Security and Privacy Preservation of Evidence in Cloud Accountability Audits

被引:2
|
作者
Ruebsamen, Thomas [1 ]
Pulls, Tobias [2 ]
Reich, Christoph [1 ]
机构
[1] Furtwangen Univ, Cloud Res Lab, Furtwangen, Germany
[2] Karlstad Univ, Dept Math & Comp Sci, Karlstad, Sweden
关键词
D O I
10.1007/978-3-319-29582-4_6
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Cloud accountability audits are promising to strengthen trust in cloud computing by providing reassurance about the processing data in the cloud according to data handling and privacy policies. To effectively automate cloud accountability audits, various distributed evidence sources need to be considered during evaluation. The types of information range from authentication and data access logging to location information, information on security controls and incident detection. Securing that information quickly becomes a challenge in the system design, when the evidence that is needed for the audit is deemed sensitive or confidential information. This means that securing the evidence at-rest as well as in-transit is of utmost importance. In this paper, we present a system that is based on distributed software agents which enables secure evidence collection with the purpose of automated evaluation during cloud accountability audits. We thereby present the integration of Insynd as a suitable cryptographic mechanism for securing evidence. We present our reasoning for choosing Insynd by showing a comparison of Insynd properties with requirements imposed by accountability evidence collection as well as an analysis how security threats are being mitigated by Insynd. We put special emphasis on security and privacy protection in our system analysis.
引用
收藏
页码:95 / 114
页数:20
相关论文
共 50 条
  • [41] Data Security and Privacy in Cloud Computing
    Sun, Yunchuan
    Zhang, Junsheng
    Xiong, Yongping
    Zhu, Guangyu
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2014,
  • [42] Patterns for Security and Privacy in Cloud Ecosystems
    Fernandez, Eduardo B.
    Yoshioka, Nobukazu
    Washizaki, Hironori
    2015 IEEE 2ND WORKSHOP ON EVOLVING SECURITY AND PRIVACY REQUIREMENTS ENGINEERING (ESPRE), 2015, : 13 - 18
  • [43] Security and Privacy in Mobile Cloud Computing
    Suo, Hui
    Liu, Zhuohua
    Wan, Jiafu
    Zhou, Keliang
    2013 9TH INTERNATIONAL WIRELESS COMMUNICATIONS AND MOBILE COMPUTING CONFERENCE (IWCMC), 2013, : 655 - 659
  • [44] Security and privacy issues in cloud computing
    Abbas, Haider
    Maennel, Olaf
    Assar, Said
    ANNALS OF TELECOMMUNICATIONS, 2017, 72 (5-6) : 233 - 235
  • [45] Security and Privacy Issues in Cloud Computing
    Shaikh, Asma A.
    Iyer, Kamatchi
    INTERNATIONAL CONFERENCE ON INTELLIGENT DATA COMMUNICATION TECHNOLOGIES AND INTERNET OF THINGS, ICICI 2018, 2019, 26 : 1299 - 1306
  • [46] Security and Privacy Challenges in Cloud Computing
    Abdullah, Salasiah
    Abu Bakar, Khairul Azmi
    PROCEEDINGS OF THE 2018 CYBER RESILIENCE CONFERENCE (CRC), 2018,
  • [47] Who Is Responsible for Security and Privacy in the Cloud?
    Dasgupta, Dipankar
    COMPUTER INFORMATION SYSTEMS - ANALYSIS AND TECHNOLOGIES, 2011, 245 : 4 - 4
  • [48] User Privacy and Security in Cloud Computing
    Waleed, AL-Museelem
    Li Chunlin
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2016, 10 (02): : 341 - 352
  • [49] Engineering Cryptography for Security and Privacy in the Cloud
    Krenn, Stephan
    Loruenser, Thomas
    Striecks, Christoph
    ERCIM NEWS, 2018, (113): : 53 - 54
  • [50] Security and Privacy Issues in Cloud Computing
    UbaidullahBokhari, Mohammad
    MakkiShallal, Qahtan
    Tamandani, Yahya Kord
    PROCEEDINGS OF THE 10TH INDIACOM - 2016 3RD INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT, 2016, : 896 - 900