skip to main content
10.1145/2133601.2133633acmconferencesArticle/Chapter ViewAbstractPublication PagescodaspyConference Proceedingsconference-collections
short-paper

Towards end-to-end secure content storage and delivery with public cloud

Published:07 February 2012Publication History

ABSTRACT

Recent years have witnessed the trend of leveraging cloud-based services for large scale content storage, processing, and distribution. Security and privacy are among top concerns for the public cloud environments. Towards end-to-end content security, we propose and implement CloudSeal, a scheme for securely sharing and distributing content via the public cloud. CloudSeal ensures the confidentiality of content in the public cloud environments with flexible access control policies for subscribers and efficient content distribution via content delivery network.

CloudSeal seamlessly integrates symmetric encryption, proxy-based re-encryption, k-out-of-n secret sharing, and broadcast revocation mechanisms. These algorithms allow CloudSeal to cache the major part of a stored cipher content object in the delivery network for content distribution, while keeping the minor part in the cloud storage for key management. The separation of subscription-based key management and confidentiality-oriented proxy-based re-encryption policies uniquely enables flexible and scalable deployment of the solution as well as strong security for cached content in the network. We have implemented CloudSeal on Amazon Web Services, including EC2, S3, and CloudFront. Through experimental evaluation, we demonstrate the end-to-end efficiency and scalability of CloudSeal.

References

  1. Amazon Web Services. http://aws.amazon.com.Google ScholarGoogle Scholar
  2. boto: Python interface to amazon web services. http://code.google.com/p/boto/ .Google ScholarGoogle Scholar
  3. Netflix on Amazon's Cloud. http://www.techflash.com/seattle/2010/05/netflix_on_amazon_cloud.html.Google ScholarGoogle Scholar
  4. OpenSSL Cryptography and SSL/TLS Tookit, http://www.openssl.org/.Google ScholarGoogle Scholar
  5. Pairing-based cryptography (pbc) library.http://crypto.stanford.edu/pbc/Google ScholarGoogle Scholar
  6. Cloud Computing, an IDC update, 2010.Google ScholarGoogle Scholar
  7. AWS Customer Agreement http://aws.amazon.com/agreement/, 2011.Google ScholarGoogle Scholar
  8. G. Ateniese, K. Fu, M. Green, and S. Hohenberger. Improved Proxy Re-encryption Schemes with Applications to Secure Distributed Storage. ACM Trans. Inf. Syst. Secur., 9:1--30, February 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. E. Bertino, F. Paci, R. Ferrini, and N. Shang. Privacy-preserving Digital Identity Management for Cloud Computing. IEEE Data Eng. Bull., 2009.Google ScholarGoogle Scholar
  10. D. Boneh and M. K. Franklin. Identity-based Encryption from the Weil Pairing. In CRYPTO '01. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. D. Boneh, B. Lynn, and H. Shacham. Short Signatures from the Weil Pairing. In Proc. of ASIACRYPT '01. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. B. Briscoe. MARKS: Multicast Key Management using Arbitratily Revealed Key Sequences. In Proceedings of NGC'99. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. B. Briscoe. Nark: Receiver-based Multicast Non-repudiation and Key Management. In Proceedings of EC'99. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. R. Canetti, J. Garay, G. Itkis, D. Micciancio, M. Naor, and B. Pinkas. Multicast Security: A Taxonomy and Some Efficient Constructions. In INFOCOM '99.Google ScholarGoogle Scholar
  15. Y.-P. Chiu, C.-L. Lei, and C.-Y. Huang. Secure Multicast Using Proxy Encryption. In Information and Communications Security, Lecture Notes in Computer Science. 2005.Google ScholarGoogle ScholarCross RefCross Ref
  16. R. Chow, P. Golle, M. Jakobsson, E. Shi, J. Staddon, R. Masuoka, and J. Molina. Controlling Data in the Cloud: Outsourcing Computation without Outsourcing Control. In Proceedings of CCSW '09. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. V. Goyal, O. Pandey, A. Sahai, and B. Waters. Attribute-based Encryption for Fine-grained Access Control of Encrypted Data. In Proc. of ACM CCS, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Cisco Inc. Cisco Visual Networking Index: Forecast and Methodology, 2010--2015. White paper, Cisco., 2011.Google ScholarGoogle Scholar
  19. M. Kallahalla, E. Riedel, R. Swaminathan, Q. Wang, and K. Fu. Plutus: Scalable Secure File Sharing on Untrusted Storage. In Proceedings of FAST, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Y. Koglin, D. Yao, and E. Bertino. Secure Content Distribution by Parallel Processing from Cooperative Intermediaries. IEEE Transactions on Parallel and Distributed Systems, 2008.Google ScholarGoogle Scholar
  21. D. Lin and A. Squicciarini. Data Protection Models for Service Provisioning in the Cloud. In Proceeding of ACM SACMAT '10. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. Lockheed Martin, LM Cyber Security Alliance. Awareness, Trust and Security to Shape Government Cloud Adoption. White paper, Cisco, 2010.Google ScholarGoogle Scholar
  23. M. Nabeel, N. Shang, J. Zage, and E. Bertino. Mask: A System for Privacy-preserving Policy-based Access to Published Content. In Proceedings of SIGMOD '10. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. M. Naor and B. Pinkas. Efficient Trace and Revoke Schemes. In Proceedings of the 4th International Conference on Financial Cryptography, 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. Pomelo, LLC Tech Memo. Analysis of Netflix's Security Framework for Watch Instantly Service, 2009.Google ScholarGoogle Scholar
  26. T. Ristenpart, E. Tromer, H. Shacham, and S. Savage. Hey, You, Get Off of My cloud! Exploring Information Leakage in Third-Party Compute Clouds. In Proceedings of CCS, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. R. Sandhu, R. Boppana, R. Krishnan, J. Reich, T. Wolff, and J. Zachry. Towards A Discipline of Mission-aware Cloud Computing. In Proceedings of the 2010 ACM workshop on Cloud computing security workshop, CCSW '10. Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. Cloud Security Alliance. Security Guidance for Critical Areas of Focus in Cloud Computing V2.1, 2009. https://cloudsecurityalliance.org/csaguide.pdf.Google ScholarGoogle Scholar
  29. A. Shamir. How to Share A Secret. Commun. ACM, 22, November 1979. Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. P. Traynor, K. R. B. Butler, W. Enck, and P. McDaniel. Realizing Massive-Scale Conditional Access Systems Through Attribute-Based Cryptosystems. In NDSS, 2008.Google ScholarGoogle Scholar
  31. W. Wang, Z. Li, R. Owens, and B. Bhargava. Secure and Efficient Access to Outsourced Data. In Proceedings of CCSW '09. Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. C. K. Wong, M. Gouda, and S. S. Lam. Secure Group Communications Using Key Graphs. IEEE/ACM Trans. Netw., 8, February 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. H. Xiong, X. Zhang, W. Zhu, and D. Yao. Cloudseal: End-to-End Content Protection in Cloud-based Storage and Delivery Services. In Proceedings of Securecomm, 2011.Google ScholarGoogle Scholar
  34. D. Yao, Y. Koglin, E. Bertino, and R. Tamassia. Decentralized Authorization and Data Security in Web Content Delivery. In Proc ACM Symp. on Applied Computing (SAC), 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  35. S. Yu, C. Wang, K. Ren, and W. Lou. Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing. In INFOCOM'10. Google ScholarGoogle ScholarDigital LibraryDigital Library
  36. S. Zarandioon, D. Yao, and V. Ganapathy. K2C: Cryptographic Cloud Storage With Lazy Revocation and Anonymous Access. In Proceedings of Securecomm, 2011.Google ScholarGoogle Scholar
  37. L. Zhou, V. Varadharajan, and M. Hitchens. Enforcing role-based access control for secure data storage in the cloud. The Computer Journal, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  38. S. Zhu, C. Yao, D. Liu, S. Setia, and S. Jajodia. Efficient Security Mechanisms for Overlay Multicast based Content Delivery. Comput. Commun., 30:793--806, February 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Towards end-to-end secure content storage and delivery with public cloud

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in
          • Published in

            cover image ACM Conferences
            CODASPY '12: Proceedings of the second ACM conference on Data and Application Security and Privacy
            February 2012
            338 pages
            ISBN:9781450310918
            DOI:10.1145/2133601

            Copyright © 2012 ACM

            Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            • Published: 7 February 2012

            Permissions

            Request permissions about this article.

            Request Permissions

            Check for updates

            Qualifiers

            • short-paper

            Acceptance Rates

            CODASPY '12 Paper Acceptance Rate21of113submissions,19%Overall Acceptance Rate149of789submissions,19%

            Upcoming Conference

            CODASPY '24

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader