Adaptive data protection in distributed sysems

Anna Squicciarini, Giuseppe Petracca, Elisa Bertino

Research output: Chapter in Book/Report/Conference proceedingConference contribution

14 Citations (Scopus)

Abstract

Security is an important barrier to wide adoption of distributed systems for sensitive data storage and management. In particular, one unsolved problem is to ensure that customers data protection policies are honored, regardless of where the data is physically stored and how often it is accessed, modified, and duplicated. This issue calls for two requirements to be satisfied. First, data should be managed in accordance to both owners' preferences and to the local regulations that may apply. Second, although multiple copies may exist, a consistent view across copies should be maintained. Toward addressing these issues, in this work we propose innovative policy enforcement techniques for adaptive sharing of users' outsourced data. We introduce the notion of autonomous self-controlling objects (SCO), that by means of object-oriented programming techniques, encapsulate sensitive resources and assure their protection by means of adaptive security policies of various granularity, and synchronization protocols. Through extensive evaluation, we show that our approach is effective and efficiently manages multiple data copies.

Original languageEnglish (US)
Title of host publicationCODASPY 2013 - Proceedings of the 3rd ACM Conference on Data and Application Security and Privacy
Pages365-376
Number of pages12
DOIs
StatePublished - Mar 18 2013
Event3rd ACM Conference on Data and Application Security and Privacy, CODASPY 2013 - San Antonio, TX, United States
Duration: Feb 18 2013Feb 20 2013

Publication series

NameCODASPY 2013 - Proceedings of the 3rd ACM Conference on Data and Application Security and Privacy

Other

Other3rd ACM Conference on Data and Application Security and Privacy, CODASPY 2013
CountryUnited States
CitySan Antonio, TX
Period2/18/132/20/13

Fingerprint

Data privacy
Object oriented programming
Synchronization
Network protocols
Data storage equipment

All Science Journal Classification (ASJC) codes

  • Computer Science Applications
  • Software

Cite this

Squicciarini, A., Petracca, G., & Bertino, E. (2013). Adaptive data protection in distributed sysems. In CODASPY 2013 - Proceedings of the 3rd ACM Conference on Data and Application Security and Privacy (pp. 365-376). (CODASPY 2013 - Proceedings of the 3rd ACM Conference on Data and Application Security and Privacy). https://doi.org/10.1145/2435349.2435401
Squicciarini, Anna ; Petracca, Giuseppe ; Bertino, Elisa. / Adaptive data protection in distributed sysems. CODASPY 2013 - Proceedings of the 3rd ACM Conference on Data and Application Security and Privacy. 2013. pp. 365-376 (CODASPY 2013 - Proceedings of the 3rd ACM Conference on Data and Application Security and Privacy).
@inproceedings{2223b23587ac4f9788f9377e780be5e3,
title = "Adaptive data protection in distributed sysems",
abstract = "Security is an important barrier to wide adoption of distributed systems for sensitive data storage and management. In particular, one unsolved problem is to ensure that customers data protection policies are honored, regardless of where the data is physically stored and how often it is accessed, modified, and duplicated. This issue calls for two requirements to be satisfied. First, data should be managed in accordance to both owners' preferences and to the local regulations that may apply. Second, although multiple copies may exist, a consistent view across copies should be maintained. Toward addressing these issues, in this work we propose innovative policy enforcement techniques for adaptive sharing of users' outsourced data. We introduce the notion of autonomous self-controlling objects (SCO), that by means of object-oriented programming techniques, encapsulate sensitive resources and assure their protection by means of adaptive security policies of various granularity, and synchronization protocols. Through extensive evaluation, we show that our approach is effective and efficiently manages multiple data copies.",
author = "Anna Squicciarini and Giuseppe Petracca and Elisa Bertino",
year = "2013",
month = "3",
day = "18",
doi = "10.1145/2435349.2435401",
language = "English (US)",
isbn = "9781450318907",
series = "CODASPY 2013 - Proceedings of the 3rd ACM Conference on Data and Application Security and Privacy",
pages = "365--376",
booktitle = "CODASPY 2013 - Proceedings of the 3rd ACM Conference on Data and Application Security and Privacy",

}

Squicciarini, A, Petracca, G & Bertino, E 2013, Adaptive data protection in distributed sysems. in CODASPY 2013 - Proceedings of the 3rd ACM Conference on Data and Application Security and Privacy. CODASPY 2013 - Proceedings of the 3rd ACM Conference on Data and Application Security and Privacy, pp. 365-376, 3rd ACM Conference on Data and Application Security and Privacy, CODASPY 2013, San Antonio, TX, United States, 2/18/13. https://doi.org/10.1145/2435349.2435401

Adaptive data protection in distributed sysems. / Squicciarini, Anna; Petracca, Giuseppe; Bertino, Elisa.

CODASPY 2013 - Proceedings of the 3rd ACM Conference on Data and Application Security and Privacy. 2013. p. 365-376 (CODASPY 2013 - Proceedings of the 3rd ACM Conference on Data and Application Security and Privacy).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

TY - GEN

T1 - Adaptive data protection in distributed sysems

AU - Squicciarini, Anna

AU - Petracca, Giuseppe

AU - Bertino, Elisa

PY - 2013/3/18

Y1 - 2013/3/18

N2 - Security is an important barrier to wide adoption of distributed systems for sensitive data storage and management. In particular, one unsolved problem is to ensure that customers data protection policies are honored, regardless of where the data is physically stored and how often it is accessed, modified, and duplicated. This issue calls for two requirements to be satisfied. First, data should be managed in accordance to both owners' preferences and to the local regulations that may apply. Second, although multiple copies may exist, a consistent view across copies should be maintained. Toward addressing these issues, in this work we propose innovative policy enforcement techniques for adaptive sharing of users' outsourced data. We introduce the notion of autonomous self-controlling objects (SCO), that by means of object-oriented programming techniques, encapsulate sensitive resources and assure their protection by means of adaptive security policies of various granularity, and synchronization protocols. Through extensive evaluation, we show that our approach is effective and efficiently manages multiple data copies.

AB - Security is an important barrier to wide adoption of distributed systems for sensitive data storage and management. In particular, one unsolved problem is to ensure that customers data protection policies are honored, regardless of where the data is physically stored and how often it is accessed, modified, and duplicated. This issue calls for two requirements to be satisfied. First, data should be managed in accordance to both owners' preferences and to the local regulations that may apply. Second, although multiple copies may exist, a consistent view across copies should be maintained. Toward addressing these issues, in this work we propose innovative policy enforcement techniques for adaptive sharing of users' outsourced data. We introduce the notion of autonomous self-controlling objects (SCO), that by means of object-oriented programming techniques, encapsulate sensitive resources and assure their protection by means of adaptive security policies of various granularity, and synchronization protocols. Through extensive evaluation, we show that our approach is effective and efficiently manages multiple data copies.

UR - http://www.scopus.com/inward/record.url?scp=84874822744&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84874822744&partnerID=8YFLogxK

U2 - 10.1145/2435349.2435401

DO - 10.1145/2435349.2435401

M3 - Conference contribution

AN - SCOPUS:84874822744

SN - 9781450318907

T3 - CODASPY 2013 - Proceedings of the 3rd ACM Conference on Data and Application Security and Privacy

SP - 365

EP - 376

BT - CODASPY 2013 - Proceedings of the 3rd ACM Conference on Data and Application Security and Privacy

ER -

Squicciarini A, Petracca G, Bertino E. Adaptive data protection in distributed sysems. In CODASPY 2013 - Proceedings of the 3rd ACM Conference on Data and Application Security and Privacy. 2013. p. 365-376. (CODASPY 2013 - Proceedings of the 3rd ACM Conference on Data and Application Security and Privacy). https://doi.org/10.1145/2435349.2435401