{"title":"安全数据共享的容器覆盖评估","authors":"Sara Shakeri, L. Veen, P. Grosso","doi":"10.1109/LCNSymposium50271.2020.9363266","DOIUrl":null,"url":null,"abstract":"There are many organizations interested in sharing data with others, and they can do this only if a secure platform is available. Such platforms, often referred to as Digital Data Marketplaces (DDMs), require that all of the transactions follow the agreements which are established by the participating organizations. However, translating high-level sharing policies and setting up such an infrastructure is still a big challenge.Our work shows that containers and overlay networks can be deployed to construct a sharing platform considering security and performance aspects. We introduce an architecture for handling sharing requests in a container-based platform with focusing on improving security. We define three container connectivity: Overlay per DDM, Overlay per request, and Overlay per group. Our security analysis shows that the method \"Overlay per request\" is more secure against cross-container attacks. In terms of the time taken to complete the sharing requests, the difference between methods is small.","PeriodicalId":194989,"journal":{"name":"2020 IEEE 45th LCN Symposium on Emerging Topics in Networking (LCN Symposium)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":"{\"title\":\"Evaluation of Container Overlays for Secure Data Sharing\",\"authors\":\"Sara Shakeri, L. Veen, P. Grosso\",\"doi\":\"10.1109/LCNSymposium50271.2020.9363266\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"There are many organizations interested in sharing data with others, and they can do this only if a secure platform is available. Such platforms, often referred to as Digital Data Marketplaces (DDMs), require that all of the transactions follow the agreements which are established by the participating organizations. However, translating high-level sharing policies and setting up such an infrastructure is still a big challenge.Our work shows that containers and overlay networks can be deployed to construct a sharing platform considering security and performance aspects. We introduce an architecture for handling sharing requests in a container-based platform with focusing on improving security. We define three container connectivity: Overlay per DDM, Overlay per request, and Overlay per group. Our security analysis shows that the method \\\"Overlay per request\\\" is more secure against cross-container attacks. In terms of the time taken to complete the sharing requests, the difference between methods is small.\",\"PeriodicalId\":194989,\"journal\":{\"name\":\"2020 IEEE 45th LCN Symposium on Emerging Topics in Networking (LCN Symposium)\",\"volume\":\"28 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2020-11-17\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2020 IEEE 45th LCN Symposium on Emerging Topics in Networking (LCN Symposium)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/LCNSymposium50271.2020.9363266\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 IEEE 45th LCN Symposium on Emerging Topics in Networking (LCN Symposium)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/LCNSymposium50271.2020.9363266","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Evaluation of Container Overlays for Secure Data Sharing
There are many organizations interested in sharing data with others, and they can do this only if a secure platform is available. Such platforms, often referred to as Digital Data Marketplaces (DDMs), require that all of the transactions follow the agreements which are established by the participating organizations. However, translating high-level sharing policies and setting up such an infrastructure is still a big challenge.Our work shows that containers and overlay networks can be deployed to construct a sharing platform considering security and performance aspects. We introduce an architecture for handling sharing requests in a container-based platform with focusing on improving security. We define three container connectivity: Overlay per DDM, Overlay per request, and Overlay per group. Our security analysis shows that the method "Overlay per request" is more secure against cross-container attacks. In terms of the time taken to complete the sharing requests, the difference between methods is small.