharing of large amounts of data. Putting user data in the direct control of cloud service providers, however, raises security and privacy concerns related to the integrity of outsourced data, the accidental or intentional leakage of sensitive information, the profiling of user activities and so on. Furthermore, even if the cloud provider is trusted, users having access to outsourced files might be malicious and misbehave. These concerns are particularly serious in sensitive applications like personal health records and credit score systems. To tackle this problem, we present GORAM, a cryptographic system that protects the secrecy and integrity of outsourced data with respect to both an untrusted server and malicious clients, guarantees the anonymity and unlink ability of accesses to such data, and allows the data owner to share outsourced data with other clients, selectively granting them read and write permissions. GORAM is the first system to achieve such a wide range of security and privacy properties for outsourced storage. In the process of designing an efficient construction, we developed two new, generally applicable cryptographic schemes, namely, batched zero-knowledge proofs of shuffle and an accountability technique based on chameleon signatures, which we consider of independent interest. We implemented GORAM in Amazon Elastic Compute Cloud (EC2) and ran a performance evaluation demonstrating the scalability and efficiency of our construction.
Keywords :
authorisation; cloud computing; cryptography; data integrity; data protection; outsourcing; storage management; Amazon elastic compute cloud; EC2; GORAM cryptographic system; IT infrastructures; access control; accountability technique; batched zero-knowledge shuffle proofs; chameleon signatures; cloud provider; cloud storage; credit score systems; data backup; data sharing; data synchronization; outsourced data integrity; outsourced data protection; outsourced data secrecy; outsourced personal records; outsourced storage privacy property; performance evaluation; Encryption; Indexes; Protocols; Servers;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Security and Privacy (SP), 2015 IEEE Symposium on
Conference_Location :
San Jose, CA
ISSN :
1081-6011
Type :
conf
DOI :
10.1109/SP.2015.28
Filename :
7163035
Link To Document :
بازگشت