skip to main content
10.1145/1559845.1559972acmconferencesArticle/Chapter ViewAbstractPublication PagesmodConference Proceedingsconference-collections
demonstration

StreamShield: a stream-centric approach towards security and privacy in data stream environments

Published:29 June 2009Publication History

ABSTRACT

We propose to demonstrate the StreamShield, a system designed to address the problem of security and privacy in the context of Data Stream Management Systems (DSMSs). In StreamShield, continuous access control is enforced by taking a novel "stream-centric" approach towards security. Security policies are not persistently stored on the server, but rather are depicted by security metadata, called "security punctuations", and get embedded into streams together with the data. We distinguish between two types of security punctuations: (1) the "data security punctuations" (dsps) describing the data-side security policies, and (2) the "query security punctuations" (qsps) representing the query-side security policies. The advantages of such stream-centric security model include flexibility, dynamicity and speed of enforcement. Furthermore, DSMSs can adapt to not only data-related but also to security-related selectivities, which helps reduce the waste of resources, when few subjects have access to streaming data.

References

  1. A. Deshpande et.al. Adaptive query processing. Found. Trends databases, 1(1), 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. M. A. Bishop. The Art and Science of Computer Security. Addison-Wesley Longman Publishing Co., Inc., 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Bright Kite. http://brightkite.com/.Google ScholarGoogle Scholar
  4. Distributed Stream Integration. http://www.cis.upenn.edu/ zives/stream--integration/.Google ScholarGoogle Scholar
  5. R.Nehme et.al. A security punctuation framework for enforcing access control on streaming data. In ICDE, pages 406--415, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. R.Sandhu et.al. The nist model for role-based access control: towards a unified standard. In RBAC, pages 47--63, 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. T. Sutherland et.al. D-cape: distributed and self-tuned continuous query processing. In CIKM, pages 217--218, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. StreamShield: a stream-centric approach towards security and privacy in data stream environments

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      SIGMOD '09: Proceedings of the 2009 ACM SIGMOD International Conference on Management of data
      June 2009
      1168 pages
      ISBN:9781605585512
      DOI:10.1145/1559845

      Copyright © 2009 Copyright is held by the owner/author(s)

      Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 29 June 2009

      Check for updates

      Qualifiers

      • demonstration

      Acceptance Rates

      Overall Acceptance Rate785of4,003submissions,20%

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader