Skip to Main content Skip to Navigation
New interface
Conference papers

Stream Processing with Secure Information Flow Constraints

Abstract : In the near future, clouds will provide situational monitoring services such as health monitoring, stock market monitoring, shopping cart monitoring, and emergency control and threat management. Offering such services requires securely processing data streams generated by multiple, possibly competing and/or complementing, organizations, such that there is no overt or covert leakage of sensitive information. We demonstrate how an information flow control model adapted from the Chinese Wall policy can be used to protect against sensitive data disclosure in data stream management system. We also develop a language based on Continuous Query Language that can be used to express information flow constraints in stream processing and provide its formal semantics.
Document type :
Conference papers
Complete list of metadata

Cited literature [30 references]  Display  Hide  Download
Contributor : Hal Ifip Connect in order to contact the contributor
Submitted on : Wednesday, March 28, 2018 - 3:57:20 PM
Last modification on : Thursday, August 1, 2019 - 3:18:56 PM
Long-term archiving on: : Thursday, September 13, 2018 - 12:26:31 PM


Files produced by the author(s)


Distributed under a Creative Commons Attribution 4.0 International License



Indrakshi Ray, Raman Adaikkalavan, Xing Xie, Rose Gamble. Stream Processing with Secure Information Flow Constraints. 29th IFIP Annual Conference on Data and Applications Security and Privacy (DBSEC), Jul 2015, Fairfax, VA, United States. pp.311-329, ⟨10.1007/978-3-319-20810-7_22⟩. ⟨hal-01745816⟩



Record views


Files downloads