Commenced in January 2007
Paper Count: 32451
Platform-as-a-Service Sticky Policies for Privacy Classification in the Cloud
Abstract:In this paper, we present a Platform-as-a-Service (PaaS) model for controlling the privacy enforcement mechanisms applied on user data when stored and processed in Cloud data centers. The proposed architecture consists of establishing user configurable ‘sticky’ policies on the Graphical User Interface (GUI) data-bound components during the application development phase to specify the details of privacy enforcement on the contents of these components. Various privacy classification classes on the data components are formally defined to give the user full control on the degree and scope of privacy enforcement including the type of execution containers to process the data in the Cloud. This not only enhances the privacy-awareness of the developed Cloud services, but also results in major savings in performance and energy efficiency due to the fact that the privacy mechanisms are solely applied on sensitive data units and not on all the user content. The proposed design is implemented in a real PaaS cloud computing environment on the Microsoft Azure platform. Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 640
 Bhardwaj, Sushil, Leena Jain, and Sandeep Jain. "Cloud computing: A study of infrastructure as a service (IAAS)." International Journal of engineering and information Technology 2, no. 1 (2010): 60-63.
 Keller, Eric, and Jennifer Rexford. "The" Platform as a Service" Model for Networking." INM/WREN 10 (2010): 95-108.
 Dubey, Abhijit, and Dilip Wagle. "Delivering software as a service." The McKinsey Quarterly 6, no. 2007 (2007): 2007.
 Amazon AWS homepage: http://aws.amazon.com
 Microsoft Azure homepage: http://azure.microsoft.com
 Gentry, Craig. "Fully homomorphic encryption using ideal lattices." In Proceedings of the forty-first annual ACM symposium on Theory of computing, pp. 169-178. 2009.
 Brakerski, Zvika, and Vinod Vaikuntanathan. "Efficient fully homomorphic encryption from (standard) LWE." SIAM Journal on Computing 43, no. 2 (2014): 831-871.
 Brakerski, Zvika, Craig Gentry, and Vinod Vaikuntanathan. "(Leveled) fully homomorphic encryption without bootstrapping." ACM Transactions on Computation Theory (TOCT) 6, no. 3 (2014): 1-36.
 Brakerski, Zvika, and Vinod Vaikuntanathan. "Fully homomorphic encryption from ring-LWE and security for key dependent messages." In Annual cryptology conference, pp. 505-524. Springer, Berlin, Heidelberg, 2011.
 Fan, Junfeng, and Frederik Vercauteren. "Somewhat Practical Fully Homomorphic Encryption." IACR Cryptol. ePrint Arch. 2012 (2012): 144.
 Halevi, Shai, and Victor Shoup. "Faster homomorphic linear transformations in HElib." In Annual International Cryptology Conference, pp. 93-120. Springer, Cham, 2018.
 Itani, Wassim, Ayman Kayssi, and Ali Chehab. "Privacy as a service: Privacy-aware data storage and processing in cloud computing architectures." In 2009 Eighth IEEE International Conference on Dependable, Autonomic and Secure Computing, pp. 711-716. IEEE, 2009.
 Zhou, Minqi, Rong Zhang, Wei Xie, Weining Qian, and Aoying Zhou. "Security and privacy in cloud computing: A survey." In 2010 Sixth International Conference on Semantics, Knowledge and Grids, pp. 105-112. IEEE, 2010.
 Sun, Yunchuan, Junsheng Zhang, Yongping Xiong, and Guangyu Zhu. "Data security and privacy in cloud computing." International Journal of Distributed Sensor Networks 10, no. 7 (2014): 190903.
 Xiao, Zhifeng, and Yang Xiao. "Security and privacy in cloud computing." IEEE communications surveys & tutorials 15, no. 2 (2012): 843-859.
 Itani, Wassim, Ayman Kayssi, and Ali Chehab. "SNUAGE: an efficient platform-as-a-service security framework for the cloud." Cluster computing 16, no. 4 (2013): 707-724.
 Microsoft .Net Framework Homepage: https://dotnet.microsoft.com/learn/dotnet/what-is-dotnet-framework
 American institute of certified public accountants: https://www.aicpa.org/