|
| | | |
Privacy and Anonymity in Untrusted Data Stores
Trevathan , J., Read, W., Ghodosi, H. and Atkinson, I.
This paper describes a security problem involving an online data repository, which acts as a proxy for mul- tiple companies allowing their customers to perform online services (e.g., pay invoices). The repository’s host is trusted to honestly fulfil its duties in maintaining the data in a manner consistent with each companies’ required services. However, the information stored by the repository remains private in that the repository’s host cannot openly read any companies’ operational data, nor does it learn the identities of any companies’ customers. We contrast several approaches describing their viability for web deployment using existing technologies. This is a fundamentally new security problem with no established literature or clearly defined cryptographic solution. The project originated from a commercial attempt to design a secure online data archive. A sample implementation of the system is presented that allows a customer to pay and view invoices online via the data repository using a popular and widely available small business accountancy application. |
Cite as: Trevathan , J., Read, W., Ghodosi, H. and Atkinson, I. (2011). Privacy and Anonymity in Untrusted Data Stores. In Proc. Australasian Database Conference (ADC 2011) Perth, Australia. CRPIT, 115. Heng Tao Shen and Yanchun Zhang Eds., ACS. 75-84 |
(from crpit.com)
(local if available)
|
|