User Tools

Site Tools


securing_access_to_cloud_storage

This is an old revision of the document!


Securing Access to Cloud Storage

Data outsourcing is a growing business model offering services to individuals and enterprises for processing and storing a huge amount of data. It is not only economical but also promises higher availability, scalability, and more effective quality of service than in-house solutions. Despite all its benefits, data outsourcing raises serious security concerns for preserving data confidentiality. Not only data but policies, regulating access on data, may reveal sensitive information when they are available in cleartext on the cloud. Therefore, the major research challenges include protection of data, as well as access control policies.

The Proposed Approach

Themes

Among the research topics of the Security Group, the main stream of this research topic is to regulate access to cloud storage without leaking private information about the sensitive data. In this research activity, we covered a number of themes, in particular,

  • Querying encrypted data securely
  • Enforcement of encrypted security policies
  • Enforcing Role-Based Access Control (RBAC) in an encrypted manner
  • Secure enforcement of dynamic security constraints

People

The following is a list a people that have been involved in this research activity at some point in time.

Publications

  • Muhammad Rizwan Asghar, Mihaela Ion, Giovanni Russello, and Bruno Crispo, ESPOONERBAC: Enforcing security policies in outsourced environments, Elsevier Computers & Security (COSE), 2012. In Press. PDF
  • Mihaela Ion, Giovanni Russello, and Bruno Crispo, Enforcing Multi-user Access Policies to Encrypted Cloud Databases, In Proceedings of the 12th IEEE International Symposium on Policies for Distributed Systems and Networks (POLICY), Pisa, Italy, June 2011.
  • Muhammad Rizwan Asghar, Giovanni Russello, and Bruno Crispo, Poster: ESPOONERBAC: Enforcing security policies in outsourced environments with encrypted RBAC, In Proceedings of the 18th ACM Conference on Computer and Communications Security, CCS '11, pages 841-844. ACM, 2011.
  • Muhammad Rizwan Asghar, Mihaela Ion, Giovanni Russello, and Bruno Crispo, ESPOON: Enforcing Encrypted Security Policies in Outsourced Environments, In Proceedings of the 6th International Conference on Availability, Reliability and Security, ARES'11, pages 99-108. IEEE Computer Society, August 2011. PDF
  • Muhammad Rizwan Asghar, Mihaela Ion, Giovanni Russello, and Bruno Crispo, Securing Data Provenance in the Cloud, IFIP WG 11.4 - Open Problems in Network Security (iNetSec), Lucerne, Switzerland, June 2011.

Talks, Tutorials and Demo

  • Muhammad Rizwan Asghar, Enforcing Security Policies in Outsourced Environments, The 3rd Workshop on Cryptography (BunnyTN3), Trento, Italy, March 2012.
  • Muhammad Rizwan Asghar, ESPOON: Enforcing Encrypted Security Policies in Outsourced Environments, The 6th IEEE International Conference on Availability, Reliability and Security (ARES), Vienna, Austria, August 2011.
  • Muhammad Rizwan Asghar, Securing Data Provenance in the Cloud, IFIP WG 11.4 - Open Problems in Network Security (iNetSec), Lucerne, Switzerland, June 2011.
  • Muhammad Rizwan Asghar, Enforcing Multi-user Access Policies to Encrypted Cloud Databases, The 12th IEEE International Symposium on Policies for Distributed Systems and Networks (POLICY), Pisa, Italy, June 2011.

Projects

This research activity was supported by the following projects

securing_access_to_cloud_storage.1367509594.txt.gz · Last modified: 2021/01/29 10:58 (external edit)