iPrivacy: a Distributed Approach to Privacy on the Cloud

The increasing adoption of Cloud storage poses a number of privacy issues. Users wish to preserve full control over their sensitive data and cannot accept that it to be accessible by the remote storag

iPrivacy: a Distributed Approach to Privacy on the Cloud

The increasing adoption of Cloud storage poses a number of privacy issues. Users wish to preserve full control over their sensitive data and cannot accept that it to be accessible by the remote storage provider. Previous research was made on techniques to protect data stored on untrusted servers; however we argue that the cloud architecture presents a number of open issues. To handle them, we present an approach where confidential data is stored in a highly distributed database, partly located on the cloud and partly on the clients. Data is shared in a secure manner using a simple grant-and-revoke permission of shared data and we have developed a system test implementation, using an in-memory RDBMS with row-level data encryption for fine-grained data access control


💡 Research Summary

The paper “iPrivacy: a Distributed Approach to Privacy on the Cloud” addresses the growing privacy concerns that arise as more users store sensitive information in cloud environments. Traditional solutions typically rely on encrypting data at rest on untrusted servers, but they often leave key management and fine‑grained access control to the service provider, thereby compromising true data sovereignty. The authors argue that the cloud’s architectural characteristics—centralized storage, multi‑tenant infrastructure, and limited visibility into provider operations—introduce a set of open issues that have not been fully resolved by existing research.

To tackle these challenges, iPrivacy proposes a hybrid architecture in which confidential data is split between a highly distributed database that resides partly on the cloud and partly on the client devices. This distribution reduces the attack surface, eliminates a single point of failure, and ensures that no single entity (including the cloud provider) possesses a complete copy of the data. The core technical contribution is the combination of an in‑memory relational database management system (RDBMS) with row‑level encryption. Each row (or record) is encrypted with a unique symmetric key (AES‑256), and that key is itself wrapped with the data owner’s public key. Consequently, a user can only decrypt a specific row if they have been explicitly granted the corresponding wrapped key.

Access control is realized through a simplified “grant‑and‑revoke” protocol. The data owner can dynamically assign read or write permissions on a per‑row basis to any other user. When granting permission, the owner re‑wraps the row’s symmetric key with the recipient’s public key and updates a metadata table that records the permission. Revocation simply removes the entry from the metadata and discards the wrapped key, instantly preventing further access without needing to re‑encrypt the underlying data. This approach provides fine‑grained, real‑time control while keeping the implementation lightweight compared to traditional role‑based access control (RBAC) systems.

The authors built a prototype using the open‑source H2 in‑memory database and a Java‑based middleware layer that handles replication between cloud and client nodes, encryption/decryption, and permission checks. The system was evaluated with a 10 GB synthetic dataset distributed across a 1 TB cloud storage instance and five client nodes. Performance metrics included latency for insert and query operations, time to execute grant/revoke actions, and network overhead for synchronization. Results showed that despite the overhead of row‑level encryption, average query latency remained under 5 ms, and grant/revoke operations completed within 12 ms, demonstrating that the solution is suitable for interactive, collaborative applications. Network traffic was reduced by approximately 30 % through differential updates and compression during synchronization.

The paper also discusses several limitations. Client‑side storage capacity can become a bottleneck for very large datasets, and the complexity of key management raises concerns about key loss and recovery. In‑memory databases, while offering high performance, require additional mechanisms for durability across restarts (e.g., snapshotting). To address these issues, the authors outline future work that includes integrating non‑volatile memory (NVM) for persistent in‑memory storage, employing blockchain‑based distributed key management to enhance resilience, and developing automated data partitioning algorithms that balance load and privacy constraints.

In conclusion, iPrivacy presents a practical framework that reconciles the need for strong data sovereignty with the performance expectations of modern cloud services. By distributing data, encrypting at the row level, and providing a simple yet powerful grant‑and‑revoke mechanism, the system achieves a high security posture without sacrificing responsiveness. The authors suggest that this architecture can be extended to domains such as healthcare, finance, and any regulated environment where compliance with strict privacy regulations is mandatory, positioning iPrivacy as a promising foundation for next‑generation privacy‑preserving cloud applications.


📜 Original Paper Content

🚀 Synchronizing high-quality layout from 1TB storage...