首页> 外文学位 >An Anonymous and Distributed Approach to Improving Privacy in Cloud Computing: An Analysis of Privacy-Preserving Tools & Applications
【24h】

An Anonymous and Distributed Approach to Improving Privacy in Cloud Computing: An Analysis of Privacy-Preserving Tools & Applications

机译:匿名和分布式方法来改善云计算中的隐私:隐私保护工具和应用程序的分析

获取原文
获取原文并翻译 | 示例

摘要

The seemingly limitless computing resources and power of the cloud has made it ubiquitous. However, despite its utility and widespread adoption in several everyday applications the cloud still suffers from several trust and privacy concerns. Many of these concerns are validated by the endless reports of cyber-attacks that compromise the private information of large numbers of users.;A review of the literature reveals the following challenges with privacy in cloud computing: (1) Although there is a wealth of approaches that attempt to prevent cyber-attacks, these approach ignore the reality that system compromises are inevitable; every system can and will be compromised. (2) There are a handful of metrics for the security of systems, however, the current literature is lacking in privacy metrics that can be used to compare the privacy of across various systems. (3) One of the difficulties with addressing of privacy in cloud computing is the inevitable trade-off between privacy and utility; many privacy-preserving techniques sacrifice more utility than needed in an attempt to achieve the unattainable, perfect privacy.;In this dissertation we present our contributions that address the aforementioned privacy challenges supported by the literature. We base our approach on the assumption that every system can and will be compromised; we focused on mitigating the adverse effects of a cyber-attack by limiting the amount of information that is compromised during an attack. Our contribution is twofold and includes (1) a set of tools for designing privacy-mitigating applications and measuring privacy and (2) two applications designed using the aforementioned tools.;We will first describe three tools that we used to design two applications. These tools are: (1) The processing graph and its collection of creation protocols. The processing graph is the mechanism we used to partition data across multiple units of cloud-based storage and processing; it also manages the flow of processed information between components and is customizable based on the specific needs of the user; (2) A privacy metric based in information theory. We use this metric to compare the amount of information compromised when centralized and distributed systems are attacked; (3) The third tool is the extension of the double-locked box protocol in the cloud environment. The double-locked box protocol facilitates anonymous between two entities via an intermediary.;We then present two applications that utilize the aforementioned tools to improve the privacy of storing and processing a user's data. These applications are (1) the anonymous tax preparation application and (2) the distributed insurance clearinghouse and distributed electronic health record. We show how the creation protocols are used to establish progressing graphs to privately complete a user's tax form and process a patient's insurance claim form. We also highlight the future work in medical research that is made possible because of our contributions; our approach allows for medical research to be conducted on data without risking the identity of patients.;For each application we perform a privacy analysis that employs the privacy metric; in these privacy analyses, we compare both applications to their centralized counterparts and show the reduction in the amount of information revealed during an attack. Based on our analysis, the anonymous tax preparation application reduces the amount of compromised information in the event of an attack by up 64%. Similarly, the distributed insurance clearinghouse reduces the amount of patient data revealed during an attack by up to 79%.
机译:云的看似无限的计算资源和功能使其无处不在。但是,尽管其实用性和在日常应用中的广泛采用,云仍遭受着一些信任和隐私问题的困扰。这些担忧中的许多已经通过无休止的网络攻击报告得到了证实,这些攻击侵害了大量用户的私人信息。;对文献的回顾表明,云计算中的隐私面临以下挑战:(1)尽管存在很多挑战试图防止网络攻击的方法,这些方法忽略了以下事实:系统危害是不可避免的;每个系统都可能会受到损害。 (2)关于系统安全性的指标很少,但是,目前的文献缺乏可用于比较各个系统之间的隐私的隐私指标。 (3)在云计算中解决隐私问题的困难之一是隐私与效用之间不可避免的权衡;为了实现无法达到的,完美的隐私,许多隐私保护技术牺牲了更多的实用性。在本论文中,我们提出了解决上述文献支持的隐私挑战的贡献。我们的方法基于以下假设:每个系统都可能会受到损害;我们致力于通过限制攻击过程中泄露的信息量来减轻网络攻击的不利影响。我们的贡献是双重的,包括(1)一套用于设计减少隐私的应用程序和测量隐私的工具,以及(2)使用上述工具设计的两个应用程序。我们将首先描述用于设计两个应用程序的三个工具。这些工具是:(1)处理图及其创建协议的集合。处理图是我们用于跨多个基于云的存储和处理单元划分数据的机制;它还管理组件之间的处理信息流,并可以根据用户的特定需求进行自定义; (2)基于信息论的隐私度量。当集中式和分布式系统受到攻击时,我们使用此指标来比较泄露的信息量。 (3)第三个工具是云环境中双锁盒协议的扩展。双锁盒协议通过中介促进了两个实体之间的匿名。然后,我们介绍了两个利用上述工具来提高存储和处理用户数据隐私性的应用程序。这些应用程序是(1)匿名税务准备应用程序,以及(2)分布式保险票据交换所和分布式电子健康记录。我们将展示如何使用创建协议来建立进度图,以私下填写用户的纳税表并处理患者的保险索赔表。我们还将强调由于我们的贡献而使医学研究的未来工作成为可能。我们的方法允许在不危害患者身份的情况下对数据进行医学研究。对于每个应用程序,我们都执行采用隐私度量的隐私分析;在这些隐私分析中,我们将这两种应用程序与集中式应用程序进行了比较,并显示出攻击期间揭示的信息量减少了。根据我们的分析,匿名税务准备应用程序在发生攻击的情况下,可以将泄露的信息量减少64%。同样,分布式保险信息交换所可将攻击过程中泄露的患者数据量减少多达79%。

著录项

  • 作者

    Peters, Emmanuel Sean.;

  • 作者单位

    Columbia University.;

  • 授予单位 Columbia University.;
  • 学科 Electrical engineering.;Computer science.
  • 学位 Ph.D.
  • 年度 2017
  • 页码 226 p.
  • 总页数 226
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类
  • 关键词

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号