首页 > 最新文献

Proceedings of the 4th ACM International Workshop on Security in Cloud Computing最新文献

英文 中文
Session details: Paper Session 3: Applications 会议详情:论文会议3:应用
Yuan Zhang
{"title":"Session details: Paper Session 3: Applications","authors":"Yuan Zhang","doi":"10.1145/3247611","DOIUrl":"https://doi.org/10.1145/3247611","url":null,"abstract":"","PeriodicalId":187535,"journal":{"name":"Proceedings of the 4th ACM International Workshop on Security in Cloud Computing","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126798344","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A New Secure Index Supporting Efficient Index Updating and Similarity Search on Clouds 一种支持云上高效索引更新和相似度搜索的安全索引
Baojia Zhang, He Zhang, Boqun Yan, Yuan Zhang
With the increasing popularity of cloud storage services, many individuals and enterprises start to move their local data to the clouds. To ensure their privacy and data security, some cloud service users may want to encrypt their data before outsourcing them. However, this impedes efficient data utilities based on the plain text search. In this paper, we study how to construct a secure index that supports both efficient index updating and similarity search. Using the secure index, users are able to efficiently perform similarity searches tolerating input mistakes and update the index when new data are available. We formally prove the security of our proposal and also perform experiments on real world data to show its efficiency.
随着云存储服务的日益普及,许多个人和企业开始将本地数据迁移到云上。为了确保他们的隐私和数据安全,一些云服务用户可能希望在外包之前加密他们的数据。然而,这阻碍了基于纯文本搜索的高效数据实用程序。本文研究了如何构建一个既支持高效索引更新又支持相似度搜索的安全索引。使用安全索引,用户能够有效地执行相似性搜索,允许输入错误,并在有新数据可用时更新索引。我们正式证明了我们的提议的安全性,并在现实世界的数据上进行了实验来证明它的有效性。
{"title":"A New Secure Index Supporting Efficient Index Updating and Similarity Search on Clouds","authors":"Baojia Zhang, He Zhang, Boqun Yan, Yuan Zhang","doi":"10.1145/2898445.2898451","DOIUrl":"https://doi.org/10.1145/2898445.2898451","url":null,"abstract":"With the increasing popularity of cloud storage services, many individuals and enterprises start to move their local data to the clouds. To ensure their privacy and data security, some cloud service users may want to encrypt their data before outsourcing them. However, this impedes efficient data utilities based on the plain text search. In this paper, we study how to construct a secure index that supports both efficient index updating and similarity search. Using the secure index, users are able to efficiently perform similarity searches tolerating input mistakes and update the index when new data are available. We formally prove the security of our proposal and also perform experiments on real world data to show its efficiency.","PeriodicalId":187535,"journal":{"name":"Proceedings of the 4th ACM International Workshop on Security in Cloud Computing","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122241413","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Proceedings of the 4th ACM International Workshop on Security in Cloud Computing 第四届ACM云计算安全国际研讨会论文集
Sheng Zhong, A. Squicciarini
We are very delighted to welcome everybody to the 2016 International Workshop on Security in Cloud Computing (SCC). There is no doubt that cloud computing has changed the paradigm of computing greatly. Hence, the security and privacy problems in cloud computing are of high importance. A lot of research and development efforts have been invested on related topics. The objective of this workshop is thus to bring together researchers and developers in this field, to enable them to share information about their recent progresses. The year of 2016 is the fourth for the SCC workshop. In total, 31 submissions were made from fifteen countries and regions, including Australia, Austria, Canada, China, Colombia, France, Germany, Hong Kong, India, Italy, Japan, Luxembourg, Singapore, United Kingdom, and United States. After a careful review by the program committee, 12 papers were selected for presentation at the workshop. We thank the Program Committee members as well as the external reviewers for their hard work. This year's SCC workshop also features a keynote speech "Giano - toward Large Scale Access Security Management in Private Cloud", by Dr. Ye Wu from Baidu, Inc. Given the leadership of Baidu in the Internet industry and Dr. Wu's splendid record of success in building cloud security systems, we believe this keynote speech will be very beneficial to all participants.
我们非常高兴地欢迎大家参加2016年云计算安全国际研讨会。毫无疑问,云计算已经极大地改变了计算的范式。因此,云计算中的安全和隐私问题非常重要。在相关主题上投入了大量的研究和开发工作。因此,本次研讨会的目的是将该领域的研究人员和开发人员聚集在一起,使他们能够分享有关其最新进展的信息。2016年是第四届SCC研讨会。共有31份参赛作品来自15个国家和地区,包括澳大利亚、奥地利、加拿大、中国、哥伦比亚、法国、德国、香港、印度、意大利、日本、卢森堡、新加坡、英国和美国。经过项目委员会的认真审核,最终选出12篇论文在研讨会上发表。我们感谢项目委员会成员以及外部审稿人的辛勤工作。今年的SCC研讨会还邀请了百度公司的叶武博士发表主题演讲“Giano -迈向私有云的大规模访问安全管理”。鉴于百度在互联网行业的领导地位以及吴博士在构建云安全系统方面的辉煌成功记录,我们相信这次主题演讲将对所有参与者都非常有益。
{"title":"Proceedings of the 4th ACM International Workshop on Security in Cloud Computing","authors":"Sheng Zhong, A. Squicciarini","doi":"10.1145/2898445","DOIUrl":"https://doi.org/10.1145/2898445","url":null,"abstract":"We are very delighted to welcome everybody to the 2016 International Workshop on Security in Cloud Computing (SCC). \u0000 \u0000There is no doubt that cloud computing has changed the paradigm of computing greatly. Hence, the security and privacy problems in cloud computing are of high importance. A lot of research and development efforts have been invested on related topics. The objective of this workshop is thus to bring together researchers and developers in this field, to enable them to share information about their recent progresses. \u0000 \u0000The year of 2016 is the fourth for the SCC workshop. In total, 31 submissions were made from fifteen countries and regions, including Australia, Austria, Canada, China, Colombia, France, Germany, Hong Kong, India, Italy, Japan, Luxembourg, Singapore, United Kingdom, and United States. After a careful review by the program committee, 12 papers were selected for presentation at the workshop. We thank the Program Committee members as well as the external reviewers for their hard work. \u0000 \u0000This year's SCC workshop also features a keynote speech \"Giano - toward Large Scale Access Security Management in Private Cloud\", by Dr. Ye Wu from Baidu, Inc. Given the leadership of Baidu in the Internet industry and Dr. Wu's splendid record of success in building cloud security systems, we believe this keynote speech will be very beneficial to all participants.","PeriodicalId":187535,"journal":{"name":"Proceedings of the 4th ACM International Workshop on Security in Cloud Computing","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133455188","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enabling Assured Deletion in the Cloud Storage by Overwriting 通过覆盖在云存储中启用保证删除
Yuchuan Luo, Ming Xu, Shaojing Fu, Dongsheng Wang
In the cloud storage, users lose direct control over their data. How to surely delete data in the cloud becomes a crucial problem for a secure cloud storage system. The existing way to this problem is to encrypt the data before outsourcing and destroy the encryption key when deleting. However, this solution may cause heavy computation overhead for the user-side and the encrypted data remains intact in the cloud after the deletion operation. To solve this challenge problem, we propose a novel method to surely delete data in the cloud storage by overwriting. Different from existing works, our scheme is efficient in the user-side and is able to wipe out the deleted data from the drives of the cloud servers.
在云存储中,用户失去了对其数据的直接控制。如何安全地删除云存储中的数据成为一个安全的云存储系统的关键问题。目前解决这个问题的方法是在外包前对数据进行加密,删除时销毁加密密钥。但是,这种解决方案可能会给用户端带来沉重的计算开销,并且删除操作后加密的数据在云中保持完整。为了解决这一挑战问题,我们提出了一种新的方法,通过覆盖来确定删除云存储中的数据。与现有的工作不同,我们的方案在用户端是高效的,可以从云服务器的驱动器上擦除已删除的数据。
{"title":"Enabling Assured Deletion in the Cloud Storage by Overwriting","authors":"Yuchuan Luo, Ming Xu, Shaojing Fu, Dongsheng Wang","doi":"10.1145/2898445.2898447","DOIUrl":"https://doi.org/10.1145/2898445.2898447","url":null,"abstract":"In the cloud storage, users lose direct control over their data. How to surely delete data in the cloud becomes a crucial problem for a secure cloud storage system. The existing way to this problem is to encrypt the data before outsourcing and destroy the encryption key when deleting. However, this solution may cause heavy computation overhead for the user-side and the encrypted data remains intact in the cloud after the deletion operation. To solve this challenge problem, we propose a novel method to surely delete data in the cloud storage by overwriting. Different from existing works, our scheme is efficient in the user-side and is able to wipe out the deleted data from the drives of the cloud servers.","PeriodicalId":187535,"journal":{"name":"Proceedings of the 4th ACM International Workshop on Security in Cloud Computing","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128857312","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
Decentralized Secure Data Sharing with Attribute-Based Encryption: A Resource Consumption Analysis 基于属性加密的分散安全数据共享:资源消耗分析
H. Kühner, H. Hartenstein
Secure Data Sharing (SDS) enables users to share data in the cloud in a confidential and integrity-preserving manner. Many recent SDS approaches are based on Attribute-Based Encryption (ABE), leveraging the advantage that ABE allows to address a multitude of users with only one ciphertext. However, ABE approaches often come with the downside that they require a central fully-trusted entity that is able to decrypt any ciphertext in the system. In this paper, we investigate on whether ABE could be used to efficiently implement Decentralized Secure Data Sharing (D-SDS), which explicitly demands that the authorization and access control enforcement is carried out solely by the owner of the data, without the help of a fully-trusted third party. For this purpose, we did a comprehensive analysis of recent ABE approaches with regard to D-SDS requirements. We found one ABE approach to be suitable, and we show different alternatives to employ this ABE approach in a group-based D-SDS scenario. For a realistic estimation of the resource consumption, we give concrete resource consumption values for workloads taken from real-world system traces and exemplary up-to-date mobile devices. Our results indicate that for the most D-SDS operations, the resulting computation times and outgoing network traffic will be acceptable in many use cases. However, the computation times and outgoing traffic for the management of large groups might prevent using mobile devices.
安全数据共享(SDS)使用户能够以保密和保持完整性的方式共享云中的数据。许多最新的SDS方法都基于基于属性的加密(ABE),利用ABE的优势,ABE允许只使用一个密文来处理多个用户。然而,ABE方法通常有一个缺点,即它们需要一个能够解密系统中任何密文的中央完全可信实体。在本文中,我们研究了ABE是否可以用来有效地实现分散的安全数据共享(D-SDS),它明确要求授权和访问控制的实施完全由数据所有者执行,而不需要完全信任的第三方的帮助。为此,我们对最近关于D-SDS要求的ABE方法进行了全面分析。我们发现一种ABE方法是合适的,并且我们展示了在基于组的D-SDS场景中使用这种ABE方法的不同替代方案。为了对资源消耗进行现实的估计,我们给出了从真实系统跟踪和典型的最新移动设备获取的工作负载的具体资源消耗值。我们的结果表明,对于大多数D-SDS操作,结果计算时间和传出网络流量在许多用例中是可以接受的。但是,管理大型组的计算时间和出站流量可能会阻止使用移动设备。
{"title":"Decentralized Secure Data Sharing with Attribute-Based Encryption: A Resource Consumption Analysis","authors":"H. Kühner, H. Hartenstein","doi":"10.1145/2898445.2898449","DOIUrl":"https://doi.org/10.1145/2898445.2898449","url":null,"abstract":"Secure Data Sharing (SDS) enables users to share data in the cloud in a confidential and integrity-preserving manner. Many recent SDS approaches are based on Attribute-Based Encryption (ABE), leveraging the advantage that ABE allows to address a multitude of users with only one ciphertext. However, ABE approaches often come with the downside that they require a central fully-trusted entity that is able to decrypt any ciphertext in the system. In this paper, we investigate on whether ABE could be used to efficiently implement Decentralized Secure Data Sharing (D-SDS), which explicitly demands that the authorization and access control enforcement is carried out solely by the owner of the data, without the help of a fully-trusted third party. For this purpose, we did a comprehensive analysis of recent ABE approaches with regard to D-SDS requirements. We found one ABE approach to be suitable, and we show different alternatives to employ this ABE approach in a group-based D-SDS scenario. For a realistic estimation of the resource consumption, we give concrete resource consumption values for workloads taken from real-world system traces and exemplary up-to-date mobile devices. Our results indicate that for the most D-SDS operations, the resulting computation times and outgoing network traffic will be acceptable in many use cases. However, the computation times and outgoing traffic for the management of large groups might prevent using mobile devices.","PeriodicalId":187535,"journal":{"name":"Proceedings of the 4th ACM International Workshop on Security in Cloud Computing","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122011112","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Community-Based Secure Information and Resource Sharing in Azure Cloud IaaS Azure云IaaS中基于社区的安全信息和资源共享
Yun Zhang, Farhan Patwa, R. Sandhu
To efficiently collaborate in cyber security defense and response, organizations must be able to securely share information and resources. A community in a cloud IaaS, which refers to a group of organizations with common business interests, will utilize cloud IaaS to realize their infrastructure deployments. Communities establish a mechanism to prevent, detect and respond to cyber attacks, and help member organizations in the community recover expeditiously. In this paper, we present an access control model for secure information and resource sharing between organizations in a community-based isolated environment in Microsoft Azure IaaS cloud platform, one of dominant commercial cloud platforms. The model facilitates organizations to share their IT resources with each other in a controlled and secure manner. We formally specify the administrative model and discuss enforcement techniques in the Azure cloud platform.
为了在网络安全防御和响应中有效地协作,组织必须能够安全地共享信息和资源。云IaaS中的社区(指具有共同业务兴趣的一组组织)将利用云IaaS来实现其基础设施部署。社区建立预防、检测和响应网络攻击的机制,帮助社区成员组织迅速恢复。在本文中,我们提出了一种访问控制模型,用于在Microsoft Azure IaaS云平台(占主导地位的商业云平台之一)中基于社区的隔离环境中组织之间的安全信息和资源共享。该模型使组织能够以受控和安全的方式彼此共享IT资源。我们正式指定了管理模型,并讨论了Azure云平台中的实施技术。
{"title":"Community-Based Secure Information and Resource Sharing in Azure Cloud IaaS","authors":"Yun Zhang, Farhan Patwa, R. Sandhu","doi":"10.1145/2898445.2898455","DOIUrl":"https://doi.org/10.1145/2898445.2898455","url":null,"abstract":"To efficiently collaborate in cyber security defense and response, organizations must be able to securely share information and resources. A community in a cloud IaaS, which refers to a group of organizations with common business interests, will utilize cloud IaaS to realize their infrastructure deployments. Communities establish a mechanism to prevent, detect and respond to cyber attacks, and help member organizations in the community recover expeditiously. In this paper, we present an access control model for secure information and resource sharing between organizations in a community-based isolated environment in Microsoft Azure IaaS cloud platform, one of dominant commercial cloud platforms. The model facilitates organizations to share their IT resources with each other in a controlled and secure manner. We formally specify the administrative model and discuss enforcement techniques in the Azure cloud platform.","PeriodicalId":187535,"journal":{"name":"Proceedings of the 4th ACM International Workshop on Security in Cloud Computing","volume":"97 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131492589","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Privacy Preserving Distributed Permutation Test 保护隐私的分布式排列检验
Yunlong Mao, Yuan Zhang
In this paper, we propose a privacy-preserving algorithm for two-party distributed permutation test for the difference of means. Our algorithm allows two parties to jointly perform a permutation test on the union of their data without revealing their data to each other. Our algorithm is useful especially in areas where the testing data often contains private information e.g. clinic trial and biomedical research. We have proved the security of our algorithm and used experiment to show its efficiency. To the best of our knowledge, we are the first to address the privacy issues in permutation tests.
本文提出了一种用于均值之差的两方分布排列检验的隐私保护算法。我们的算法允许双方在不向对方透露数据的情况下,共同对其数据的并集执行排列测试。我们的算法特别适用于测试数据通常包含私人信息的领域,例如临床试验和生物医学研究。我们证明了算法的安全性,并通过实验证明了算法的有效性。据我们所知,我们是第一个解决排列测试中的隐私问题的。
{"title":"Privacy Preserving Distributed Permutation Test","authors":"Yunlong Mao, Yuan Zhang","doi":"10.1145/2898445.2898450","DOIUrl":"https://doi.org/10.1145/2898445.2898450","url":null,"abstract":"In this paper, we propose a privacy-preserving algorithm for two-party distributed permutation test for the difference of means. Our algorithm allows two parties to jointly perform a permutation test on the union of their data without revealing their data to each other. Our algorithm is useful especially in areas where the testing data often contains private information e.g. clinic trial and biomedical research. We have proved the security of our algorithm and used experiment to show its efficiency. To the best of our knowledge, we are the first to address the privacy issues in permutation tests.","PeriodicalId":187535,"journal":{"name":"Proceedings of the 4th ACM International Workshop on Security in Cloud Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129666609","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Session details: Paper Session 2: Data Processing 会议详情:论文会议2:数据处理
Sheng Zhong
{"title":"Session details: Paper Session 2: Data Processing","authors":"Sheng Zhong","doi":"10.1145/3247610","DOIUrl":"https://doi.org/10.1145/3247610","url":null,"abstract":"","PeriodicalId":187535,"journal":{"name":"Proceedings of the 4th ACM International Workshop on Security in Cloud Computing","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116336094","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cloud Storage Integrity Checking: Going from Theory to Practice 云存储完整性检查:从理论到实践
Fei Chen, Taoyi Zhang, Jianyong Chen, Tao Xiang
In the past decade, researchers have proposed various cloud storage integrity checking protocols to enable a cloud storage user to validate the integrity of the user's outsourced data. While the proposed solutions can in principle solve the cloud storage integrity checking problem, they are not sufficient for current cloud storage practices. In this position paper, we show the gaps between theoretical and practical cloud storage integrity checking solutions, through a categorization of existing solutions and an analysis of their underlying assumptions. To bridge the gap, we also call for practical cloud storage integrity checking solutions for three scenarios.
在过去的十年中,研究人员提出了各种云存储完整性检查协议,使云存储用户能够验证用户外包数据的完整性。虽然提出的解决方案原则上可以解决云存储完整性检查问题,但对于当前的云存储实践来说,它们还不够。在这篇立场文件中,我们通过对现有解决方案的分类和对其基本假设的分析,展示了理论和实际云存储完整性检查解决方案之间的差距。为了弥补这一差距,我们还呼吁针对三种场景提供实用的云存储完整性检查解决方案。
{"title":"Cloud Storage Integrity Checking: Going from Theory to Practice","authors":"Fei Chen, Taoyi Zhang, Jianyong Chen, Tao Xiang","doi":"10.1145/2898445.2898457","DOIUrl":"https://doi.org/10.1145/2898445.2898457","url":null,"abstract":"In the past decade, researchers have proposed various cloud storage integrity checking protocols to enable a cloud storage user to validate the integrity of the user's outsourced data. While the proposed solutions can in principle solve the cloud storage integrity checking problem, they are not sufficient for current cloud storage practices. In this position paper, we show the gaps between theoretical and practical cloud storage integrity checking solutions, through a categorization of existing solutions and an analysis of their underlying assumptions. To bridge the gap, we also call for practical cloud storage integrity checking solutions for three scenarios.","PeriodicalId":187535,"journal":{"name":"Proceedings of the 4th ACM International Workshop on Security in Cloud Computing","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122308095","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Towards Secure and Fast Mapping of Genomic Sequences on Public Clouds 基因组序列在公共云上的安全快速定位
Seungmin Kang, Khin Mi Mi Aung, B. Veeravalli
The rapid advances in genomic technologies have led to the exponential growth of genomic data. On one hand, clinics and research institutions need to consider the security issue since the data privacy needs to be protected. On the other hand, they look for the means to improve the scalability and performance of genomic applications to be able to handle large amount of data as well as heavy computations. While existing approaches have to sacrifice one for the other, we aim at achieving all the three goals above. In this paper, we design an entire secure framework for genomic data processing on public clouds. Based on this framework, we propose a 3-encryption-scheme model for genomic sequence mapping (3EGSM), an important phase of genomic computation. The model protects not only genomic sequences but also the intermediate and final computation results when processing on public clouds. We evaluate the proposed framework through intensive experiments using real genomic data. The experimental results show that the proposed framework reduces the sequential mapping time by up to 75% compared to a baseline approach that considers only the security issue. The experimental results also show that the framework achieves high speedup when performing parallel processing.
基因组技术的快速发展导致了基因组数据的指数级增长。一方面,诊所和研究机构需要考虑安全问题,因为数据隐私需要得到保护。另一方面,他们寻找提高基因组应用程序的可扩展性和性能的方法,以便能够处理大量数据和繁重的计算。虽然现有的方法必须牺牲一个来换取另一个,但我们的目标是实现上述三个目标。在本文中,我们为公共云上的基因组数据处理设计了一个完整的安全框架。基于该框架,我们提出了基因组序列定位(3EGSM)的3加密方案模型,这是基因组计算的一个重要阶段。该模型不仅可以保护基因组序列,还可以保护在公共云上处理时的中间和最终计算结果。我们通过使用真实基因组数据的密集实验来评估所提出的框架。实验结果表明,与仅考虑安全问题的基线方法相比,该框架将序列映射时间减少了75%。实验结果还表明,该框架在进行并行处理时具有较高的加速性能。
{"title":"Towards Secure and Fast Mapping of Genomic Sequences on Public Clouds","authors":"Seungmin Kang, Khin Mi Mi Aung, B. Veeravalli","doi":"10.1145/2898445.2898448","DOIUrl":"https://doi.org/10.1145/2898445.2898448","url":null,"abstract":"The rapid advances in genomic technologies have led to the exponential growth of genomic data. On one hand, clinics and research institutions need to consider the security issue since the data privacy needs to be protected. On the other hand, they look for the means to improve the scalability and performance of genomic applications to be able to handle large amount of data as well as heavy computations. While existing approaches have to sacrifice one for the other, we aim at achieving all the three goals above. In this paper, we design an entire secure framework for genomic data processing on public clouds. Based on this framework, we propose a 3-encryption-scheme model for genomic sequence mapping (3EGSM), an important phase of genomic computation. The model protects not only genomic sequences but also the intermediate and final computation results when processing on public clouds. We evaluate the proposed framework through intensive experiments using real genomic data. The experimental results show that the proposed framework reduces the sequential mapping time by up to 75% compared to a baseline approach that considers only the security issue. The experimental results also show that the framework achieves high speedup when performing parallel processing.","PeriodicalId":187535,"journal":{"name":"Proceedings of the 4th ACM International Workshop on Security in Cloud Computing","volume":"622 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127528206","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
Proceedings of the 4th ACM International Workshop on Security in Cloud Computing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1