Stream Processing with Secure Information Flow Constraints - Data and Applications Security and Privacy XXIX
Conference Papers Year : 2015

Stream Processing with Secure Information Flow Constraints

Indrakshi Ray
  • Function : Author
  • PersonId : 885868
Raman Adaikkalavan
  • Function : Author
  • PersonId : 1016186
Xing Xie
  • Function : Author
  • PersonId : 1016187
Rose Gamble
  • Function : Author
  • PersonId : 1029888

Abstract

In the near future, clouds will provide situational monitoring services such as health monitoring, stock market monitoring, shopping cart monitoring, and emergency control and threat management. Offering such services requires securely processing data streams generated by multiple, possibly competing and/or complementing, organizations, such that there is no overt or covert leakage of sensitive information. We demonstrate how an information flow control model adapted from the Chinese Wall policy can be used to protect against sensitive data disclosure in data stream management system. We also develop a language based on Continuous Query Language that can be used to express information flow constraints in stream processing and provide its formal semantics.
Fichier principal
Vignette du fichier
340025_1_En_22_Chapter.pdf (505.01 Ko) Télécharger le fichier
Origin Files produced by the author(s)
Loading...

Dates and versions

hal-01745816 , version 1 (28-03-2018)

Licence

Identifiers

Cite

Indrakshi Ray, Raman Adaikkalavan, Xing Xie, Rose Gamble. Stream Processing with Secure Information Flow Constraints. 29th IFIP Annual Conference on Data and Applications Security and Privacy (DBSEC), Jul 2015, Fairfax, VA, United States. pp.311-329, ⟨10.1007/978-3-319-20810-7_22⟩. ⟨hal-01745816⟩
105 View
122 Download

Altmetric

Share

More