Runtime Model-Based Privacy Checks of Big Data Cloud Services

  • Eric SchmiedersEmail author
  • Andreas Metzger
  • Klaus Pohl
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 9435)


Cloud services have to comply with privacy policies when storing or processing data. As cloud services become increasingly data-intensive, e.g., in the case of big data analytics, data privacy concerns become more critical and challenging to address. In particular, data may only be processed at certain geo-locations. However, the actual geo-locations of the many storage and compute nodes involved in big data processing is dynamically selected during runtime. In addition, the execution of concrete data processing tasks may change data classifications from, e.g., personal to anonymized data. Thus, privacy policy checks for big data cloud services have to consider information about the actual nodes and data processing tasks at runtime. The proposed approach R-PRIS monitors cloud services to derive and maintain typed runtime models providing the aforementioned information. R-PRIS checks the typed runtime models against privacy policies by employing a data-classification-aware search. The evaluation of R-PRIS, performed on Amazon Web Services (including Hadoop), indicates that the approach may efficiently and timely detect privacy violations in big data cloud services.


Privacy Big data Cloud services Runtime checking 



This work was partially supported by the DFG (German Res. Found.) under Priority Programme “SPP1593” (grant PO 607/3-1).


  1. 1.
    Aceto, G., Botta, A., de Donato, W., Pescapè, A.: Cloud monitoring: A survey. Comput. Netw. 57(9), 2093–2115 (2013). CrossRefGoogle Scholar
  2. 2.
    Brosig, F., Huber, N., Kounev, S.: Automated extraction of architecture-level performance models of distributed component-based systems. In: 2011 26th IEEE/ACM International Conference on Automated Software Engineering (ASE) (2011)Google Scholar
  3. 3.
    Chen, H., Chiang, R.H., Storey, V.C.: Business intelligence and analytics: From big data to big impact. MIS Q. 36(4), 1165–1188 (2012)Google Scholar
  4. 4.
    Ehrig, H., Ehrig, K., Prange, U., Taentzer, G.: Fundamentals of Algebraic Graph Transformation. Monographs in Theoretical Computer Science. An EATCS Series. Springer-Verlag New York Inc., Secaucus (2006)zbMATHGoogle Scholar
  5. 5.
    Epifani, I., Ghezzi, C., Mirandola, R., Tamburrelli, G.: Model evolution by run-time parameter adaptation. In: 31st International Conference on Software Engineering (ICSE) (2009)Google Scholar
  6. 6.
    e Ghazia, U., Masood, R., Shibli, M.: Comparative analysis of access control systems on cloud. In: 2012 13th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel Distributed Computing (SNPD) (2012)Google Scholar
  7. 7.
    Gondree, M., Peterson, Z.N.: Geolocation of data in the cloud. In: Proceedings of the third ACM Conference on Data and Application Security and Privacy, CODASPY 2013. ACM, New York (2013)Google Scholar
  8. 8.
    Huber, N., Brosig, F., Kounev, S.: Modeling dynamic virtualized resource landscapes. In: Proceedings of the 8th International ACM SIGSOFT Conference on Quality of Software Architectures (2012)Google Scholar
  9. 9.
    Ivanović, D., Carro, M., Hermenegildo, M.: Constraint-based runtime prediction of SLA violations in service orchestrations. In: Kappel, G., Maamar, Z., Motahari-Nezhad, H.R. (eds.) Service Oriented Computing. LNCS, vol. 7084, pp. 62–76. Springer, Heidelberg (2011) CrossRefGoogle Scholar
  10. 10.
    Juels, A., Oprea, A.: New approaches to security and availability for cloud data. Commun. ACM 56(2), 64–73 (2013)CrossRefGoogle Scholar
  11. 11.
    Mao, M., Humphrey, M.: A performance study on the VM startup time in the cloud. In: 2012 IEEE 5th International Conference on Cloud Computing (CLOUD), pp. 423–430Google Scholar
  12. 12.
    Maoz, S.: Using model-based traces as runtime models. Computer 42(10), 28–36 (2009)CrossRefGoogle Scholar
  13. 13.
    Park, S., Chung, S.: Privacy-preserving attribute distribution mechanism for access control in a grid. In: 21st International Conference on Tools with Artificial Intelligence (2009)Google Scholar
  14. 14.
    Rausch, A., Reussner, R., Mirandola, R., Plasil, F. (eds.): The Common Component Modelling Example (CoCoME). LNCS, vol. 5153. Springer, Heidelberg (2011) Google Scholar
  15. 15.
    Schmieders, E., Metzger, A.: Preventing performance violations of service compositions using assumption-based run-time verification. In: Abramowicz, W., Llorente, I.M., Surridge, M., Zisman, A., Vayssière, J. (eds.) ServiceWave 2011. LNCS, vol. 6994, pp. 194–205. Springer, Heidelberg (2011) CrossRefGoogle Scholar
  16. 16.
    Schmieders, E., Metzger, A., Pohl, K.: A runtime model approach for data geo-location checks of cloud services. In: Franch, X., Ghose, A.K., Lewis, G.A., Bhiri, S. (eds.) ICSOC 2014. LNCS, vol. 8831, pp. 306–320. Springer, Heidelberg (2014) CrossRefGoogle Scholar
  17. 17.
    Schmieders, E., Metzger, A., Pohl, K.: Architectural runtime models for privacy checks of cloud applications. In: Proceedings of the 7th International Workshop on Principles of Engineering Service-Oriented and Cloud Systems, PESOS 2015, ACM, New York (2015)Google Scholar
  18. 18.
    Szvetits, M., Zdun, U.: Systematic literature review of the objectives, techniques, kinds, and architectures of models at runtime. Softw. Syst. Model., Dec 2013Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2015

Authors and Affiliations

  1. 1.paluno (The Ruhr Institute for Software Technology)University of Duisburg-EssenEssenGermany

Personalised recommendations