ST9 - Cloud Security and Data Privacy by Design

Iraklis Paraskakis's picture
Iraklis Paraskakis
SEERC (GR) & The University of Sheffield (UK)
Conference room
Session time
Thursday, June 22, 2017 - 16:00 to 17:15
Secure Database Outsourcing to the Cloud: Side-Channels, Counter-Measures and Trusted Execution
Abstract: 
"Outsourcing data processing and storage to the cloud is a persistent trend in the last years. Cloud computing offers many advantages like flexibility in resource allocation, cost reduction and high availability. However, when sensitive information is handed to a third party, security questions are raised since the cloud provider and his employees are not fully trusted. Standard security mechanisms like transport encryption and regular audits alone can't solve the issue of insider attacks. Additional cryptographic techniques are required. In this paper we build upon an existing
Matthias Gabel's picture
Matthias Gabel
Jeremias Mechler's picture
Jeremias Mechler
Karlsruhe Institute of Technology (DE)
Ontological Templates for Regulating Access to Sensitive Medical Data in the Cloud
Abstract: 
By embracing the cloud computing paradigm for storing and processing electronic medical records (EMRs), modern healthcare providers are able to realise significant cost savings. However, relinquishing control of sensitive medical data by delegating their storage and processing to third-party cloud providers naturally raises significant security concerns. One way to alleviate these concerns is to devise appropriate policies that infuse adequate access controls in cloud services.
Simeon Veloudis's picture
Simeon Veloudis
South East European Research Centre (SEERC) The University of Sheffield
Iraklis Paraskakis's picture
Iraklis Paraskakis
SEERC (GR) & The University of Sheffield (UK)
Yiannis Verginadis's picture
Yiannis Verginadis
Ioannis Patiniotakis's picture
Ioannis Patiniotakis
Gregoris Mentzas's picture
Gregoris Mentzas
HealthShare: Using Attribute-Based Encryption for Secure Data Sharing Between Multiple Clouds
Abstract: 
"In this paper, we propose HealthShare –a forwardlooking approach for secure ehealth data sharing between multiple organizations that are hosting patients’ data in different clouds. The proposed protocol is based on a Revocable Key-Policy Attribute-Based Encryption scheme and allows users to share encrypted health records based on a policy that has been defined by the data owner (i.e. patient, a member of the hospital, etc). Furthermore, access to a malicious or compromised user/organization can be easily revoked without the need to generate fresh encryption keys."
Antonis Michalas's picture
Antonis Michalas
University of Westminster (UK)
Noam Weingarten's picture
Noam Weingarten
Security in a Distributed Key Management Approach
Abstract: 
Cloud computing offers many advantages as flexibility or resource-efficiency and can significantly reduce costs. However, when sensitive medical data is outsourced to a cloud provider, classified records can leak. To protect the patients and application providers from a privacy breach data must be encrypted before it is uploaded. In this work, we present a distributed key management scheme that handles user-specific keys in a single-tenant scenario. The underlying database is encrypted and the secret key is only reconstructed temporarily in memory.
Gunther Schiefer's picture
Gunther Schiefer
Karlsruhe Institute of Technology (DE)
Murat Citak's picture
Murat Citak
Andreas Schoknecht's picture
Andreas Schoknecht
Matthias Gabel's picture
Matthias Gabel
Jeremias Mechler's picture
Jeremias Mechler
Karlsruhe Institute of Technology (DE)