Abstract
Cloud computing is growing in popularity due to its ability to offer dynamically scalable resources provisioned as services regardless of user or location device. However, moving data to the cloud means that the control of the data is more on the hands of the cloud provider rather than the data owner. This to a certain extent means that cloud users are skeptical about losing their privacy when moving data to environments they do not control. From this stems the need for the means to allow the data owner to monitor what is happening to her/his data. This paper presents a framework that could assist in efforts to address privacy issues in the cloud. A proof of concept prototype implementation is presented to validate the framework. Evaluations are then carried out to test the utility and applicability of the proposed solution.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Pearson, J., Logan, C., Reis, D., Taveras, L., Koerner, D.: Answers to Healthcare Leaders’ Cloud Questions (2014)
Allison, D.S., Capretz, M.A.: Furthering the growth of cloud computing by providing privacy as a service. In: Kranzlmüller, D., Toja, A.M. (eds.) ICT-GLOW 2011. LNCS, vol. 6868, pp. 64–78. Springer, Heidelberg (2011)
Subashini, S., Kavitha, V.: A survey on security issues in service delivery models of cloud computing. J. Netw. Comput. Appl. 34(1), 1–11 (2011)
Hogan Lovells.: Cloud Computing: A Primer on Legal Issues, Including Privacy and Data Security Concerns (2010). https://www.cisco.com/web/about/doing_business/legal/privacy_compliance/docs/CloudPrimer.pdf
Lenk, A., Klems, M., Nimis, J., Tai, S., Sandholm, T.: What’s inside the cloud? An architectural map of the cloud landscape. In: Proceedings of the 2009 ICSE Workshop on Software Engineering Challenges of Cloud Computing, CLOUD 2009. pp. 23–31 (2009)
Regard, H,: OECD guidelines governing the protection of privacy and transborder flows of personal data (2013). http://www.oecd.org/sti/ieconomy/2013-oecd-privacy-guidelines.pdf. Accessed 20 March 2014
Reed, A., Rezek, C., Simmonds, P.: Security Guidance for Critical Areas of Focus in Cloud Computing V3.0. Cloud Security Alliance (2011)
Glott, R., Husmann, E., Sadeghi, A.-R., Schunter, M.: Trustworthy clouds underpinning the future internet. In: Domingue, J., et al. (eds.) Future Internet Assembly. LNCS, vol. 6656, pp. 209–221. Springer, Heidelberg (2011)
Lovrek, I., Lovric, T., Lucic, D.: Regulatory aspects of cloud computing. In: 2012 20th International Conference on Software Telecommunications and Computer Networks (SoftCOM), pp. 1–7. IEEE (2012)
Ngugi, B., Dardick, G.: Security and Privacy Assurance in Advancing Technologies, 30 November 2010
Kandukuri, B.R., Patturi, V.R., Rakshit, A.: Cloud security issues. In: 2009 IEEE International Conference on Services Computing, pp. 517–520 (2009)
Prince, B.: IBM Discovers Encryption Scheme That Could Improve Cloud Security, Spam Filtering. http://www.eweek.com/c/a/Security/IBM-Uncovers-Encryption-Scheme-That-Could-Improve-Cloud-Security-Spam-Filtering-135413/
Grobauer, B., Walloschek, T., Stöcker, E.: Understanding cloud computing vulnerabilities. IEEE Secur. Priv. 9, 50–57 (2011)
De Oliveira, A.S., Sendor, J., Garaga, A., Jenatton, K.: Monitoring personal data transfers in the cloud. In: Proceedings of the International Conference on Cloud Computing Technology and Science, CloudCom, pp. 347–354 (2013)
Lindell, Y., Pinkas, B.: An efficient protocol for secure two-party computation in the presence of malicious adversaries. J. Cryptol. 28, 312–350 (2014)
Yao, A.C.: Protocols for secure computations. In: 23rd Annual Symposium on Foundations of Computer Science, Sfcs 1982 (1982)
Muntés-Mulero, V., Nin, J.: Privacy and anonymization for very large datasets. In: Proceeding of the 18th ACM Conference on Information and Knowledge Management - CIKM 2009, p. 2117 (2009)
Wang, C., Chow, S.S.M., Wang, Q., Ren, K., Lou, W.: Privacy-preserving public auditing for secure cloud storage. IEEE Trans. Comput. 62, 362–375 (2013)
Itani, W., Kayssi, A., Chehab, A.: Privacy as a service: privacy-aware data storage and processing in cloud computing architectures. In: 8th IEEE International Symposium on Dependable, Autonomic and Secure Computing, DASC 2009, pp. 711–716 (2009)
Abadi, M.: Trusted computing, trusted third parties, and verified communications. In: Deswarte, Y., Cuppens, F., Jajodia, S., Wang, L. (eds.) Future Internet Assembly. IFIP, vol. 147, pp. 291–308. Springer, Heidelberg (2004)
Pearson, S., Shen, Y., Mowbray, M.: A privacy manager for cloud computing. In: Jaatun, M.G., Zhao, G., Rong, C. (eds.) Cloud Computing. LNCS, vol. 5931, pp. 90–106. Springer, Heidelberg (2009)
Mowbray, M., Pearson, S., Shen, Y.: Enhancing privacy in cloud computing via policy-based obfuscation. J. Supercomput. 61, 267–291 (2012)
Anderson, C.L., Agarwal, R.: Practicing safe computing: a multimethod empirical examination of home computer user security behavioral intentions. MIS Q. 34, 613–615 (2010)
Mather, T., Kumaraswamy, S., Latif, S.: Cloud Security and Privacy. O’Reilly, Sebastopol (2009)
Brooke, J.: SUS-A quick and dirty usability scale. Usability Eval. Ind. 189, 194 (1996)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Shabalala, M.V., Tarwireyi, P., Adigun, M.O. (2015). Addressing Privacy in Cloud Computing Environment. In: Nungu, A., Pehrson, B., Sansa-Otim, J. (eds) e-Infrastructure and e-Services for Developing Countries. AFRICOMM 2014. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 147. Springer, Cham. https://doi.org/10.1007/978-3-319-16886-9_15
Download citation
DOI: https://doi.org/10.1007/978-3-319-16886-9_15
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-16885-2
Online ISBN: 978-3-319-16886-9
eBook Packages: Computer ScienceComputer Science (R0)