Privacy Aware Access Control for Cloud-Based Data Platforms | SpringerLink
Skip to main content

Privacy Aware Access Control for Cloud-Based Data Platforms

  • Conference paper
  • First Online:
Cyber Security and Privacy (CSP 2015)

Abstract

This paper presents OPENi’s Personal Cloudlets framework as a novel approach to enhancing users access control and privacy over their persinal data on a cloud-based platform. This paper describes the OPENi concepts and the requirements that influenced the design and implementation of OPENi’s Personal Cloudlet Framework. We describe the architecture and how OPENi, through the use of REST based endpoints, object-based access control, OPENi Types, and stateless JSON Web Token (JWT), allows users share, reuse, and control access to their data across many mobile applications while maintaining cloud scalability. This paper also describes how a number of the Personal Cloudlet framework’s features enhance a users privacy and control. These features include the User Dashboard, the Privacy Preserving Data Aggregator, and the fine grained access control mechanism.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
¥17,985 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
JPY 3498
Price includes VAT (Japan)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
JPY 5719
Price includes VAT (Japan)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
JPY 7149
Price includes VAT (Japan)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

Notes

  1. 1.

    OPENi Objectives, http://www.openi-ict.eu/objectives/.

  2. 2.

    PEAT - Personal Data, Apis, and Trust, http://www.peat-platform.org/.

References

  1. Apache Cordova. http://cordova.apache.org/. Accessed 15 October 2015

  2. Couchbase Server. http://www.couchbase.com/. Accessed 15 January 2015

  3. Docker: Build, Ship and Run Any App, Anywhere. https://www.docker.com/. Accessed 15 January 2015

  4. Google Cloud Messaging for Android. https://developer.android.com/google/gcm/index.html. Accessed 15 January 2015

  5. JSON Web Token (JWT). http://jwt.io/. Accessed 15 January 2015

  6. Mongrel2. http://mongrel2.org/. Accessed 15 January 2015

  7. OPENi - Open-Source, Web-Based, Framework for Integrating Applications with Cloud-based Services and Personal Cloudlets. http://www.openi-ict.eu/. Accessed 15 January 2015

  8. OPENi open source project. https://github.com/OPENi-ict/. Accessed 15 January 2015

  9. ZeroMQ. http://zeromq.org/. Accessed 15 January 2015

  10. Doyle, K., McCarthy, D.: OPENi White Paper: An End Users Perspective: Digital Identity Putting the Genie Back in the Bottle, September 2014. http://www.openi-ict.eu/wp-content/uploads/2014/07/openi_whitepaper.pdf. Accessed 15 January 2015

  11. Illera, R., Ortega, S., Petychakis, M.: OPENi Deliverable D2.3: Security and Privacy Considerations for Cloud-based Services and Cloudlets, January 2013. http://www.openi-ict.eu/wp-content/uploads/2013/11/OPENi_D2.3.pdf. Accessed 15 January 2015

  12. Iosif, A., et al.: A community-based, graph API framework to integrate and orchestrate cloud-based services. In: Proceedings of AICCSA. IEEE Computer Society (2014), awaiting publication

    Google Scholar 

  13. Kleinfeld, R., et al.: OPENi Deliverable D3.6: OPENi Security and Privacy Specification, September 2014. http://www.openi-ict.eu/wp-content/uploads/2014/10/OPENi_D3.6.pdf. Accessed 15 January 2015

  14. McCarthy, D., et al.: OPENi Deliverable D3.5: OPENi Cloudlet Framework Design Document, September 2014. http://www.openi-ict.eu/wp-content/uploads/2014/10/OPENi_D3.5.pdf. Accessed 15 January 2015

  15. Mogul, R.: Data Security Lifecycle 2.0, September 2014. https://www.securosis.com/blog/data-security-lifecycle-2.0. Accessed 15 January 2015

  16. Biliri, E., Tsouroplis, R., Lampathaki, F., Askounis, D., Petychakis, M., Alvertis, I.: Enterprise collaboration framework for managing, advancing and unifying the functionality of multiple cloud-based services with the help of a graph API. In: Camarinha-Matos, L.M., Afsarmanesh, H. (eds.) Collaborative Systems for Smart Networked Environments. IFIP AICT, vol. 434, pp. 153–160. Springer, Heidelberg (2014)

    Google Scholar 

Download references

Acknowledgment

The research and subsequent implementation reported in this paper has been funded by the European Community’s Seventh Framework Programme (FP7) under grant agreement FP7-ICT-317883.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Dónal McCarthy .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

McCarthy, D. et al. (2015). Privacy Aware Access Control for Cloud-Based Data Platforms. In: Cleary, F., Felici, M. (eds) Cyber Security and Privacy. CSP 2015. Communications in Computer and Information Science, vol 530. Springer, Cham. https://doi.org/10.1007/978-3-319-25360-2_3

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-25360-2_3

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-25359-6

  • Online ISBN: 978-3-319-25360-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics