Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/2723372.2735376acmconferencesArticle/Chapter ViewAbstractPublication PagesmodConference Proceedingsconference-collections
research-article

A Secure Search Engine for the Personal Cloud

Published: 27 May 2015 Publication History

Abstract

The emerging Personal Could paradigm holds the promise of a Privacy-by-Design storage and computing platform where personal data remain under the individual's control while being shared by valuable applications. However, leaving the data management control to user's hands pushes the security issues to the user's platform. This demonstration presents a Secure Personal Cloud Platform relying on a query and access control engine embedded in a tamper resistant hardware device connected to the user's platform. The main difficulty lies in the design of an inverted document index and its related search and update algorithms capable of tackling the strong hardware constraints of these devices. We have implemented our engine on a real tamper resistant hardware device and present its capacity to regulate the access to a personal dataspace. The objective of this demonstration is to show (1) that secure hardware is a key enabler of the Personal Cloud paradigm and (2) that new embedded indexing and querying techniques can tackle the hardware constraints of tamper-resistant devices and provide scalable solutions for the Personal Cloud.

References

[1]
Aggarwal, C. C., Ashish, N., and Sheth, A. The internet of things: A survey from the data-centric perspective. In Managing and mining sensor data, 2013.
[2]
Agrawal, D., Ganesan, D., Sitaraman, R., Diao, Y. and Singh, S. Lazy-adaptive tree: An optimized index structure for flash devices. In VLDB, 2(1), 2009.
[3]
Anciaux, N., Bonnet, P., Bouganim, L., Nguyen, B., Sandu Popa, I., and P. Pucheral. Trusted cells: A sea change for personal data services. In CIDR, 2013.
[4]
Anciaux, N., Bouganim, L., Pucheral, P., Guo, Y., Folgoc, L. L., Yin, S. 2014. Milo-db: a personal, secure and portable database machine. In Distributed and Parallel Databases.
[5]
Anciaux, N., Lallali, S., Sandu-Popa, I., Pucheral, P. A Scalable Search Engine for Mass Storage Smart Objects. Technical report, accessible at: http://www.prism.uvsq.fr/~isap/files/RT.pdf.
[6]
Yeung, C., A., Kagal, L., Gibbin, N., Shadbolt, N. Providing Access Control to Online Photo Albums Based on Tags and Linked Data. AAAI Spring Symposium on Social Semantic Web: Where Web 2.0 Meets Web 3.0, 2009.
[7]
Bjorling, M., Bonnet, P., Bouganim, L., and Jonsson, B. T. 2010. Uflip: Understanding the energy consumption of flash devices. In IEEE Data Eng. Bull., 33(4).
[8]
Debnath, B., Sengupta, S., and Li, J. Skimpystash: Ram space skimpy key-value store on flash-based storage. In SIGMOD, 2011.
[9]
Diao, Y., Ganesan, D., Mathur, G., and Shenoy, P. J. Rethinking data management for storage-centric sensor networks. In CIDR, 2007.
[10]
Huang, Y.-M., Lai, Y.-X. Distributed energy management system within residential sensor-based heterogeneous network structure. In Wireless Sensor Networks and Ecological Monitoring, 3, 2013.
[11]
Kim, J. Y. and Croft, W. B. Retrieval Experiments using Pseudo-Desktop Collections. In CIKM, 2009.
[12]
Li, Y., He, B., Yang, R. J., Luo, Q., and Yi, K. Tree Indexing on Solid State Drives. VLDB, 3(1--2), 2010
[13]
Mazurek, M., L. A. Tag-Based, Logical Access-Control Framework for Personal File Sharing. 2014. PhD thesis.
[14]
Klemperer, P., Liang, Y., Mazurek, M., Sleeper, M., Ur, B., Bauer, L., Cranor, F., L., Gupta, N., and Reiter, M. Tag, you can see it!: using tags for access control in photo sharing. In SIGCHI, 2012.
[15]
Tan, C. C., Sheng, B., Wang, H., and Li, Q. Microsearch: When search engines meet small devices. Pervasive Computing, 2008.
[16]
Tan, C. C., Sheng, B., Wang, H., Li, Q. 2010. Microsearch: A search engine for embedded devices used in pervasive computing. ACM Trans. Embed. Comput. Syst., 9(4).
[17]
To, Q.-C., Nguyen, B., and Pucheral, P. Privacy-Preserving Query Execution using a Decentralized Architecture and Tamper Resistant Hardware. In EDBT, 2014.
[18]
Tsiftes, N. and Dunkels, A. A database in every sensor. In ACM SenSys, 2011.
[19]
Wang, H., Tan, C. C., Li, Q. 2010. Snoogle: A search engine for pervasive environments. IEEE Transactions on Parallel and Distributed Systems, 21(8).
[20]
Wu, C.-H., Kuo, T.-W., and Chang, L.-P. 2007. An efficient b-tree layer implementation for flash-memory storage systems. ACM Trans. Embed. Comput. Syst., 6(3).
[21]
Yan, T., Ganesan, D., and Manmatha, R. Distributed image search in camera sensor networks. In ACM SenSys, 2008.
[22]
Yap, K.-K., Srinivasan, V., Motani, M. Max. 2008. Wide area human-centric search of the physical world. In ACM Transactions on Sensor Networks, 4(4).
[23]
Zobel, J. and Moffat, A. 2006. Inverted files for text search engines. In ACM Comput. Surv., 38(2).

Cited By

View all
  • (2020)Survey: A Comparative Study of Different Security Issues in Big DataEmerging Research in Data Engineering Systems and Computer Communications10.1007/978-981-15-0135-7_24(247-257)Online publication date: 11-Feb-2020
  • (2019)Big Data Challenges and Issues: A ReviewProceeding of the International Conference on Computer Networks, Big Data and IoT (ICCBI - 2018)10.1007/978-3-030-24643-3_53(446-452)Online publication date: 1-Aug-2019
  • (2018)The Case for Personalized Anonymization of Database Query ResultsData Management Technologies and Applications10.1007/978-3-319-94809-6_13(261-285)Online publication date: 30-Jun-2018
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
SIGMOD '15: Proceedings of the 2015 ACM SIGMOD International Conference on Management of Data
May 2015
2110 pages
ISBN:9781450327589
DOI:10.1145/2723372
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 27 May 2015

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. access control
  2. embedded search engine
  3. personal cloud

Qualifiers

  • Research-article

Funding Sources

  • ANR France

Conference

SIGMOD/PODS'15
Sponsor:
SIGMOD/PODS'15: International Conference on Management of Data
May 31 - June 4, 2015
Victoria, Melbourne, Australia

Acceptance Rates

SIGMOD '15 Paper Acceptance Rate 106 of 415 submissions, 26%;
Overall Acceptance Rate 785 of 4,003 submissions, 20%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)8
  • Downloads (Last 6 weeks)0
Reflects downloads up to 25 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2020)Survey: A Comparative Study of Different Security Issues in Big DataEmerging Research in Data Engineering Systems and Computer Communications10.1007/978-981-15-0135-7_24(247-257)Online publication date: 11-Feb-2020
  • (2019)Big Data Challenges and Issues: A ReviewProceeding of the International Conference on Computer Networks, Big Data and IoT (ICCBI - 2018)10.1007/978-3-030-24643-3_53(446-452)Online publication date: 1-Aug-2019
  • (2018)The Case for Personalized Anonymization of Database Query ResultsData Management Technologies and Applications10.1007/978-3-319-94809-6_13(261-285)Online publication date: 30-Jun-2018
  • (2017)Supporting secure keyword search in the personal cloudInformation Systems10.1016/j.is.2017.09.00372:C(1-26)Online publication date: 1-Dec-2017
  • (2016)Security and privacy for big data: A systematic literature review2016 IEEE International Conference on Big Data (Big Data)10.1109/BigData.2016.7841037(3693-3702)Online publication date: Dec-2016
  • (2016)Managing Personal Health Records in an Infrastructure-Weak Environmente-Infrastructure and e-Services10.1007/978-3-319-43696-8_18(178-191)Online publication date: 14-Oct-2016
  • (2015)A scalable search engine for mass storage smart objectsProceedings of the VLDB Endowment10.14778/2777598.27776008:9(910-921)Online publication date: 1-May-2015

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media