The Infrastructure Level of Cloud Computing as a Basis for Privacy and Security of Software Services

@inproceedings{Schiering2011TheIL,
  title={The Infrastructure Level of Cloud Computing as a Basis for Privacy and Security of Software Services},
  author={Ina Schiering and Johannes Kretschmer},
  booktitle={PrimeLife},
  year={2011}
}
An important basis for cloud computing are public IaaS cloud services as offered e.g. by Amazon, Rackspace, VmWare. Since IaaS cloud services are often used as a flexible infrastructure for SaaS cloud services, it is important to investigate IaaS cloud services as a basis to realise regulatory requirements in cloud computing, e.g the European Data Protection Directive and the E-Privacy Directive. In this context a prototype of an IaaS cloud service is presented which serves as a basis for… 

PRESENT CHALLENGES AND FUTURE PROMISES OF CLOUD COMPUTING

This paper highlights the main challenges in CC and the future application prospects of the existing IT systems to the cloud and highlights the need for absolute privacy protection and preservation in cloud assisted data mining.

A survey paper on privacy issue in cloud computing

A survey on numerous works on cloud computing, a survey on several research on cloud privacy issues, classify current solutions for privacy issues in cloud environments as architectures, approaches and methods and the advantages and disadvantages of current studies are tabulated.

Cloud Computing: Risks and Opportunities for Corporate Social Responsibility

The impact of the most recent technological development, Cloud Computing, on the corporate users that adopt this service is analyzed.

CloudComputing:Risks andOpportunities for Corporate Social Responsibility

The impact of the most recent technological development, Cloud Computing, on the corporate users that adopt this service is analyzed.

References

SHOWING 1-10 OF 31 REFERENCES

Designing Cloud Services Adhering to Government Privacy Laws

The Cloud Data Security (CloudDataSec) project is presented, which aims to design cloud services adhering to government privacy laws and introduces a six-layer security model for cloud computing and three level of security assurance for SMEs to take advantage of.

Towards Trusted Cloud Computing

The design of a trusted cloud computing platform (TCCP) is proposed, which enables Infrastructure as a Service (IaaS) providers such as Amazon EC2 to provide a closed box execution environment that guarantees confidential execution of guest virtual machines.

Implementing Trust in Cloud Infrastructures

This work presents a system that enables periodical and necessity-driven integrity measurements and remote attestations of vital parts of cloud computing infrastructures and shows how this system attests the integrity of a cloud infrastructure and detects all changes performed by system administrators in a typical software configuration, even in the presence of a simulated denial-of-service attack.

The NIST Definition of Cloud Computing

This cloud model promotes availability and is composed of five essential characteristics, three service models, and four deployment models.

Who controls the cloud

The conclusion of this analysis is that cloud computing scenarios have to be assessed on an individual basis and that the protection the Directive offers to data subjects is often unsatisfactory.

Taking account of privacy when designing cloud computing services

  • Siani Pearson
  • Computer Science
    2009 ICSE Workshop on Software Engineering Challenges of Cloud Computing
  • 2009
The privacy challenges that software engineers face when targeting the cloud as their production environment to offer services are assessed, and key design principles to address these are suggested.

A Privacy Impact Assessment Tool for Cloud Computing

A Privacy Impact Assessment decision support tool that can be integrated within a cloud computing environment and properly distinguished from reactive processes, applied to existing systems to ensure their continuing conformity with internal rules and external requirements.

Controlling data in the cloud: outsourcing computation without outsourcing control

It is argued that with continued research advances in trusted computing and computation-supporting encryption, life in the cloud can be advantageous from a business intelligence standpoint over the isolated alternative that is more common today.

Cloud security is not (just) virtualization security: a short paper

This work presents a solution that is highly scalable, centralizes guest protection into a security VM, supports Linux and Windows operating systems and can be easily extended to support new operating systems, and does not assume any a-priori semantic knowledge of the guest.

Above the Clouds: A Berkeley View of Cloud Computing

This work focuses on SaaS Providers (Cloud Users) and Cloud Providers, which have received less attention than SAAS Users, and uses the term Private Cloud to refer to internal datacenters of a business or other organization, not made available to the general public.