Lattice-based enforcement of Chinese Walls
Computers and Security
Models and issues in data stream systems
Proceedings of the twenty-first ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems
Information Security: An Integrated Collection of Essays
Information Security: An Integrated Collection of Essays
The VLDB Journal — The International Journal on Very Large Data Bases
The CQL continuous query language: semantic foundations and query execution
The VLDB Journal — The International Journal on Very Large Data Bases
SnoopIB: interval-based event specification and detection for active databases
Data & Knowledge Engineering
Securing the Borealis Data Stream Engine
IDEAS '06 Proceedings of the 10th International Database Engineering and Applications Symposium
Enforcing access control over data streams
Proceedings of the 12th ACM symposium on Access control models and technologies
Managing the risk of covert information flows in virtual machine systems
Proceedings of the 12th ACM symposium on Access control models and technologies
Monitoring streams: a new class of data management applications
VLDB '02 Proceedings of the 28th international conference on Very Large Data Bases
Events and streams: harnessing and unleashing their synergy!
Proceedings of the second international conference on Distributed event-based systems
A Security Punctuation Framework for Enforcing Access Control on Streaming Data
ICDE '08 Proceedings of the 2008 IEEE 24th International Conference on Data Engineering
ACStream: Enforcing Access Control over Data Streams
ICDE '09 Proceedings of the 2009 IEEE International Conference on Data Engineering
Stream Data Processing: A Quality of Service Perspective Modeling, Scheduling, Load Shedding, and Complex Event Processing
StreamShield: a stream-centric approach towards security and privacy in data stream environments
Proceedings of the 2009 ACM SIGMOD International Conference on Management of data
Secure shared continuous query processing
Proceedings of the 2011 ACM Symposium on Applied Computing
Multilevel secure data stream processing
DBSec'11 Proceedings of the 25th annual IFIP WG 11.3 conference on Data and applications security and privacy
A Tiered Strategy for Auditing in the Cloud
CLOUD '12 Proceedings of the 2012 IEEE Fifth International Conference on Cloud Computing
Hi-index | 0.00 |
In the near future, clouds will provide situational monitoring services using streaming data. Examples of such services include health monitoring, stock market monitoring, shopping cart monitoring, and emergency control and threat management. Offering such services require securely processing data streams generated by multiple, possibly competing and/or complementing, organizations. Processing of data streams also should not cause any overt or covert leakage of information across organizations. We propose an information flow control model adapted from the Chinese Wall policy that can be used to protect against sensitive data disclosure. We propose architectures that are suitable for securely and efficiently processing streaming information belonging to different organizations. We discuss how performance can be further improved by sharing the processing of multiple queries. We demonstrate the feasibility of our approach by implementing a prototype of our system and show the overhead incurred due to the information flow constraints.