Cloud data does the shuffle

A computer algorithm called the Melbourne Shuffle could keep data secure in the cloud.


A computer algorithm called the Melbourne Shuffle could keep data secure in the cloud. While it is named after a dance, the algorithm can hide patterns that may emerge as users access data on cloud servers. Patterns of access could provide important information about a data set, which contains information users don't necessarily want others to know, even if the data files themselves have undergone encryption. Encrypting data is an important security measure. However, privacy leaks can occur even when accessing encrypted data. The purpose of this algorithm is to provide a higher level of privacy guarantees, beyond what encryption alone can achieve.

Ohrimenko, who just received her Ph.D. from Brown University and now works at Microsoft Research, co-authored the algorithm with Roberto Tamassia and Eli Upfal, professors of computer science at Brown, and Michael Goodrich from the University of California-Irvine. Cloud computing is increasing in popularity as more individuals use services like Google Drive and more companies outsource their data to companies like Amazon Web Services. As the amount of data on the cloud grows, so do concerns about keeping it secure. Most cloud service providers encrypt the data they store. Larger companies generally encrypt their own data before sending it to the cloud to protect it not only from hackers but also to keep cloud providers themselves from snooping around in it.

But while encryption renders data files unreadable, it can't hide patterns of data access. Those patterns can be a serious security issue. If a service provider, or someone eavesdropping on that provider, might be able to figure out that after accessing files at certain locations on the cloud server, a company tends to come out with a negative earnings report the following week. Eavesdroppers may have no idea what's in those particular files, but they know it correlates to negative earnings.

That's not the only potential security issue.

The pattern of accessing data could give away some information about what kind of computation is performing or what kind of program is running on the data. Some programs have very particular ways in which they access data. By observing those patterns, someone might be able to deduce that a company seems to be running a program that processes bankruptcy proceedings.

The Melbourne Shuffle aims to hide those patterns by shuffling the location of data on cloud servers. Ohrimenko named it after a dance that originated in Australia, where she did her undergraduate work.

Gregory Hale is the editor and founder of Industrial Safety and Security Source (, a news and information website covering safety and security issues in the manufacturing automation sector. This content originally appeared on the ISSSource website. Edited by Joy Chang, Digital Project Manager, CFE Media, 

No comments
The Engineers' Choice Awards highlight some of the best new control, instrumentation and automation products as chosen by...
The System Integrator Giants program lists the top 100 system integrators among companies listed in CFE Media's Global System Integrator Database.
The Engineering Leaders Under 40 program identifies and gives recognition to young engineers who...
This eGuide illustrates solutions, applications and benefits of machine vision systems.
Learn how to increase device reliability in harsh environments and decrease unplanned system downtime.
This eGuide contains a series of articles and videos that considers theoretical and practical; immediate needs and a look into the future.
Make Big Data and Industrial Internet of Things work for you, 2017 Engineers' Choice Finalists, Avoid control design pitfalls, Managing IIoT processes
Engineering Leaders Under 40; System integration improving packaging operation; Process sensing; PID velocity; Cybersecurity and functional safety
Mobile HMI; PID tuning tips; Mechatronics; Intelligent project management; Cybersecurity in Russia; Engineering education; Road to IANA
This article collection contains several articles on the Industrial Internet of Things (IIoT) and how it is transforming manufacturing.

Find and connect with the most suitable service provider for your unique application. Start searching the Global System Integrator Database Now!

SCADA at the junction, Managing risk through maintenance, Moving at the speed of data
Flexible offshore fire protection; Big Data's impact on operations; Bridging the skills gap; Identifying security risks
The digital oilfield: Utilizing Big Data can yield big savings; Virtualization a real solution; Tracking SIS performance
click me