Conferences in Research and Practice in Information Technology
  

Online Version - Last Updated - 20 Jan 2012

 

 
Home
 

 
Procedures and Resources for Authors

 
Information and Resources for Volume Editors
 

 
Orders and Subscriptions
 

 
Published Articles

 
Upcoming Volumes
 

 
Contact Us
 

 
Useful External Links
 

 
CRPIT Site Search
 
    

Privacy and Anonymity in Untrusted Data Stores

Trevathan , J., Read, W., Ghodosi, H. and Atkinson, I.

    This paper describes a security problem involving an online data repository, which acts as a proxy for mul- tiple companies allowing their customers to perform online services (e.g., pay invoices). The repository’s host is trusted to honestly fulfil its duties in maintaining the data in a manner consistent with each companies’ required services. However, the information stored by the repository remains private in that the repository’s host cannot openly read any companies’ operational data, nor does it learn the identities of any companies’ customers. We contrast several approaches describing their viability for web deployment using existing technologies. This is a fundamentally new security problem with no established literature or clearly defined cryptographic solution. The project originated from a commercial attempt to design a secure online data archive. A sample implementation of the system is presented that allows a customer to pay and view invoices online via the data repository using a popular and widely available small business accountancy application.
Cite as: Trevathan , J., Read, W., Ghodosi, H. and Atkinson, I. (2011). Privacy and Anonymity in Untrusted Data Stores. In Proc. Australasian Database Conference (ADC 2011) Perth, Australia. CRPIT, 115. Heng Tao Shen and Yanchun Zhang Eds., ACS. 75-84
pdf (from crpit.com) pdf (local if available) BibTeX EndNote GS