Security and Privacy Preservation of Evidence in Cloud Accountability Audits

被引:2
|
作者
Ruebsamen, Thomas [1 ]
Pulls, Tobias [2 ]
Reich, Christoph [1 ]
机构
[1] Furtwangen Univ, Cloud Res Lab, Furtwangen, Germany
[2] Karlstad Univ, Dept Math & Comp Sci, Karlstad, Sweden
关键词
D O I
10.1007/978-3-319-29582-4_6
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Cloud accountability audits are promising to strengthen trust in cloud computing by providing reassurance about the processing data in the cloud according to data handling and privacy policies. To effectively automate cloud accountability audits, various distributed evidence sources need to be considered during evaluation. The types of information range from authentication and data access logging to location information, information on security controls and incident detection. Securing that information quickly becomes a challenge in the system design, when the evidence that is needed for the audit is deemed sensitive or confidential information. This means that securing the evidence at-rest as well as in-transit is of utmost importance. In this paper, we present a system that is based on distributed software agents which enables secure evidence collection with the purpose of automated evaluation during cloud accountability audits. We thereby present the integration of Insynd as a suitable cryptographic mechanism for securing evidence. We present our reasoning for choosing Insynd by showing a comparison of Insynd properties with requirements imposed by accountability evidence collection as well as an analysis how security threats are being mitigated by Insynd. We put special emphasis on security and privacy protection in our system analysis.
引用
收藏
页码:95 / 114
页数:20
相关论文
共 50 条
  • [11] An Approach of Privacy Preservation and Data Security in Cloud Computing for Secured Data Sharing
    Dewangan, Revati Raman
    Soni, Sunita
    Mishal, Ashish
    RECENT ADVANCES IN ELECTRICAL & ELECTRONIC ENGINEERING, 2025, 18 (02) : 176 - 195
  • [12] Accountability as a Way Forward for Privacy Protection in the Cloud
    Pearson, Siani
    Charlesworth, Andrew
    CLOUD COMPUTING, PROCEEDINGS, 2009, 5931 : 131 - +
  • [13] An Analysis on Data Accountability and Security in Cloud
    Hande, Shital A.
    Mane, Sunil B.
    2015 INTERNATIONAL CONFERENCE ON INDUSTRIAL INSTRUMENTATION AND CONTROL (ICIC), 2015, : 713 - 717
  • [14] Security and Privacy in Cloud Computing
    Tari, Zahir
    IEEE CLOUD COMPUTING, 2014, 1 (01): : 54 - 57
  • [15] Cloud-Assisted EHR Sharing With Security and Privacy Preservation via Consortium Blockchain
    Wang, Yong
    Zhang, Aiqing
    Zhang, Peiyun
    Wang, Huaqun
    IEEE ACCESS, 2019, 7 : 136704 - 136719
  • [16] A Focus on Security and Privacy in the Cloud
    Yousif, Mazin
    IEEE CLOUD COMPUTING, 2014, 1 (03): : 8 - 9
  • [17] Security and Privacy in Cloud Computing
    Hamouda, Sara
    2012 INTERNATIONAL CONFERENCE ON CLOUD COMPUTING TECHNOLOGIES, APPLICATIONS AND MANAGEMENT (ICCCTAM), 2012, : 241 - 245
  • [18] Security and Privacy in Cloud Computing
    Xiao, Zhifeng
    Xiao, Yang
    IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2013, 15 (02): : 843 - 859
  • [19] Security and Privacy in Cloud Computing
    Soni, Rajat
    Ambalkar, Smrutee
    Bansal, Pratosh
    2016 SYMPOSIUM ON COLOSSAL DATA ANALYSIS AND NETWORKING (CDAN), 2016,
  • [20] Data Security and Privacy in the Cloud
    di Vimercati, Sabrina De Capitani
    Foresti, Sara
    Livraga, Giovanni
    Samarati, Pierangela
    MOBILE MULTIMEDIA/IMAGE PROCESSING, SECURITY, AND APPLICATIONS 2019, 2019, 10993