Complying with Data Handling Requirements in Cloud Storage Systems

@article{Henze2018ComplyingWD,
  title={Complying with Data Handling Requirements in Cloud Storage Systems},
  author={Martin Henze and Roman Matzutt and Jens Hiller and Erik M{\"u}hmer and Jan Henrik Ziegeldorf and Johannes van der Giet and Klaus Wehrle},
  journal={ArXiv},
  year={2018},
  volume={abs/1806.11448}
}
In past years, cloud storage systems saw an enormous rise in usage. However, despite their popularity and importance as underlying infrastructure for more complex cloud services, today's cloud storage systems do not account for compliance with regulatory, organizational, or contractual data handling requirements by design. Since legislation increasingly responds to rising data protection and privacy concerns, complying with data handling requirements becomes a crucial property for cloud storage… Expand
Accounting for Privacy in the Cloud Computing Landscape
TLDR
This dissertation is convinced that overcoming the inherent privacy challenges of cloud computing requires cooperation between the various actors in the cloud computing landscape, i.e., users, service providers, and infrastructure providers and provides technical approaches that enable each of them to account for privacy. Expand
A Case for Integrated Data Processing in Large-Scale Cyber-Physical Systems
TLDR
This paper exemplarily study a fine blanking line which can produce up to 6.2 Gbit/s worth of data to showcase the extreme requirements found in modern manufacturing and proposes integrated data processing which keeps inherently local and small-scale tasks close to the processes while at the same time centralizing tasks relying on more complex decision procedures and remote data sources. Expand
Cybersecurity in Power Grids: Challenges and Opportunities
TLDR
This paper analyzes the communication infrastructure of power grids to derive resulting fundamental challenges ofPower grids with respect to cybersecurity, and proposes a defense-in-depth strategy that encompasses measures for device and application security, network security, physical security, as well as policies, procedures, and awareness. Expand
Transparent End-to-End Security for Publish/Subscribe Communication in Cyber-Physical Systems
TLDR
This work proposes ENTRUST, a novel solution for key server-based end-to-end security in publish/subscribe systems that transparently realizes confidentiality, integrity, and authentication for publish/ Subscribe systems without any modification of the underlying protocol. Expand
Machine Learning Assisted PUF Calibration for Trustworthy Proof of Sensor Data in IoT
TLDR
A new class of authenticated sensing protocols are presented where the beneficence of ML techniques are used to validate the authenticity and integrity of sensor data over ambient factor variations and reduces the storage complexity of the verifier. Expand

References

SHOWING 1-10 OF 93 REFERENCES
Practical Data Compliance for Cloud Storage
TLDR
This paper introduces PRADA, a practical approach to enforce data compliance in key-value based cloud storage systems by introducing a transparent data handling layer which enables clients to specify data handling requirements and provides operators with the technical means to adhere to them. Expand
Creating optimal cloud storage systems
TLDR
A novel cloud storage management system which optimally combines storage resources from multiple providers so that redundancy, security and other non-functional properties can be adjusted adequately to the needs of the storage service consumer. Expand
Towards Data Handling Requirements-Aware Cloud Computing
TLDR
This paper identifies and discusses the challenges for enabling data handling requirements awareness in the (inter-)cloud, and shows how to extend a data storage service, AppScale, and Cassandra to followData handling requirements-aware cloud computing. Expand
Compliance-Preserving Cloud Storage Federation Based on Data-Driven Usage Control
TLDR
This paper proposes a novel approach of using data-driven usage control to preserve compliance constraints in cloud storage federation and provides a brief categorization of compliance problems into spatial, temporal, and qualitative requirements. Expand
Monitoring Personal Data Transfers in the Cloud
TLDR
This paper designs a framework for automating the collection of evidence that obligations with respect to personal data handling are being carried out in what concerns personal data transfers, and experiments the approach in the Open Stack open source IaaS implementation, showing how auditors can verify whether data transfers were compliant. Expand
A dynamic Tenant-Defined Storage system for efficient resource management in cloud applications
TLDR
A dynamic and extensible system for the management of storage resources in multi-tenant cloud applications that is hierarchically clustered based on multiple scenario-specific characteristics, and allocated to storage resources using a hierarchical bin packing algorithm. Expand
Information Flow Audit for PaaS Clouds
TLDR
It is demonstrated how CamFlow can be extended to provide data-centric audit logs akin to provenance metadata in a format in which analyses can easily be automated through the use of standard graph processing tools, which allows detailed understanding of the overall system. Expand
The Cloud Needs Cross-Layer Data Handling Annotations
TLDR
This paper proposes to annotate data with sensitivity information as it leaves the control boundaries of the data owner and travels through to the cloud environment to signal privacy properties across the layers of the cloud computing architecture and enables the different stakeholders to react accordingly. Expand
CloudFilter: practical control of sensitive data propagation to the cloud
TLDR
This paper suggests a practical mechanism to ensure that an enterprise maintains control of its sensitive data while employees are allowed to use cloud services and shows that CloudFilter can be applied to control data propagation to Dropbox and GSS. Expand
A Monitoring and Audit Logging Architecture for Data Location Compliance in Federated Cloud Infrastructures
TLDR
An existing federated Cloud monitoring infrastructure can be used for data location monitoring without compromising Cloud isolation and the proposed logging architecture is validated by an e-Government case study with legal data location constraints. Expand
...
1
2
3
4
5
...