Skip to main content
Top

2015 | OriginalPaper | Chapter

LightCore: Lightweight Collaborative Editing Cloud Services for Sensitive Data

Authors : Weiyu Jiang, Jingqiang Lin, Zhan Wang, Huorong Li, Lei Wang

Published in: Applied Cryptography and Network Security

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Collaborative editing cloud servers allow a group of online users to concurrently edit a document. Every user achieves consistent views of the document by applying others’ modifications, which are pushed by the cloud servers. The cloud servers repeatedly transform, order, broadcast modifications,and merge them into a joint version in a real-time manner (typically, less than one second). However, in existing solutions such as Google Docs and Cloud9, the servers employ operational transformation to resolve edit conflicts and achieve consistent views for each online user, so all inputs (and the document) are processed as plaintext by the cloud servers. In this paper, we propose LightCore, a collaborative editing cloud service for sensitive data against honest-but-curious cloud servers. A LightCore client applies stream cipher algorithms to encrypt input characters that compose the text of the document before the user sends them to servers, while the keys are shared by all authorized users and unknown to the servers. The byte-by-byte encryption feature of stream cipher enables the servers to finish all heavy processing and provide collaborative editing cloud services as the existing solutions without the protections against curious servers. Therefore, the lightweight load of clients is kept while the users’ sensitive data are protected. We implement LightCore supporting two different methods to generate keystreams, i.e., the “pure” stream cipher and the CTR mode of block cipher. Note that the document is usually modified by collaborative users for many times, and the sequence of text segments is not input and encrypted in chronological order. So, different from the stateless CTR mode of block cipher, the overall performance of high-speed but stateful stream cipher varies significantly with different key update rules and use scenarios. The analysis and evaluation results on the prototype system show that, LightCore provides secure collaborative editing services for resource-limited clients. Finally, we suggest the suitable keystream policy for different use scenarios according to these results.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Appendix
Available only for authorised users
Footnotes
1
Other block cipher modes of operation such as OFB and CFB, also generate the keystream in bytes, but are less efficient.
 
2
Other typical attributes include font, color, size, etc..
 
Literature
1.
go back to reference Sun, D., Sun, C.: Context-based operational transformation in distributed collaborative editing systems. IEEE Trans. Parallel Distrib. Syst. 20(10), 1454–1470 (2009)CrossRef Sun, D., Sun, C.: Context-based operational transformation in distributed collaborative editing systems. IEEE Trans. Parallel Distrib. Syst. 20(10), 1454–1470 (2009)CrossRef
2.
go back to reference Shamir, A.: Stream ciphers: dead or alive? In: Lee, P.J. (ed.) ASIACRYPT 2004. LNCS, vol. 3329, pp. 78–78. Springer, Heidelberg (2004) CrossRef Shamir, A.: Stream ciphers: dead or alive? In: Lee, P.J. (ed.) ASIACRYPT 2004. LNCS, vol. 3329, pp. 78–78. Springer, Heidelberg (2004) CrossRef
3.
go back to reference Lautamäki, J., Nieminen, A., Koskinen, J., Aho, T., Mikkonen, T., Englund, M.: Cored: browser-based collaborative real-time editor for Java web applications. In: 12 Computer Supported Cooperative Work (CSCW), pp. 1307–1316 (2012) Lautamäki, J., Nieminen, A., Koskinen, J., Aho, T., Mikkonen, T., Englund, M.: Cored: browser-based collaborative real-time editor for Java web applications. In: 12 Computer Supported Cooperative Work (CSCW), pp. 1307–1316 (2012)
4.
go back to reference Fan, H., Sun, C.: Supporting semantic conflict prevention in real-time collaborative programming environments. ACM SIGAPP Appl. Comput. Rev. 12(2), 39–52 (2012)CrossRef Fan, H., Sun, C.: Supporting semantic conflict prevention in real-time collaborative programming environments. ACM SIGAPP Appl. Comput. Rev. 12(2), 39–52 (2012)CrossRef
5.
go back to reference Lamport, L.: Time, clocks, and the ordering of events in a distributed system. Commun. ACM 21(7), 558–565 (1978)CrossRefMATH Lamport, L.: Time, clocks, and the ordering of events in a distributed system. Commun. ACM 21(7), 558–565 (1978)CrossRefMATH
6.
go back to reference Nédelec, B., Molli, P., Mostéfaoui, A., Desmontils, E.: LSEQ: an adaptive structure for sequences in distributed collaborative editing. In: Proceedings of the 2013 ACM symposium on Document engineering, pp. 37–46 (2013) Nédelec, B., Molli, P., Mostéfaoui, A., Desmontils, E.: LSEQ: an adaptive structure for sequences in distributed collaborative editing. In: Proceedings of the 2013 ACM symposium on Document engineering, pp. 37–46 (2013)
7.
go back to reference Nédelec, B., Molli, P., Mostéfaoui, A., Desmontils, E.: Concurrency effects over variable-size identifiers in distributed collaborative editing. In: Proceedings of the International workshop on Document Changes: Modeling, Detection, Storage and Visualization (2013) Nédelec, B., Molli, P., Mostéfaoui, A., Desmontils, E.: Concurrency effects over variable-size identifiers in distributed collaborative editing. In: Proceedings of the International workshop on Document Changes: Modeling, Detection, Storage and Visualization (2013)
8.
go back to reference Vidot, N., Cart, M., Ferrié, J., Suleiman, M.: Copies convergence in a distributed real-time collaborative environment. In: Proceeding on the ACM 2000 Conference on Computer Supported Cooperative Work (CSCW), pp. 171–180 (2000) Vidot, N., Cart, M., Ferrié, J., Suleiman, M.: Copies convergence in a distributed real-time collaborative environment. In: Proceeding on the ACM 2000 Conference on Computer Supported Cooperative Work (CSCW), pp. 171–180 (2000)
11.
go back to reference Raykova, M., Zhao, H., Bellovin, S.M.: Privacy enhanced access control for outsourced data sharing. In: 16th International Conference on Financial Cryptography and Data Security (FC), pp. 223–238 (2012) Raykova, M., Zhao, H., Bellovin, S.M.: Privacy enhanced access control for outsourced data sharing. In: 16th International Conference on Financial Cryptography and Data Security (FC), pp. 223–238 (2012)
12.
go back to reference di Vimercati, S.D.C., Foresti, S., Jajodia, S., Livraga, G., Paraboschi, S., Samarati, P.: Enforcing dynamic write privileges in data outsourcing. Comput. Secur. 39, 47–63 (2013)CrossRef di Vimercati, S.D.C., Foresti, S., Jajodia, S., Livraga, G., Paraboschi, S., Samarati, P.: Enforcing dynamic write privileges in data outsourcing. Comput. Secur. 39, 47–63 (2013)CrossRef
13.
go back to reference Zhou, L., Varadharajan, V., Hitchens, M.: Secure administration of cryptographic role-based access control for large-scale cloud storage systems. J. Comput. Syst. Sci. 80(8), 1518–1533 (2014)MathSciNetCrossRefMATH Zhou, L., Varadharajan, V., Hitchens, M.: Secure administration of cryptographic role-based access control for large-scale cloud storage systems. J. Comput. Syst. Sci. 80(8), 1518–1533 (2014)MathSciNetCrossRefMATH
14.
go back to reference Li, M., Yu, S., Ren, K., Lou, W.: Securing personal health records in cloud computing: patient-centric and fine-grained data access control in multi-owner settings. In: Jajodia, S., Zhou, J. (eds.) SecureComm 2010. LNICST, vol. 50, pp. 89–106. Springer, Heidelberg (2010) CrossRef Li, M., Yu, S., Ren, K., Lou, W.: Securing personal health records in cloud computing: patient-centric and fine-grained data access control in multi-owner settings. In: Jajodia, S., Zhou, J. (eds.) SecureComm 2010. LNICST, vol. 50, pp. 89–106. Springer, Heidelberg (2010) CrossRef
15.
go back to reference Feldman, A.J., Zeller, W.P., Freedman, M.J., Felten, E.W.: SPORC: group collaboration using untrusted cloud resources. In: 9th USENIX Symposium on Operating Systems Design and Implementation, pp. 337–350 (2010) Feldman, A.J., Zeller, W.P., Freedman, M.J., Felten, E.W.: SPORC: group collaboration using untrusted cloud resources. In: 9th USENIX Symposium on Operating Systems Design and Implementation, pp. 337–350 (2010)
16.
go back to reference Sang, C., Li, Q., Kong, L.: Tenant oriented lock concurrency control in the shared storage multi-tenant database. In: 16th IEEE International Enterprise Distributed Object Computing Conference Workshops (EDOC), pp. 179–189 (2012) Sang, C., Li, Q., Kong, L.: Tenant oriented lock concurrency control in the shared storage multi-tenant database. In: 16th IEEE International Enterprise Distributed Object Computing Conference Workshops (EDOC), pp. 179–189 (2012)
17.
go back to reference Sun, C.: Optional and responsive fine-grain locking in internet-based collaborative systems. IEEE Trans. Parallel Distrib. Syst. 13(9), 994–1008 (2002)CrossRef Sun, C.: Optional and responsive fine-grain locking in internet-based collaborative systems. IEEE Trans. Parallel Distrib. Syst. 13(9), 994–1008 (2002)CrossRef
18.
go back to reference Fraser, N.: Differential synchronization. In: Proceedings of the 2009 ACM Symposium on Document Engineering, New York, USA, pp. 13–20 (2009) Fraser, N.: Differential synchronization. In: Proceedings of the 2009 ACM Symposium on Document Engineering, New York, USA, pp. 13–20 (2009)
21.
go back to reference Bernstein, P.A., Hadzilacos, V., Goodman, N.: Concurrency Control and Recovery in Database Systems. Addison Wesley, Reading (1987) Bernstein, P.A., Hadzilacos, V., Goodman, N.: Concurrency Control and Recovery in Database Systems. Addison Wesley, Reading (1987)
22.
go back to reference Ressel, M., Nitsche-Ruhland, D., Gunzenhäuser, R.: An integrating, transformation-oriented approach to concurrency control and undo in group editors. In: Proceedings of the ACM 1996 Conference on Computer Supported Cooperative Work (CSCW), pp. 288–297 (1996) Ressel, M., Nitsche-Ruhland, D., Gunzenhäuser, R.: An integrating, transformation-oriented approach to concurrency control and undo in group editors. In: Proceedings of the ACM 1996 Conference on Computer Supported Cooperative Work (CSCW), pp. 288–297 (1996)
23.
go back to reference Ressel, M., Gunzenhäuser, R.: Reducing the problems of group undo. In: Proceedings of the International ACM SIGGROUP Conference on Supporting Group Work, pp. 131–139 (1999) Ressel, M., Gunzenhäuser, R.: Reducing the problems of group undo. In: Proceedings of the International ACM SIGGROUP Conference on Supporting Group Work, pp. 131–139 (1999)
24.
go back to reference Sun, C.: Undo as concurrent inverse in group editors. Interactions 10(2), 7–8 (2003)CrossRef Sun, C.: Undo as concurrent inverse in group editors. Interactions 10(2), 7–8 (2003)CrossRef
25.
go back to reference Schneier, B.: Fast software encryption. In: 7th International Workshop (FSE 2000), vol. 1978, pp. 182–184 (1994) Schneier, B.: Fast software encryption. In: 7th International Workshop (FSE 2000), vol. 1978, pp. 182–184 (1994)
26.
go back to reference Boesgaard, M., Vesterager, M., Pedersen, T., Christiansen, J., Scavenius, O.: Rabbit: a new high-performance stream cipher. In: Johansson, T. (ed.) FSE 2003. LNCS, vol. 2887, pp. 307–329. Springer, Heidelberg (2003) CrossRef Boesgaard, M., Vesterager, M., Pedersen, T., Christiansen, J., Scavenius, O.: Rabbit: a new high-performance stream cipher. In: Johansson, T. (ed.) FSE 2003. LNCS, vol. 2887, pp. 307–329. Springer, Heidelberg (2003) CrossRef
27.
go back to reference Mousa, A., Hamad, A.: Evaluation of the RC4 algorithm for data encryption. IJCSA 3(2), 44–56 (2006) Mousa, A., Hamad, A.: Evaluation of the RC4 algorithm for data encryption. IJCSA 3(2), 44–56 (2006)
28.
go back to reference Hoffman, P., Yergeau, F.: Utf-16, an encoding of iso 10646, Technical report RFC 2781, February 2000 Hoffman, P., Yergeau, F.: Utf-16, an encoding of iso 10646, Technical report RFC 2781, February 2000
Metadata
Title
LightCore: Lightweight Collaborative Editing Cloud Services for Sensitive Data
Authors
Weiyu Jiang
Jingqiang Lin
Zhan Wang
Huorong Li
Lei Wang
Copyright Year
2015
DOI
https://doi.org/10.1007/978-3-319-28166-7_11

Premium Partner