Skip to main content

Trust Is not Enough: Privacy and Security in ASP and Web Service Environments

  • Conference paper
  • First Online:
Advances in Databases and Information Systems (ADBIS 2002)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2435))

Abstract

Application service providers (ASPs) and web services are becoming increasingly popular despite adverse IT market conditions. New languages and protocols like XML, SOAP, and UDDI provide the technical underpinnings for a global infrastructure where anybody with a networked computer has access to a large number of digital services. Not every potential customer, however, may feel comfortable about entrusting sensitive personal or corporate data to a ser- vice provider in an unprotected manner. Even if there is a high level of trust be- tween customer and provider, there may be legal requirements that require a higher level of privacy. Customers may also want to be prepared for an unfore- seen change of control on the provider’s side. something that is not an uncom- mon occurrence especially among start-up companies. This paper reviews sev- eral solutions how customers can use a provider’s services without giving it ac- cess to any sensitive data. After discussing the relative merits of trust vs. tech- nology, we focus on privacy homomorphisms, an encryption technique origi- nally proposed by Rivest et al. that maintains the structure of the input data while obscuring the actual content. We conclude with several proposals how to integrate privacy homomorphisms into existing service architectures.

This research was supported by the Deutsche Forschungsgemeinschaft, Berlin-Brandenburg Graduate School in Distributed Information Systems (DFG grant no. GRK 316/2).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Ahituv, N., Lapid, Y., and Neumann, S., Processing Encrypted Data, Communications of the ACM, Vol.20, pp.777–780, 1987.

    Article  Google Scholar 

  2. Asonov, D. Private Information Retrieval. An Overview and Current Trends. In Proceedings ECDPvA Workshop, Informatik 2001, Vienna, Austria, September 2001.

    Google Scholar 

  3. Atallah, M.J., Pantazopoulos, K.N., Rice, J.R., and Spafford, E.H., Secure Outsourcing of Scientific Computations, Advances in Computers, 54, Chapter 6, pp. 215–272, July 2001.

    Google Scholar 

  4. Bobineau, C., Bouganim, L., Pucheral, P., and Valduriez, P., PicoDBMS: Scaling down Database Techniques for the Smartcard. In Proceedings 26th VLDB Conference, Cairo, Egypt, 2000.

    Google Scholar 

  5. Brickell, E., and Yacobi, Y., On Privacy Homomorphisms, in: D. Chaum and W.L. Price, eds., Advances in Cryptology-Eurocrypt’ 87, Springer, Berlin, 1988.

    Google Scholar 

  6. Canny, J., Collaborative Filtering with Privacy. http://www.millennium.berkeley.edu/retreat/files/Sharing0601.ppt, 2001.

  7. Chor, B., Goldreich, O., Kushilevitz, E., and Sudan, M.: Private Information Retrieval. In Proceedings 36th IEEE FOCS Conference, pp.41–50, New York, 1995

    Google Scholar 

  8. Denning, D., Cryptography and Data Security, Addison-Wesley, 1982.

    Google Scholar 

  9. Domingo-Ferrer J., A New Privacy Homomorphism and Applications, Information Processing Letters, Vol.60, No.5, pp.277–282, December 1996.

    Article  MathSciNet  Google Scholar 

  10. Domingo-Ferrer, J., Multi-application Smart Cards and Encrypted Data Processing, Future Generation Computer Systems, Vol.13, pp.65–74, June 1997.

    Google Scholar 

  11. Domingo-Ferrer, J., and Herrera-Joanconmartí, A Privacy Homomorphism Allowing Field Operations on Encrypted Data, Jornades de Matemàtica Discreta i Algorísmica, Barcelona 1998.

    Google Scholar 

  12. Hacigumus, H., Mehrotra, S., Iyer, B., and Li, C., Executing SQL over Encrypted Data in the Database Service Provider Model, In Proceedings ACM SIGMOD Conference, June 2002.

    Google Scholar 

  13. Jacobsen, H.-A., G. Riessen, and Günther, O., MMM-Middleware for Method Management on the WWW, In Proceedings WWW8 Conference, 1999.

    Google Scholar 

  14. Leymann, F., Roller, D., and Schmidt, M.-T., Web services and Business Process Management. IBM Systems Journal, Vol.41, No.2, 2002.

    Google Scholar 

  15. Rivest, R., Adleman, L., and Dertouzos, M.L., On Data Banks and Privacy Homomorphisms. In Foundations of Secure Computations. Academic Press, New York, 1978.

    Google Scholar 

  16. Rivest, R., Shamir, A., and Adleman, L. A Method for Obtaining Digital Signatures and Public-key Cryptosystems. Communications of the ACM, Vol.21, No.2, 1978.

    Google Scholar 

  17. Sander, T., and Tschudin, C., On Software Protection Via Function Hiding, In Proceedings 2nd Workshop on Information Hiding, LNCS Springer, 1998.

    Google Scholar 

  18. Schurig, S., Geheimhaltung in Statistischen Datenbanken, Shaker, 1998.

    Google Scholar 

  19. Smith, S.W., and Weingart, S.H., Building a High-Performance, Programmable Secure Coprocessor. In Computer Networks, Special Issue on Computer Network Security, No.31, pp. 831–860, 1999.

    Google Scholar 

  20. Stallings, W., Cryptography and Network Security: Principles and Practice. Prentice-Hall, 1999.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2002 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Boyens, C., Günther, O. (2002). Trust Is not Enough: Privacy and Security in ASP and Web Service Environments. In: Manolopoulos, Y., Návrat, P. (eds) Advances in Databases and Information Systems. ADBIS 2002. Lecture Notes in Computer Science, vol 2435. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-45710-0_2

Download citation

  • DOI: https://doi.org/10.1007/3-540-45710-0_2

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-44138-0

  • Online ISBN: 978-3-540-45710-7

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics