On Monitoring Information Flow of Outsourced Data

Kayem, Anne V. D. M. (2010) On Monitoring Information Flow of Outsourced Data, Proceedings of 9th Conference on Information Security South Africa (ISSA 2010), August 2-4, 2010, Sandton, Johanesburg, South Africa, IEEE.

Full text not available from this repository. (Use alternate locations listed below)

Abstract

Data outsourcing is an Internet-based paradigm that allows organizations to share data cost-effectively by transferring data to a third-party service provider for management. Enforcing outsourced data privacy in untrustworthy environments is challenging because the data needs to be kept secret both from unauthorized users and the service provider (SP). Existing approaches propose that the data owner(s) encrypt the data before it is transferred to the service provider to preserve confidentiality. Access is only granted to a user initiated program if the key presented can decrypt the data into a readable format. Therefore the data owner can control access to the data without having to worry about the management costs. However, this approach fails to monitor the data once it has been retrieved from the SP’s end. So, a user can retrieve information from the SP’s end and share it with unauthorized users or even the SP. We propose a conceptual framework, based on the concept of dependence graphs, for monitoring data exchanges between programs in order to prevent unauthorized access. The framework has a distributed architecture which is suitable for data outsourcing environments and the web in general. Each data object contains a cryptographic tag (like an invisible digital watermark) that is computed by using a cryptographic hash function to combine the checksum of the data and the encryption key. In order to execute an operation with a data object the key presented for decryption must match the one associated with the user’s role and generate a cryptographic tag that matches the one embedded into the data. Tracing data exchanges, in this way, can leverage data privacy for organizations that transfer data management to third party service providers.

Item Type: Conference paper
Uncontrolled Keywords: Information flow control, Outsourced data, cryptographic access control
Subjects: Information systems > Information retrieval
Information systems > Data management systems > Data structures > Data layout > Data encryption
Alternate Locations: http://people.cs.uct.ac.za/~akayem/Publications.html, http://ieeexplore.ieee.org/search/searchresult.jsp?newsearch=true&queryText=On+Monitoring+Information+flow+of+Outsourced+Data&tag=1
Date Deposited: 01 Dec 2010
Last Modified: 10 Oct 2019 15:33
URI: http://pubs.cs.uct.ac.za/id/eprint/644

Actions (login required)

View Item View Item