Security and Privacy Preservation of Evidence in Cloud Accountability Audits

被引:2
|
作者
Ruebsamen, Thomas [1 ]
Pulls, Tobias [2 ]
Reich, Christoph [1 ]
机构
[1] Furtwangen Univ, Cloud Res Lab, Furtwangen, Germany
[2] Karlstad Univ, Dept Math & Comp Sci, Karlstad, Sweden
关键词
D O I
10.1007/978-3-319-29582-4_6
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Cloud accountability audits are promising to strengthen trust in cloud computing by providing reassurance about the processing data in the cloud according to data handling and privacy policies. To effectively automate cloud accountability audits, various distributed evidence sources need to be considered during evaluation. The types of information range from authentication and data access logging to location information, information on security controls and incident detection. Securing that information quickly becomes a challenge in the system design, when the evidence that is needed for the audit is deemed sensitive or confidential information. This means that securing the evidence at-rest as well as in-transit is of utmost importance. In this paper, we present a system that is based on distributed software agents which enables secure evidence collection with the purpose of automated evaluation during cloud accountability audits. We thereby present the integration of Insynd as a suitable cryptographic mechanism for securing evidence. We present our reasoning for choosing Insynd by showing a comparison of Insynd properties with requirements imposed by accountability evidence collection as well as an analysis how security threats are being mitigated by Insynd. We put special emphasis on security and privacy protection in our system analysis.
引用
收藏
页码:95 / 114
页数:20
相关论文
共 50 条
  • [31] Enabling privacy and security in Cloud of Things: Architecture, applications, security & privacy challenges
    Ari, Ado Adamou Abba
    Ngangmo, Olga Kengni
    Titouna, Chafiq
    Thiare, Ousmane
    Kolyang
    Mohamadou, Alidou
    Gueroui, Abdelhak Mourad
    APPLIED COMPUTING AND INFORMATICS, 2024, 20 (1/2) : 119 - 141
  • [32] Security and privacy issues in cloud computing
    Haider Abbas
    Olaf Maennel
    Saïd Assar
    Annals of Telecommunications, 2017, 72 : 233 - 235
  • [33] Cloud Computing: Security, Privacy and Practice
    Xiang, Yang
    Di Martino, Beniamino
    Wang, Guilin
    Li, Jin
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF GRID COMPUTING AND ESCIENCE, 2015, 52 : 59 - 60
  • [34] IPAL: An integrity preservation and accountability layer for cloud storage
    An, Baoyu
    Xiao, Da
    Yang, Yixian
    Xing, Guoqiang
    Journal of Convergence Information Technology, 2012, 7 (18) : 90 - 99
  • [35] Multiuser Privacy and Security Conflicts in the Cloud
    Alhelali, Eman
    Ramokapane, Kopo M.
    Such, Jose
    PROCEEDINGS OF THE 2023 CHI CONFERENCE ON HUMAN FACTORS IN COMPUTING SYSTEMS (CHI 2023), 2023,
  • [36] Data Security and Privacy in Cloud Storage
    Xinhua Dong
    Ruixuan Li
    Wanwan Zhou
    Dongjie Liao
    Shuoyi Zhao
    ZTECommunications, 2013, 11 (02) : 18 - 23
  • [37] Privacy, security and accountability: ethics, law and policy.
    O'Connor, Courteney
    INTERNATIONAL AFFAIRS, 2017, 93 (03) : 718 - 719
  • [38] Security and Privacy in Cloud Computing: A Survey
    Shankarwar, Mahesh U.
    Pawar, Ambika V.
    PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON FRONTIERS OF INTELLIGENT COMPUTING: THEORY AND APPLICATIONS (FICTA) 2014, VOL 2, 2015, 328 : 1 - 11
  • [39] Privacy and Security Security for Mobile and Cloud Frontiers in Healthcare
    Kotz, David
    Fu, Kevin
    Gunter, Carl
    Rubin, Avi
    COMMUNICATIONS OF THE ACM, 2015, 58 (08) : 21 - 23
  • [40] Evaluating Security and Privacy in Cloud Services
    Abuhussein, Abdullah
    Alsubaei, Faisal
    Shiva, Sajjan
    Sheldon, Frederick T.
    PROCEEDINGS 2016 IEEE 40TH ANNUAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE WORKSHOPS, VOL 1, 2016, : 683 - 686