Secure Data Exchange and Data Leakage Detection in an Untrusted Cloud

In service-oriented architecture, services can communicate and share data amongst themselves. It is necessary to provide role-based access control for data. In addition, data leakages made by authorized insiders to unauthorized services should be detected and reported back to the data owner. In this...

Full description

Saved in:
Bibliographic Details
Published inApplications of Computing and Communication Technologies Vol. 899; pp. 99 - 113
Main Authors Ulybyshev, Denis, Bhargava, Bharat, Oqab-Alsalem, Aala
Format Book Chapter
LanguageEnglish
Published Singapore Springer 01.01.2018
Springer Singapore
SeriesCommunications in Computer and Information Science
Subjects
Online AccessGet full text
ISBN9811320349
9789811320347
ISSN1865-0929
1865-0937
DOI10.1007/978-981-13-2035-4_10

Cover

More Information
Summary:In service-oriented architecture, services can communicate and share data amongst themselves. It is necessary to provide role-based access control for data. In addition, data leakages made by authorized insiders to unauthorized services should be detected and reported back to the data owner. In this paper, we propose a solution that uses role- and attribute-based access control for data exchange among services, including services hosted by untrusted environments. Our approach provides data leakage prevention and detection for multiple leakage scenarios. We also propose a damage assessment model for data leakages. The implemented prototype supports a privacy-preserving exchange of Electronic Health Records that can be hosted by untrusted cloud providers, as well as detecting leakages made by insiders.
ISBN:9811320349
9789811320347
ISSN:1865-0929
1865-0937
DOI:10.1007/978-981-13-2035-4_10