The advancements in the Information Technology and the rapid diffusion of novel computing paradigms have accelerated the trend of moving data to the cloud. Public and private organizations are more often outsourcing their data centers to the cloud for economic and/or performance reasons, thus making data confidentiality an essential requirement. A basic technique for protecting data confidentiality relies on encryption: data are encrypted by the owner before their outsourcing. Encryption however complicates both the query evaluation and enforcement of access restrictions to outsourced data. In this chapter, we provide an overview of the issues and techniques related to the support of selective and private access to outsourced data in a scenario where the cloud provider is trusted for managing the data but not for reading their content. We therefore illustrate methods for enforcing access control and for efficiently and privately executing queries (at the server side) over encrypted data. We also show how the combined adoption of approaches supporting access control and for efficient query evaluation may cause novel privacy issues that need to be carefully handled.

Selective and private access to outsourced data centers / S. De Capitani di Vimercati, S. Foresti, G. Livraga, P. Samarati - In: Handbook on data centers / [a cura di] S.U. Khan, A.Y. Zomaya. - New York : Springer, 2015. - ISBN 9781493920914. - pp. 997-1027 [10.1007/978-1-4939-2092-1_33]

Selective and private access to outsourced data centers

S. De Capitani di Vimercati;S. Foresti;G. Livraga;P. Samarati
2015

Abstract

The advancements in the Information Technology and the rapid diffusion of novel computing paradigms have accelerated the trend of moving data to the cloud. Public and private organizations are more often outsourcing their data centers to the cloud for economic and/or performance reasons, thus making data confidentiality an essential requirement. A basic technique for protecting data confidentiality relies on encryption: data are encrypted by the owner before their outsourcing. Encryption however complicates both the query evaluation and enforcement of access restrictions to outsourced data. In this chapter, we provide an overview of the issues and techniques related to the support of selective and private access to outsourced data in a scenario where the cloud provider is trusted for managing the data but not for reading their content. We therefore illustrate methods for enforcing access control and for efficiently and privately executing queries (at the server side) over encrypted data. We also show how the combined adoption of approaches supporting access control and for efficient query evaluation may cause novel privacy issues that need to be carefully handled.
No
English
Settore INF/01 - Informatica
Capitolo o Saggio
Sì, ma tipo non specificato
Pubblicazione scientifica
   Enforceable Security in the Cloud to Uphold Data Ownership
   ESCUDO CLOUD
   EUROPEAN COMMISSION
   H2020
   644579

   ABC GATES FOR EUROPE
   ABC4EU
   EUROPEAN COMMISSION
   FP7
   312797

   Data-Centric Genomic Computing (GenData 2020)
   MINISTERO DELL'ISTRUZIONE E DEL MERITO
   2010RTFWBH_009
Handbook on data centers
S.U. Khan, A.Y. Zomaya
New York
Springer
2015
997
1027
31
9781493920914
9781493920921
Volume a diffusione internazionale
Aderisco
S. De Capitani di Vimercati, S. Foresti, G. Livraga, P. Samarati
Book Part (author)
open
268
Selective and private access to outsourced data centers / S. De Capitani di Vimercati, S. Foresti, G. Livraga, P. Samarati - In: Handbook on data centers / [a cura di] S.U. Khan, A.Y. Zomaya. - New York : Springer, 2015. - ISBN 9781493920914. - pp. 997-1027 [10.1007/978-1-4939-2092-1_33]
info:eu-repo/semantics/bookPart
4
Prodotti della ricerca::03 - Contributo in volume
File in questo prodotto:
File Dimensione Formato  
dfls-data_center.pdf

accesso aperto

Tipologia: Pre-print (manoscritto inviato all'editore)
Dimensione 647.9 kB
Formato Adobe PDF
647.9 kB Adobe PDF Visualizza/Apri
Pubblicazioni consigliate

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/2434/269907
Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus 7
  • ???jsp.display-item.citation.isi??? ND
social impact