2008
DOI: 10.1504/ijics.2008.022489
|View full text |Cite
|
Sign up to set email alerts
|

Privacy analysis and enhancements for data sharing in *nix systems

Abstract: Linux and its various flavors (together called *nix) are growing in mainstream popularity and many enterprise infrastructures now are based on *nix platforms. An important component of these systems is the ingrained multi-user support that lets users share data with each other.In this paper, we first analyze *nix systems and identify an urgent need for better privacy support in their data sharing mechanisms. In one of our studies it was possible to access over 84 GB of private data at one organization of 836 u… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2008
2008
2018
2018

Publication Types

Select...
2
2

Relationship

2
2

Authors

Journals

citations
Cited by 4 publications
(4 citation statements)
references
References 16 publications
0
4
0
Order By: Relevance
“…It separated read and write access: read access to the physical storage device is granted to all principals and write access can be granted to everyone. The authors of first analyzed *nix systems and identify an urgent need for better privacy support in their data sharing mechanisms and gave two solutions for privacy enhancement. Later, they proposed a data sharing platform, named SHAROES, for outsourced storage environment.…”
Section: Related Workmentioning
confidence: 99%
“…It separated read and write access: read access to the physical storage device is granted to all principals and write access can be granted to everyone. The authors of first analyzed *nix systems and identify an urgent need for better privacy support in their data sharing mechanisms and gave two solutions for privacy enhancement. Later, they proposed a data sharing platform, named SHAROES, for outsourced storage environment.…”
Section: Related Workmentioning
confidence: 99%
“…Further, they posit the argument that this approach is unstable and question its sustainability. Whilst most research undertaken in the field is case related or interpretive, based on secondary data, Singh et al (2008) take a proactive approach by undertaking experiments designed to gain access to private data in a chosen public sector organisation. That they recorded a high level of success without the aid of any technological weaknesses in the organisation provides an insight into the vulnerability of personal data held in the workplace.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Most of the related work [7], [8], [11], [12] provides only a restricted access control model with few permission settings. Typically, they only provide read and write permissions at a file level and hierarchical directory permissions are not supported, which studies suggest to be dominant in current local systems [13]. In contrast, the SHAROES system is able to provide rich data sharing semantics by carefully manipulating filesystem metadata and key distribution.…”
Section: A Data Sharing Challengesmentioning
confidence: 99%
“…In other words, a user can not do an "ls" on the directory, but can "cd" into it and access contents by using their exact name. This is a widely used permission in *nix systems and our study at two large organizations showed that greater than 70% of users use exec-only permissions on directories [13]. To support this permission in SHAROES, the directory-table structure requires further manipulation using cryptographic primitives.…”
Section: A *Nix Directory Capsmentioning
confidence: 99%