Skip to main content

Addressing Privacy in Cloud Computing Environment

  • Conference paper
  • First Online:
e-Infrastructure and e-Services for Developing Countries (AFRICOMM 2014)

Abstract

Cloud computing is growing in popularity due to its ability to offer dynamically scalable resources provisioned as services regardless of user or location device. However, moving data to the cloud means that the control of the data is more on the hands of the cloud provider rather than the data owner. This to a certain extent means that cloud users are skeptical about losing their privacy when moving data to environments they do not control. From this stems the need for the means to allow the data owner to monitor what is happening to her/his data. This paper presents a framework that could assist in efforts to address privacy issues in the cloud. A proof of concept prototype implementation is presented to validate the framework. Evaluations are then carried out to test the utility and applicability of the proposed solution.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Pearson, J., Logan, C., Reis, D., Taveras, L., Koerner, D.: Answers to Healthcare Leaders’ Cloud Questions (2014)

    Google Scholar 

  2. Allison, D.S., Capretz, M.A.: Furthering the growth of cloud computing by providing privacy as a service. In: Kranzlmüller, D., Toja, A.M. (eds.) ICT-GLOW 2011. LNCS, vol. 6868, pp. 64–78. Springer, Heidelberg (2011)

    Chapter  Google Scholar 

  3. Subashini, S., Kavitha, V.: A survey on security issues in service delivery models of cloud computing. J. Netw. Comput. Appl. 34(1), 1–11 (2011)

    Article  Google Scholar 

  4. Hogan Lovells.: Cloud Computing: A Primer on Legal Issues, Including Privacy and Data Security Concerns (2010). https://www.cisco.com/web/about/doing_business/legal/privacy_compliance/docs/CloudPrimer.pdf

  5. Lenk, A., Klems, M., Nimis, J., Tai, S., Sandholm, T.: What’s inside the cloud? An architectural map of the cloud landscape. In: Proceedings of the 2009 ICSE Workshop on Software Engineering Challenges of Cloud Computing, CLOUD 2009. pp. 23–31 (2009)

    Google Scholar 

  6. Regard, H,: OECD guidelines governing the protection of privacy and transborder flows of personal data (2013). http://www.oecd.org/sti/ieconomy/2013-oecd-privacy-guidelines.pdf. Accessed 20 March 2014

  7. Reed, A., Rezek, C., Simmonds, P.: Security Guidance for Critical Areas of Focus in Cloud Computing V3.0. Cloud Security Alliance (2011)

    Google Scholar 

  8. Glott, R., Husmann, E., Sadeghi, A.-R., Schunter, M.: Trustworthy clouds underpinning the future internet. In: Domingue, J., et al. (eds.) Future Internet Assembly. LNCS, vol. 6656, pp. 209–221. Springer, Heidelberg (2011)

    Chapter  Google Scholar 

  9. Lovrek, I., Lovric, T., Lucic, D.: Regulatory aspects of cloud computing. In: 2012 20th International Conference on Software Telecommunications and Computer Networks (SoftCOM), pp. 1–7. IEEE (2012)

    Google Scholar 

  10. Ngugi, B., Dardick, G.: Security and Privacy Assurance in Advancing Technologies, 30 November 2010

    Google Scholar 

  11. Kandukuri, B.R., Patturi, V.R., Rakshit, A.: Cloud security issues. In: 2009 IEEE International Conference on Services Computing, pp. 517–520 (2009)

    Google Scholar 

  12. Prince, B.: IBM Discovers Encryption Scheme That Could Improve Cloud Security, Spam Filtering. http://www.eweek.com/c/a/Security/IBM-Uncovers-Encryption-Scheme-That-Could-Improve-Cloud-Security-Spam-Filtering-135413/

  13. Grobauer, B., Walloschek, T., Stöcker, E.: Understanding cloud computing vulnerabilities. IEEE Secur. Priv. 9, 50–57 (2011)

    Article  Google Scholar 

  14. De Oliveira, A.S., Sendor, J., Garaga, A., Jenatton, K.: Monitoring personal data transfers in the cloud. In: Proceedings of the International Conference on Cloud Computing Technology and Science, CloudCom, pp. 347–354 (2013)

    Google Scholar 

  15. Lindell, Y., Pinkas, B.: An efficient protocol for secure two-party computation in the presence of malicious adversaries. J. Cryptol. 28, 312–350 (2014)

    Article  MathSciNet  Google Scholar 

  16. Yao, A.C.: Protocols for secure computations. In: 23rd Annual Symposium on Foundations of Computer Science, Sfcs 1982 (1982)

    Google Scholar 

  17. Muntés-Mulero, V., Nin, J.: Privacy and anonymization for very large datasets. In: Proceeding of the 18th ACM Conference on Information and Knowledge Management - CIKM 2009, p. 2117 (2009)

    Google Scholar 

  18. Wang, C., Chow, S.S.M., Wang, Q., Ren, K., Lou, W.: Privacy-preserving public auditing for secure cloud storage. IEEE Trans. Comput. 62, 362–375 (2013)

    Article  MathSciNet  Google Scholar 

  19. Itani, W., Kayssi, A., Chehab, A.: Privacy as a service: privacy-aware data storage and processing in cloud computing architectures. In: 8th IEEE International Symposium on Dependable, Autonomic and Secure Computing, DASC 2009, pp. 711–716 (2009)

    Google Scholar 

  20. Abadi, M.: Trusted computing, trusted third parties, and verified communications. In: Deswarte, Y., Cuppens, F., Jajodia, S., Wang, L. (eds.) Future Internet Assembly. IFIP, vol. 147, pp. 291–308. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  21. Pearson, S., Shen, Y., Mowbray, M.: A privacy manager for cloud computing. In: Jaatun, M.G., Zhao, G., Rong, C. (eds.) Cloud Computing. LNCS, vol. 5931, pp. 90–106. Springer, Heidelberg (2009)

    Chapter  Google Scholar 

  22. Mowbray, M., Pearson, S., Shen, Y.: Enhancing privacy in cloud computing via policy-based obfuscation. J. Supercomput. 61, 267–291 (2012)

    Article  Google Scholar 

  23. Anderson, C.L., Agarwal, R.: Practicing safe computing: a multimethod empirical examination of home computer user security behavioral intentions. MIS Q. 34, 613–615 (2010)

    Google Scholar 

  24. Mather, T., Kumaraswamy, S., Latif, S.: Cloud Security and Privacy. O’Reilly, Sebastopol (2009)

    Google Scholar 

  25. Brooke, J.: SUS-A quick and dirty usability scale. Usability Eval. Ind. 189, 194 (1996)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mangqoba V. Shabalala .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

About this paper

Cite this paper

Shabalala, M.V., Tarwireyi, P., Adigun, M.O. (2015). Addressing Privacy in Cloud Computing Environment. In: Nungu, A., Pehrson, B., Sansa-Otim, J. (eds) e-Infrastructure and e-Services for Developing Countries. AFRICOMM 2014. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 147. Springer, Cham. https://doi.org/10.1007/978-3-319-16886-9_15

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-16886-9_15

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-16885-2

  • Online ISBN: 978-3-319-16886-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics