Privacy-Preserving Cloud-Assisted Services

Jian Liu

Research output: ThesisDoctoral ThesisCollection of Articles

Abstract

In the last decade, there has been a move towards making traditional IT services follow a cloud-assisted services paradigm. This has triggered previously local services to be moved to a cloud-assisted setting to reap the advantages of the cloud-assisted paradigm that can work with simple client-side functionality ("thin clients"). Examples of such services are cloud storage, cloud-assistedmalware checking and "machine learning as a service" (MLaas).  Despite their benefits, these kinds of services put users' privacy at risk since the data stored in the cloud and/or the requests submitted to the cloud may contain sensitive information. On the other hand, unless carefully designed, this service paradigm may nonetheless fail to protect the confidentiality of service providers' business assets (e.g., malware databases or machine learning models) against malicioususers.  This dissertation shows how to leverage cryptographic technologies and trusted execution environments to design cloud-assisted services such that end users can protect their privacy, and if needed, service providers can ensure that their security/privacy requirements are not violated. We provide a general definition for privacy-preserving cloud-assisted services, investigate the privacy issues in three cloud-assisted services: lookup service, prediction service and storage service, and propose solutions on how to make them privacy-preserving.
Translated title of the contributionPrivacy-Preserving Cloud-Assisted Services
Original languageEnglish
QualificationDoctor's degree
Awarding Institution
  • Aalto University
Supervisors/Advisors
  • Asokan, N., Supervising Professor
Publisher
Print ISBNs978-952-60-8043-7
Electronic ISBNs978-952-60-8044-4
Publication statusPublished - 2018
MoE publication typeG5 Doctoral dissertation (article)

Keywords

  • private set intersection
  • TEEs
  • machine learning
  • neural networks
  • secure two-party computation
  • cloud storage
  • deduplication

Fingerprint

Dive into the research topics of 'Privacy-Preserving Cloud-Assisted Services'. Together they form a unique fingerprint.

Cite this