Filters








4,007 Hits in 4.7 sec

Practical and Privacy-Preserving Policy Compliance for Outsourced Data [chapter]

Giovanni Di Crescenzo, Joan Feigenbaum, Debayan Gupta, Euthimios Panagos, Jason Perry, Rebecca N. Wright
2014 Lecture Notes in Computer Science  
In this scenario, a natural problem is that of designing efficient and privacy-preserving protocols for checking compliance of a client's queries to the data owner's query compliance policy.  ...  for client access, and a server (e.g., a cloud server) holding the (encrypted) outsourced data and helping both other parties.  ...  Disclaimer: The views and conclusions contained herein are those of the authors and should not be interpreted as necessarily representing the official policies or endorsements, either expressed or implied  ... 
doi:10.1007/978-3-662-44774-1_15 fatcat:vl6corohxzbljmw7rh7gnyl4tm

Data Management for Future Wireless Networks: Architecture, Privacy Preservation, and Regulation

Xuemin Sherman Shen, Cheng Huang, Dongxiao Liu, Liang Xue, Weihua Zhuang, Rob Sun, Bidi Ying
2021 IEEE Network  
However, DM for NGWN faces two significant challenges: stakeholders' data cannot be easily managed across different trust domains under a distributed network architecture; and privacy preservation requirements  ...  Finally, we identify further research directions for achieving DM with privacy preservation.  ...  A practical and lightweight data auditing scheme for DM should achieve privacy preservation, support dynamic data updating, enable batch auditing, and achieve auditing for multiple replicas.  ... 
doi:10.1109/mnet.011.2000666 fatcat:ri3f3ptzh5bw3l6aqfsqtabkxi

Privacy-Aware Web Service Composition and Ranking

Elisa Costante, Federica Paci, Nicola Zannone
2013 International Journal of Web Services Research  
' privacy policies and (ii) ranks the composite Web services with respect to the privacy level they offer.  ...  In this paper, we propose a novel privacypreserving Web service composition and selection approach which (i) makes it possible to verify the compliance between users' privacy requirements and providers  ...  Therefore, a service would outsource (part of) its duties only to those services whose privacy practices are acceptable for it. Example 6.  ... 
doi:10.4018/ijwsr.2013070101 fatcat:6u5y5mnugrfwzllgvtcnv3mflm

Privacy-Aware Web Service Composition and Ranking

Elisa Costante, Federica Paci, Nicola Zannone
2013 2013 IEEE 20th International Conference on Web Services  
' privacy policies and (ii) ranks the composite Web services with respect to the privacy level they offer.  ...  In this paper, we propose a novel privacypreserving Web service composition and selection approach which (i) makes it possible to verify the compliance between users' privacy requirements and providers  ...  Therefore, a service would outsource (part of) its duties only to those services whose privacy practices are acceptable for it. Example 6.  ... 
doi:10.1109/icws.2013.27 dblp:conf/icws/CostantePZ13 fatcat:bkcrmhbn75e5rlik4znm5x7lra

A Literature Survey on Data Privacy/ Protection Issues and Challenges in Cloud Computing

Abdul Wahid Khan
2012 IOSR Journal of Computer Engineering  
These challenges include user's secret data (like health and financial data) loss, leakage and disclosing of privacy.  ...  We have studied literature and discussed various model in cloud computing, it shows that privacy/protection in cloud is still immature.  ...  Secure and Efficient Access to Outsourced Data [16] Providing secure and efficient access to outsourced data is an important component of cloud computing and forms the foundation for information management  ... 
doi:10.9790/0661-0132836 fatcat:pgtqj6cdarglfmzuyimbypvgje

On Minimizing the Size of Encrypted Databases [chapter]

Giovanni Di Crescenzo, David Shallcross
2014 Lecture Notes in Computer Science  
To address this weakness, we formulated a new privacy notion for outsourced databases and (variants of) a classical record length optimization problem, whose solutions achieve the new privacy notion.  ...  Motivated by applications to maintaining confidentiality and efficiency of encrypted data access in cloud computing, we uncovered an inherent confidentiality weakness in databases outsourced to cloud servers  ...  Disclaimer: The views and conclusions contained herein are those of the authors and should not be interpreted as necessarily representing the official policies or endorsements, either expressed or implied  ... 
doi:10.1007/978-3-662-43936-4_24 fatcat:jj7e2hp665ettlcyvk5xvmwdne

CCSW 2015

Florian Kerschbaum, Cristina Nita-Rotaru, Indrajit Ray
2015 Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security - CCS '15  
The CCSW workshop aims to bring together researchers and practitioners in all security and privacy aspects of cloud-centric and outsourced computing.  ...  How exactly they will look like tomorrow is still for the markets to decide, yet one thing has already been identified: clouds have new, untested deployment, associated adversarial models and vulnerabilities  ...  security • outsourced privacy-preserving computation • secure cloud resource virtualization mechanisms • secure data management outsourcing (e.g., database as a service) • practical privacy and integrity  ... 
doi:10.1145/2810103.2812620 dblp:conf/ccs/KerschbaumNR15 fatcat:a7ctwapm7rczndsnj32v2vj4xe

Cloud Computing Trends: A Literature Review

Nasser Taleb, Elfadil A. Mohamed
2020 Academic Journal of Interdisciplinary Studies  
Researchers have proposed many techniques to address the problems and challenges of cloud computing, such as security and privacy risks, through mobile cloud computing and cloud-computing governance.  ...  A mixed research study approach was adopted for the study, that is, by collecting and analyzing both quantitative and qualitative information within the same literature review and summarizing the findings  ...  The proposed scheme is quite efficient in time and adheres to a ciphertext-policy attribute-based encryption scheme. Further improvements in preserving medical-data privacy are needed.  ... 
doi:10.36941/ajis-2020-0008 fatcat:ijgg7hyk4faapdi4vzd3xfpgzm

Privacy Regulations for Cloud Computing: Compliance and Implementation in Theory and Practice [chapter]

Joep Ruiter, Martijn Warnier
2011 Computers, Privacy and Data Protection: an Element of Choice  
Acknowledgements The authors would like to thank Shay Uzery and Accenture for making this research possible.  ...  We also like to thank the anonymous reviewers for many suggestions that helped to improve the overall quality of the paper.  ...  The directive makes an implicit distinction between data controller and data processor. The data controller, the legal entity that chooses if and how data is processed, is responsible for compliance.  ... 
doi:10.1007/978-94-007-0641-5_17 fatcat:zzhgkq4nozfenhsyaf7ng74cta

SECURED REMOTE DATA AUDITING IN DISTRIBUTED CLOUD ENVIRONMENT USING ELGAMAL CRYPTOSYSTEM

2022 TAGA Journal  
By scrambling the whole mutual document, Privacy is maintained for confidential information that need to be secured and the personal information can't be viewed or modified by unauthorized person.  ...  Cloud computing provides a platform to access data remotely for businesses and individual needs. A remote data integrity check is suggested to ensure the integrity of the data stored in the cloud.  ...  by shortening time-todata, and automate compliance with data privacy requirements.  ... 
doi:10.37896/pd91.4/91461 fatcat:qka63bohkvgybirv6o6et5mdha

Legal Requirements Process for Compliance and Risk Assessment using Axiomatic Design

2017 International Journal of Computer Science Issues  
The paper proposes a model integrating regulatory compliance and risk requirements with the top-down axiomatic design/Complexity theory (AD/CT) theory for cloud contracts.  ...  The integrated approach is illustrated addressing legal compliance by design and legal contract risk assessment within the realm of cloud computing for manufacturing small to medium sized enterprise (SME  ...  policy, to be reproducible for future assessments and negotiations.  ... 
doi:10.20943/01201703.9195 fatcat:a7jk2wygdjecbop6osbjt73z64

Personalized Data Set For Analysis

Vishal Gupta, Ashutosh Saxena
2010 International Journal of Database Management Systems  
data set of an organization are being outsourced for testing, consolidation and data management.  ...  Here, an approach is presented where a new service layer is introduced, by data governance group, in the architecture for data management and can be used for preserving privacy of sensitive information  ...  His research interests are in the areas of authentication technologies, data privacy, key management and security assurance.  ... 
doi:10.5121/ijdms.2010.2404 fatcat:gi6pexxxrvgpze5i7kn4fww4p4

Averting Security Missteps in Outsourcing

E.M. Power, R.L. Trope
2005 IEEE Security and Privacy  
He advises multinational companies, investment firms and foreign governments on cross-border transactions, compliance with privacy and information security laws and regulations, trade sanctions, export  ...  and defense trade controls, antitrust, development and protection of intellectual property portfolios, cyberlaw, e-commerce, corporate governance and defense procurements.  ...  In addition, most states have enacted numerous privacy laws that directly affect the content of privacy policies and privacy compliance programs.  ... 
doi:10.1109/msp.2005.36 fatcat:o2wav4x6u5g5fjj57x7nrykds4

Addressing Security and Privacy Issues in Cloud Computing

Yousef K. Sinjilawi, Mohammad Q. AL-Nabhan, Emad A. Abu-Shanab
2014 Journal of Emerging Technologies in Web Intelligence  
Finally, possible solutions for each type of threats will be introduced before we end with conclusions and future work.  ...  This paper aims to address security and privacy issues threatening the cloud computing adoption by end users.  ...  Privacy Preserving Authorization System: Users can define their access policies and how to access their data to assure the controlled access of data in the cloud.  ... 
doi:10.4304/jetwi.6.2.192-199 fatcat:f4f4zmkidfe2pimy46hmooln6a

Data Protection in the Era of Artificial Intelligence: Trends, Existing Solutions and Recommendations for Privacy-Preserving Technologies [chapter]

Tjerk Timan, Zoltan Mann
2021 The Elements of Big Data Value  
Three trends are distinguished: (1) putting the end user of data services back as the central focal point of Privacy-Preserving Technologies, (2) the digitisation and automation of privacy policies in  ...  support and contribution to the formation of technical standards for preserving privacy.  ...  Carlos III de Madrid, Spain) and Andreas Metzger (paluno, Germany).  ... 
doi:10.1007/978-3-030-68176-0_7 fatcat:wc3cpapidvcuvaw6fynrkuxo6u
« Previous Showing results 1 — 15 out of 4,007 results