Private Use of Untrusted Web Servers via Opportunistic Encryption
نویسنده
چکیده
Users clamor for online services hosted on remote web servers. As a result, there is a growing concern about the security and privacy of the data uploaded by users to such remote services, which are under the control of potentially untrusted parties. A fair amount of work has focused on preventing, detecting, and correcting security breaches of web services, with limited efforts spent on the privacy concerns. Here we argue that the assurance of online data privacy must go beyond legal or social contracts, which provide only post-facto redress, to employ technical solutions. We sketch an architecture that enhances the privacy of data sent to remote web servers, in spite of any actions by the parties controlling the web servers. Towards this end, we propose the use of client-side opportunistic encryption and decryption to allow the user to control the future use of any data they upload to a web server. We examine the challenges involved and proposed new research directions.
منابع مشابه
Integrity and access control in untrusted content distribution networks
A content distribution network (CDN) makes a publisher’s content highly available to readers through replication on remote computers. Content stored on untrusted servers is susceptible to attack, but a reader should have confidence that content originated from the publisher and that the content is unmodified. This thesis presents the SFS read-only file system (SFSRO) and key regression in the C...
متن کاملSecGDB: Graph Encryption for Exact Shortest Distance Queries with Efficient Updates
In the era of big data, graph databases have become increasingly important for NoSQL technologies, and many systems (e.g., online social networks, world-wide web and electrical grids, etc.) can be modeled as graphs for semantic queries. Meanwhile, with the advent of cloud computing, data owners are highly motivated to outsource and store their massive potentially-sensitive graph data on remote ...
متن کاملSecGDB: Graph Encryption for Exact Shortest Distance Queries with E cient Updates
In the era of big data, graph databases have become increasingly important for NoSQL technologies, and many systems (e.g., online social networks, world-wide web and electrical grids, etc.) can be modeled as graphs for semantic queries. Meanwhile, with the advent of cloud computing, data owners are highly motivated to outsource and store their massive potentially-sensitive graph data on remote ...
متن کاملEfficient and Secure Web Services by using Multi Agents
Mobile agents are an excellent technology for implementing Web services. Within a set of federated Web services, mobile agents can reduce bandwidth requirements and mitigate the effects of high-latency network connections. This paper presents a model for implementing Web services with mobile agents where agents are free to move between cooperating Web servers to implement the service functional...
متن کاملDeterministic and Efficiently Searchable Encryption
To provide some background to the paper, in the database literature, the naive solution of providing public key encryption on untrusted database servers (for example, data stored in a rented cloud server) includes encrypting every record non-deterministically in order to provide notions of privacy in the database. In other words, in order to find particular records in an encrypted database, the...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2008