PaaSword: A Holistic Data Privacy and Security by Design Framework for Cloud Services

Verginadis, Y., Michalas, A., Gouvas, P., Schiefer, G., Hübsch, G. and Paraskakis, I. 2017. PaaSword: A Holistic Data Privacy and Security by Design Framework for Cloud Services. Journal of Grid Computing. 15 (2), pp. 219-234. https://doi.org/10.1007/s10723-017-9394-2

TitlePaaSword: A Holistic Data Privacy and Security by Design Framework for Cloud Services
TypeJournal article
AuthorsVerginadis, Y.
Michalas, A.
Gouvas, P.
Schiefer, G.
Hübsch, G.
Paraskakis, I.
Abstract

Enterprises increasingly recognize the compelling economic and operational benefits from virtualizing and pooling IT resources in the cloud. Nevertheless, the significant and valuable transformation of organizations that adopt cloud computing is accompanied by a number of security threats that should be considered. In this paper, we outline significant security challenges presented when migrating to a cloud environment and propose PaaSword - a novel holistic framework that aspires to alleviate these challenges. Specifically, the proposed framework involves a context aware security model, the necessary policies enforcement mechanism along with a physical distribution, encryption and query middleware.

KeywordsData Privacy
Security by Design
Context-Aware Access Control
Symmetric Searchable Encryption
Cloud Computing
JournalJournal of Grid Computing
Journal citation15 (2), pp. 219-234
ISSN1570-7873
Year2017
PublisherSpringer
Publisher's version
Digital Object Identifier (DOI)https://doi.org/10.1007/s10723-017-9394-2
Publication dates
Published online22 Mar 2017
Published in printJun 2017

Related outputs

Swarmchestrate: Towards a Fully Decentralised Framework for Orchestrating Applications in the Cloud-to-Edge Continuum
Kiss, T., Ullah, A., Terstyanszky, G., Kao, O., Becker, S., Verginadis, Y., Michalas, A., Stankovski, V., Kertesz, A., Ricci, E, Altmann, J., Egger, B., Tusa, F., Kovacs, J. and Lovas, R. 2024. Swarmchestrate: Towards a Fully Decentralised Framework for Orchestrating Applications in the Cloud-to-Edge Continuum. AINA 2024 - 38th International Conference on Advanced Information Networking and Applications. Kitakyushu International Convention Center, Kitakyushu, Japan 17 - 19 Apr 2024 Springer.

Symmetrical Disguise: Realizing Homomorphic Encryption Services from Symmetric Primitives
Bakas, A., Frimpong, E. and Michalas, A. 2023. Symmetrical Disguise: Realizing Homomorphic Encryption Services from Symmetric Primitives. 18th EAI International Conference on Security and Privacy in Communication Networks (SecureComm’22). Kansas City, United States 17 - 19 Oct 2022 Springer. https://doi.org/10.1007/978-3-031-25538-0_19

MetaPriv: Acting in Favor of Privacy on Social Media Platforms
Cantaragiu, R., Michalas, A., Frimpong, E. and Bakas, A. 2023. MetaPriv: Acting in Favor of Privacy on Social Media Platforms. 18th EAI International Conference on Security and Privacy in Communication Networks (SecureComm’22). Kansas City, United States 17 - 19 Oct 2022 Springer. https://doi.org/10.1007/978-3-031-25538-0_36

Love or Hate? Share or Split? Privacy-Preserving Training Using Split Learning and Homomorphic Encryption
Khan, T., Nguyen, K., Michalas, A. and Bakas, A. 2023. Love or Hate? Share or Split? Privacy-Preserving Training Using Split Learning and Homomorphic Encryption. 20th Annual International Conference on Privacy, Security & Trust (PST'23). Copenhagen, Denmark 21 - 23 Aug 2023 Springer.

stoRNA: Stateless Transparent Proofs of Storage-time
Rabaninejad, R., Abdolmaleki, B., Malavolta, G., Michalas, A. and Nabizadeh, A. 2023. stoRNA: Stateless Transparent Proofs of Storage-time. 28th European Symposium on Research in Computer Security (ESORICS’23). The Hague, the Netherlands 25 - 29 Sep 2023 Springer.

Split Without a Leak: Reducing Privacy Leakage in Split Learning
Nguyen, K., Khan, T. and Michalas, A. 2023. Split Without a Leak: Reducing Privacy Leakage in Split Learning. 19th EAI International Conference on Security and Privacy in Communication Networks (SecureComm’23). Hong Kong SAR, Hong Kong 19 - 21 Oct 2023 Springer.

Cryptographic Role-Based Access Control, Reconsidered
Liu, B., Michalas, A. and Warinschi, B. 2022. Cryptographic Role-Based Access Control, Reconsidered. 16th International Conference on Provable and Practical Security (ProvSec’22). Nanjing, China 11 - 12 Nov 2022 Springer. https://doi.org/10.1007/978-3-031-20917-8_19

Footsteps in the fog: Certificateless fog-based access control
Frimpong, E., Michalas, A. and Ullah, A. 2022. Footsteps in the fog: Certificateless fog-based access control. Computers and Security. 121 102866. https://doi.org/10.1016/j.cose.2022.102866

Power Range: Forward Private Multi-Client Symmetric Searchable Encryption with Range Queries Support
Bakas, A. and Michalas, A. 2020. Power Range: Forward Private Multi-Client Symmetric Searchable Encryption with Range Queries Support. The 25th IEEE International Conference on Communications (ISCC’20). Rennes, France (switched to virtual due to the pandemic) 07 - 10 Jul 2020 IEEE . https://doi.org/10.1109/ISCC50000.2020.9219739

Charlie and the CryptoFactory: Towards Secure and Trusted Manufacturing Environments
Michalas, A. and Kiss, T. 2020. Charlie and the CryptoFactory: Towards Secure and Trusted Manufacturing Environments. IEEE MELECON 2020. Palermo, Italy 16 - 18 Jun 2020 IEEE . https://doi.org/10.1109/MELECON48756.2020.9140712

Modern Family: A Revocable Hybrid Encryption Scheme Based on Attribute-Based Encryption, Symmetric Searchable Encryption and SGX
Bakas, A. and Michalas, A. 2019. Modern Family: A Revocable Hybrid Encryption Scheme Based on Attribute-Based Encryption, Symmetric Searchable Encryption and SGX. 15th EAI International Conference on Security and Privacy in Communication Networks (SecureComm’19). Orlando, United States 25 Jul - 23 Oct 2019 Springer. https://doi.org/10.1007/978-3-030-37231-6_28

The Lord of the Shares: Combining Attribute-Based Encryption and Searchable Encryption for Flexible Data Sharing
Michalas, A. 2019. The Lord of the Shares: Combining Attribute-Based Encryption and Searchable Encryption for Flexible Data Sharing. 34th ACM/SIGAPP Symposium on Applied Computing (SAC'19). Limassol, Cyprus 08 - 12 Apr 2019 ACM. https://doi.org/10.1145/3297280.3297297

Towards Secure Cloud Orchestration for Multi-Cloud Deployments
Paladi, N., Michalas, A. and Dang, H. 2018. Towards Secure Cloud Orchestration for Multi-Cloud Deployments. The 5th Workshop on CrossCloud Infrastructures & Platforms. Porto, Portugal 23 - 26 Apr 2018 ACM.

MemTri: A Memory Forensics Triage Tool using Bayesian Network and Volatility
Michalas, A. and Murray, R. 2017. MemTri: A Memory Forensics Triage Tool using Bayesian Network and Volatility. The 9th ACM CCS International Workshop on Managing Insider Security Threats (MIST’17) in Conjunction with ACM CCS 2017. Dallas, TX, USA 30 Oct - 03 Nov 2017 ACM. https://doi.org/10.1145/3139923.3139926

A Survey on Design and Implementation of Protected Searchable Data in the Cloud
Dowsley, R., Michalas, A., Nagel, M. and Paladi, N. 2017. A Survey on Design and Implementation of Protected Searchable Data in the Cloud. Computer Science Review. 26, pp. 17-30. https://doi.org/10.1016/j.cosrev.2017.08.001

Middle Man: An Efficient Two-Factor Authentication Framework
Costa, J. and Michalas, A. 2017. Middle Man: An Efficient Two-Factor Authentication Framework. 3rd IEEE International Conference On Computing, Communication, Control And Automation. Pune, India 17 - 18 Aug 2017 IEEE . https://doi.org/10.1109/ICCUBEA.2017.8463686

HealthShare: Using Attribute-Based Encryption for Secure Data Sharing Between Multiple Clouds
Michalas, A. and Weingarten, N. 2017. HealthShare: Using Attribute-Based Encryption for Secure Data Sharing Between Multiple Clouds. Proceedings of the 30th IEEE International Symposium on Computer-Based Medical Systems (CBMS’17). Thessaloniki, Greece 22 - 24 Jun 2017 IEEE . https://doi.org/10.1109/CBMS.017.30

Secure and scalable deduplication of horizontally partitioned health data for privacy-preserving distributed statistical computation
Yigzaw, KY., Michalas, A. and Bellika, J.G. 2017. Secure and scalable deduplication of horizontally partitioned health data for privacy-preserving distributed statistical computation. BMC Medical Informatics and Decision Making. 17 1 (2017). https://doi.org/10.1186/s12911-016-0389-x

Providing User Security Guarantees in Public Infrastructure Clouds
Paladi, N., Gehrmann, C. and Michalas, A. 2017. Providing User Security Guarantees in Public Infrastructure Clouds. IEEE Transactions on Cloud Computing. 5 (3), pp. 405-419. https://doi.org/10.1109/TCC.2016.2525991

Mem Tri: Memory Forensics Triage Tool
Michalas, A. and Murray, R 2016. Mem Tri: Memory Forensics Triage Tool. Cyber Security Group, University of Westminster.

LocLess: Do You Really Care Where Your Cloud Files Are?
Michalas, A. and Yigzaw, K.Y. 2016. LocLess: Do You Really Care Where Your Cloud Files Are? Cloud Security and Data Privacy by Design (CloudSPD’16), Workshop co-located with the 9th IEEE/ACM International Conference on Utility and Cloud Computing. Luxembourg 12 - 15 Dec 2016 IEEE . https://doi.org/10.1109/CloudCom.2016.0090

Sharing in the Rain: Secure and Efficient Data Sharing for the Cloud
Michalas, A. 2016. Sharing in the Rain: Secure and Efficient Data Sharing for the Cloud. 11th International Conference for Internet Technology and Secured Transactions (ICITST-2016). Barcelona 05 - 07 Dec 2016 IEEE . https://doi.org/10.1109/ICITST.2016.7856693

Secure and Scalable Statistical Computation of Questionnaire Data in R
Yigzaw, K.Y., Michalas, A. and Bellika, J. 2016. Secure and Scalable Statistical Computation of Questionnaire Data in R. IEEE Access. 4, pp. 4635-4645. https://doi.org/10.1109/ACCESS.2016.2599851

The Data of Things: Strategies, Patterns and Practice of Cloud-based Participatory Sensing
Michalas, A. and Giannetsos, T. 2016. The Data of Things: Strategies, Patterns and Practice of Cloud-based Participatory Sensing. International Conference on Innovations in InfoBusiness and Technology (ICIIT). Colombo, Sri Lanka 04 Mar 2016

PaaSword: A Holistic Data Privacy and Security by Design Framework for Cloud Services
Verginadis, Y., Michalas, A., Gouvas, P., Schiefer, G., Hübsch, G. and Paraskakis, I. 2015. PaaSword: A Holistic Data Privacy and Security by Design Framework for Cloud Services. 5th International Conference on Cloud Computing and Services Science (CLOSER'15). Lisbon, Portugal 20 May 2015 SCITEPRESS. https://doi.org/10.5220/0005489302060213

"One of our hosts in another country": Challenges of data geolocation in cloud storage
Paladi, N. and Michalas, A. 2014. "One of our hosts in another country": Challenges of data geolocation in cloud storage. The 6th IEEE Conference on Wireless Communication, Vehicular Technology, Information Theory and Aerospace & Electronic Systems Technology (Wireless VITAE). Aalborg, Denmark 11 May 2014 IEEE . https://doi.org/10.1109/VITAE.2014.6934507

The lord of the sense: A privacy preserving reputation system for participatory sensing applications
Michalas, A. and Komninos, N. 2014. The lord of the sense: A privacy preserving reputation system for participatory sensing applications. The 19th IEEE International Conference on Communications (ISCC'2014). Madeira, Portugal 23 Jun 2014 IEEE . https://doi.org/10.1109/ISCC.2014.6912480

Domain Based Storage Protection with Secure Access Control for the Cloud
Paladi, N., Michalas, A. and Gehrmann, C. 2014. Domain Based Storage Protection with Secure Access Control for the Cloud. The 2014 International Workshop on Security in Cloud Computing, held in conjunction with the 9th ACM Symposium on Information, Computer and Communications Security (ASIACCS). Kyoto, Japan 04 Jun 2014 ACM. https://doi.org/10.1145/2600075.2600082

Security aspects of e-health systems migration to the cloud
Michalas, A., Paladi, N. and Gehrmann, C. 2014. Security aspects of e-health systems migration to the cloud. 16th IEEE International Conference on E-health Networking, Application & Services (Healthcom). Natal, Brazil 15 Oct 2014 IEEE . https://doi.org/10.1109/HealthCom.2014.7001843

Multi-party trust computation in decentralized environments in the presence of malicious adversaries
Dimitriou, T. and Michalas, A. 2013. Multi-party trust computation in decentralized environments in the presence of malicious adversaries. Ad Hoc Networks . 15 (2014), pp. 53-66. https://doi.org/10.1016/j.adhoc.2013.04.013

Multi-Party Trust Computation in Decentralized Environments
Dimitriou, T. and Michalas, A. 2012. Multi-Party Trust Computation in Decentralized Environments. International Conference on New Technologies, Mobility and Security (NTMS). Istanbul 07 - 10 May 2012 IEEE . https://doi.org/10.1109/NTMS.2012.6208686

Secure & Trusted Communication in Emergency Situations
Michalas, A., Bakopoulos, M., Komninos, N. and Prasad Neeli, R. 2012. Secure & Trusted Communication in Emergency Situations. Sarnoff Symposium (SARNOFF). Newark, NJ 21 - 22 May 2012 IEEE . https://doi.org/10.1109/SARNOF.2012.6222751

SecGOD - Google Docs: Now I Feel Safer!
Michalas, A. and Bakopoulos, M. 2012. SecGOD - Google Docs: Now I Feel Safer! The 7th IEEE International Conference for Internet Technology and Secured Transactions (ICITST-2012). London, UK 10 Dec 2012 IEEE .

Vulnerabilities of decentralized additive reputation systems regarding the privacy of individual votes
Michalas, A., Dimitriou, T., Giannetsos, T., Komninos, N. and Prasad Neeli, R. 2012. Vulnerabilities of decentralized additive reputation systems regarding the privacy of individual votes. Wireless Personal Communications. 66 (3), pp. 559-575. https://doi.org/10.1007/s11277-012-0734-z

Mitigate DoS and DDoS Attack in Ad Hoc Networks
Michalas, A., Komninos, N. and Prasad Neeli, R. 2011. Mitigate DoS and DDoS Attack in Ad Hoc Networks. International Journal of Digital Crime and Forensics (IJDCF). 3 (1), pp. 14-36. https://doi.org/10.4018/jdcf.2011010102

Permalink - https://westminsterresearch.westminster.ac.uk/item/q0060/paasword-a-holistic-data-privacy-and-security-by-design-framework-for-cloud-services


Share this

Usage statistics

202 total views
327 total downloads
These values cover views and downloads from WestminsterResearch and are for the period from September 2nd 2018, when this repository was created.