ResearchWorks Archive
    • Login
    View Item 
    •   ResearchWorks Home
    • Dissertations and Theses
    • Computer science and engineering
    • View Item
    •   ResearchWorks Home
    • Dissertations and Theses
    • Computer science and engineering
    • View Item
    JavaScript is disabled for your browser. Some features of this site may not work without it.

    Practical Improvements to User Privacy in Cloud Applications

    Thumbnail
    View/Open
    Cheng_washington_0250E_17770.pdf (1.144Mb)
    Author
    Cheng, Raymond
    Metadata
    Show full item record
    Abstract
    As the cloud handles more user data, users need better techniques to protect their privacy from adversaries looking to gain unauthorized access to sensitive data. Today’s cloud services offer weak assurances with respect to user privacy, as most data is processed unencrypted in a centralized location by systems with a large trusted computing base. While current architectures enable application development speed, this comes at the cost of susceptibility to large-scale data breaches. In this thesis, I argue that we can make significant improvements to user privacy from both external attackers and insider threats. In the first part of the thesis, I develop the Radiatus architecture for securing fully-featured cloud applications from external attacks. Radiatus secures private data stored by web applications by isolating server-side code execution into per-user sandboxes, limiting the scope of successful attacks. In the second part of the thesis, I focus on a simpler messaging application, Talek, securing it from both external and insider threats. Talek is a group private messaging system that hides both message contents as well as communication patterns from an adversary in partial control of the cloud. Both of these systems are designed to provide better security and privacy guarantees for users under realistic threat models, while offering practical performance and development costs. This thesis presents an implementation and evaluation of both systems, showing that improved user privacy can come at acceptable costs.
    URI
    http://hdl.handle.net/1773/40542
    Collections
    • Computer science and engineering [387]

    DSpace software copyright © 2002-2015  DuraSpace
    Contact Us
    Theme by 
    @mire NV
     

     

    Browse

    All of ResearchWorksCommunities & CollectionsBy Issue DateAuthorsTitlesSubjectsThis CollectionBy Issue DateAuthorsTitlesSubjects

    My Account

    LoginRegister

    DSpace software copyright © 2002-2015  DuraSpace
    Contact Us
    Theme by 
    @mire NV