The advancements in the Information Technology and the rapid diffusion of novel computing paradigms have accelerated the trend of moving data to the cloud. Public and private organizations are more often outsourcing their data centers to the cloud for economic and/or performance reasons, thus making data confidentiality an essential requirement. A basic technique for protecting data confidentiality relies on encryption: data are encrypted by the owner before their outsourcing. Encryption however complicates both the query evaluation and enforcement of access restrictions to outsourced data. In this chapter, we provide an overview of the issues and techniques related to the support of selective and private access to outsourced data in a scenario where the cloud provider is trusted for managing the data but not for reading their content. We therefore illustrate methods for enforcing access control and for efficiently and privately executing queries (at the server side) over encrypted data. We also show how the combined adoption of approaches supporting access control and for efficient query evaluation may cause novel privacy issues that need to be carefully handled.

Selective and private access to outsourced data centers / S. De Capitani di Vimercati, S. Foresti, G. Livraga, P. Samarati - In: Handbook on data centers / [a cura di] S.U. Khan, A.Y. Zomaya. - New York : Springer, 2015. - ISBN 9781493920914. - pp. 997-1027 [10.1007/978-1-4939-2092-1_33]

Selective and private access to outsourced data centers

S. De Capitani di Vimercati;S. Foresti;G. Livraga;P. Samarati
2015

Abstract

The advancements in the Information Technology and the rapid diffusion of novel computing paradigms have accelerated the trend of moving data to the cloud. Public and private organizations are more often outsourcing their data centers to the cloud for economic and/or performance reasons, thus making data confidentiality an essential requirement. A basic technique for protecting data confidentiality relies on encryption: data are encrypted by the owner before their outsourcing. Encryption however complicates both the query evaluation and enforcement of access restrictions to outsourced data. In this chapter, we provide an overview of the issues and techniques related to the support of selective and private access to outsourced data in a scenario where the cloud provider is trusted for managing the data but not for reading their content. We therefore illustrate methods for enforcing access control and for efficiently and privately executing queries (at the server side) over encrypted data. We also show how the combined adoption of approaches supporting access control and for efficient query evaluation may cause novel privacy issues that need to be carefully handled.
Settore INF/01 - Informatica
   Enforceable Security in the Cloud to Uphold Data Ownership
   ESCUDO CLOUD
   EUROPEAN COMMISSION
   H2020
   644579

   ABC GATES FOR EUROPE
   ABC4EU
   EUROPEAN COMMISSION
   FP7
   312797

   Data-Centric Genomic Computing (GenData 2020)
   MINISTERO DELL'ISTRUZIONE E DEL MERITO
   2010RTFWBH_009
2015
Book Part (author)
File in questo prodotto:
File Dimensione Formato  
dfls-data_center.pdf

accesso aperto

Tipologia: Pre-print (manoscritto inviato all'editore)
Dimensione 647.9 kB
Formato Adobe PDF
647.9 kB Adobe PDF Visualizza/Apri
Pubblicazioni consigliate

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/2434/269907
Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus 7
  • ???jsp.display-item.citation.isi??? ND
social impact