skip to main content
10.1145/2462410.2463205acmconferencesArticle/Chapter ViewAbstractPublication PagessacmatConference Proceedingsconference-collections
research-article

Information flow control for stream processing in clouds

Published:12 June 2013Publication History

ABSTRACT

In the near future, clouds will provide situational monitoring services using streaming data. Examples of such services include health monitoring, stock market monitoring, shopping cart monitoring, and emergency control and threat management. Offering such services require securely processing data streams generated by multiple, possibly competing and/or complementing, organizations. Processing of data streams also should not cause any overt or covert leakage of information across organizations. We propose an information flow control model adapted from the Chinese Wall policy that can be used to protect against sensitive data disclosure. We propose architectures that are suitable for securely and efficiently processing streaming information belonging to different organizations. We discuss how performance can be further improved by sharing the processing of multiple queries. We demonstrate the feasibility of our approach by implementing a prototype of our system and show the overhead incurred due to the information flow constraints.

References

  1. D. J. Abadi, Y. Ahmad, M. Balazinska, U. Çetintemel, M. Cherniack, J. Hwang, W. Lindner, A. Maskey, A.Rasin, E.Ryvkina, N.Tatbul, Y.Xing, and S. B. Zdonik. The Design of the Borealis Stream Processing Engine. In Proc. of the CIDR, pages 277--289, 2005.Google ScholarGoogle Scholar
  2. M. D. Abrams, S. G. Jajodia, and H. J. Podell, editors. Information Security: An Integrated Collection of Essays. IEEE Computer Society Press, Los Alamitos, CA, USA, 1st edition, 1995. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. R. Adaikkalavan and S. Chakravarthy. SnoopIB: Interval-based Event Specification and Detection for Active Databases. DKE, 59(1):139--165, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. R. Adaikkalavan and T. Perez. Secure Shared Continuous Query Processing. In Proc. of the ACM SAC (Data Streams Track), pages 1005--1011, Taiwan, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. R. Adaikkalavan, I. Ray, and X. Xie. Multilevel Secure Data Stream Processing. In Proc. of the DBSec, pages 122--137, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. A. Arasu, B. Babcock, S. Babu, J. Cieslewicz, M. Datar, K. Ito, R. Motwani, U. Srivastava, and J. Widom. STREAM: The Stanford Data Stream Management System. Technical Report 2004--20, Stanford InfoLab, 2004.Google ScholarGoogle Scholar
  7. A. Arasu, S. Babu, and J. Widom. The CQL Continuous Query Language: Semantic Foundations and Query Execution. VLDB Journal, 15(2):121--142, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. B. Babcock, S. Babu, M. Datar, R. Motwani, and J. Widom. Models and Issues in Data Stream Systems. In Proc. of the PODS, pages 1--16, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. H. Balakrishnan, M. Balazinska, D. Carney, U. Çetintemel, M. Cherniack, C. Convey, E. Galvez, J. Salz, M. Stonebraker, N. Tatbul, R. Tibbetts, and S. B. Zdonik. Retrospective on Aurora. VLDB Journal: Special Issue on Data Stream Processing, 13(4):370--383, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. D. E. Bell and L. J. LaPadula. Secure Computer System: Unified Exposition and MULTICS Interpretation. Technical Report MTR-2997 Rev. 1 and ESD-TR-75--306, rev. 1, The MITRE Corporation, Bedford, MA 01730, 1976.Google ScholarGoogle ScholarCross RefCross Ref
  11. D. F. C. Brewer and M. J. Nash. The Chinese Wall Security Policy. In Proc. of the IEEE S & P, pages 206--214, 1989.Google ScholarGoogle ScholarCross RefCross Ref
  12. J. Cao, B. Carminati, E. Ferrari, and K. Tan. ACStream: Enforcing Access Control over Data Streams. In Proc. of the ICDE, pages 1495--1498, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. B. Carminati, E. Ferrari, and K. L. Tan. Enforcing Access Control over Data Streams. In Proc. of the ACM SACMAT, pages 21--30, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. D. Carney, U. Çetintemel, M. Cherniack, C. Convey, S. Lee, G. Seidman, M. Stonebraker, N. Tatbul, and S. B. Zdonik. Monitoring Streams - A New Class of Data Management Applications. In Proc. of the VLDB, pages 215--226, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. S. Chakravarthy and R. Adaikkalavan. Event and Streams: Harnessing and Unleashing Their Synergy. In Proc. of the DEBS, pages 1--12, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. S. Chakravarthy and Q. Jiang. Stream Data Processing: A Quality of Service Perspective Modeling, Scheduling, Load Shedding, and Complex Event Processing. Advances in Database Systems , Vol. 36. Springer, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. M. Cherniack, H. Balakrishnan, M. Balazinska, D. Carney, U. Çetintemel, Y. Xing, and S. B. Zdonik. Scalable Distributed Stream Processing. In Proc. of the CIDR, 2003.Google ScholarGoogle Scholar
  18. T. Jaeger, R. Sailer, and Y. Sreenivasan. Managing the Risk of Covert Information Flows in Virtual Machine Systems. In Proc. of the ACM SACMAT, pages 81--90, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Q. Jiang and S. Chakravarthy. Anatomy of a Data Stream Management System. In ADBIS Research Communications, 2006.Google ScholarGoogle Scholar
  20. W. Lindner and J. Meier. Securing the Borealis Data Stream Engine. In IDEAS, pages 137--147, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. R. V. Nehme, H. Lim, E. Bertino, and E. A. Rundensteiner. StreamShield: A Stream-Centric Approach towards Security and Privacy in Data Stream Environments. In Proc. of the ACM SIGMOD, pages 1027--1030, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. R. V. Nehme, E. A. Rundensteiner, and E. Bertino. A Security Punctuation Framework for Enforcing Access Control on Streaming Data. In Proc. of the ICDE, pages 406--415, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. R. Sandhu. Lattice-Based Enforcement of Chinese Walls. Computers & Security, 11(8):753--763, 1992. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. T. Tsai, Y. Chen, H. Huang, P. Huang, and K. Chou. A Practical Chinese Wall Security Model in Cloud Computing. In Proc. of the APNOMS, pages 1--4, 2011.Google ScholarGoogle ScholarCross RefCross Ref
  25. R. Wu, G. Ahn, H. Hu, and M. Singhal. Information Flow Control in Cloud Computing. In Proc. of the CollaborateCom, pages 1--7, 2010.Google ScholarGoogle ScholarCross RefCross Ref
  26. R. Xie and R. Gamble. A Tiered Strategy for Auditing in the Cloud. In Proc. of IEEE CLOUD, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Information flow control for stream processing in clouds

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Conferences
          SACMAT '13: Proceedings of the 18th ACM symposium on Access control models and technologies
          June 2013
          278 pages
          ISBN:9781450319508
          DOI:10.1145/2462410

          Copyright © 2013 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 12 June 2013

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • research-article

          Acceptance Rates

          SACMAT '13 Paper Acceptance Rate19of62submissions,31%Overall Acceptance Rate177of597submissions,30%

          Upcoming Conference

          SACMAT 2024

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader