A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
Secure Data Sharing in the Cloud
[chapter]
2013
Security, Privacy and Trust in Cloud Systems
With multiple users from different organisations contributing to data in the Cloud, the time and cost will be much less compared to having to manually exchange data and hence creating a clutter of redundant ...
Also in modern healthcare environments, healthcare providers are willing to store and share electronic medical records via the Cloud and hence remove the geographical dependence between healthcare provider ...
Privacy Issues in the Cloud
Privacy Issues Privacy has many definitions in literature. ...
doi:10.1007/978-3-642-38586-5_2
fatcat:jebyicfjijf3vmy6k763py2xja
Research on the Tradeoff Between Privacy and Trust in Cloud Computing
2019
IEEE Access
In this paper, we research the relationship between privacy and trust in the cloud computing. ...
Promoting cloud services must consider the privacy requirements between the user and the provider. ...
In this paper, we research the relationship between privacy and trust in the cloud environment. ...
doi:10.1109/access.2019.2891589
fatcat:u3fq4ij7fngefgdzorjewstnve
Trust in the Balance: Data Protection Laws as Tools for Privacy and Security in the Cloud
2017
Algorithms
This article examines two legal tools for ensuring the privacy and security of records in the cloud, data protection laws, and data localization laws, through the framework of "trust" as understood in ...
The importance of these issues has led to a multitude of legal and regulatory efforts to find a balance and, ultimately, to ensure trust in both digital records and their storage in the cloud. ...
Luciana Duranti has integrated the content throughout and ensured consistency. The research was conducted by all authors in the context of the InterPARES Trust project. ...
doi:10.3390/a10020047
fatcat:gonj7bhmqfdidmdtkfb76okv44
Trusted Block as a Service: Towards Sensitive Applications on the Cloud
2011
2011IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications
Cloud computing grows rapidly as today's advanced information technology. However, by allowing outsourcing computation on the Cloud, users risk of disclosing privacy and obtaining forged results. ...
In this paper, we characterize sensitive applications on the Cloud (SAND) problem and define two critical security requirements: confidentiality and verifiability. ...
In other words, only Alice knows what is running on the Cloud. Cloud provider or a third party is thereby hard to violate user's privacy. ...
doi:10.1109/trustcom.2011.13
dblp:conf/trustcom/HaoC11
fatcat:2srnuhfqp5bxvgzfrnt4i7c2cy
Increasing Internet Users Trust in the Cloud Computing Era: The Role of Privacy
2016
Journal of Mass Communication and Journalism
Users' trust towards cloud computing is one of the greatest socio-technical issues today and one of the key factors that formulate users' trust is the protection of their privacy. ...
This paper moves towards this direction identifying the privacy characteristics that must be realized when designing services for cloud users. ...
report on privacy issues in the cloud era [9]. ...
doi:10.4172/2165-7912.1000306
fatcat:ofgmonwpdbbc7lx6zq2232obma
Signatures for Privacy, Trust and Accountability in the Cloud: Applications and Requirements
[chapter]
2016
IFIP Advances in Information and Communication Technology
Acknowledgements: The authors have received funding from the the European Union's Horizon 2020 research and innovation programme under grant agreement No 644962 (Prismacloud project). ...
A special thanks to the workshop participants for their input. ...
(c) Requirements elicitation of cryptographic tools from part (b) to enhance usability, privacy, and trust in the cloud. ...
doi:10.1007/978-3-319-41763-9_6
fatcat:jmgjwbeuirg2hcffokhzo63kwi
Examining Privacy Disclosure and Trust in the Consumer Internet of Things: An Integrated Research Framework
[chapter]
2020
The Cloud-to-Thing Continuum
We present a framework for testing the effectiveness of privacy disclosures in building consumers' perceptions of privacy and trust and empowering consumers to adopt IoT devices whilst retaining some level ...
To foster a sense of privacy and trust among consumers, IoT service providers must communicate with consumers regarding their data practices in a transparent manner. ...
DISCLOSURE AND TRUST IN THE CONSUMER…
EXAMINING PRIVACY DISCLOSURE AND TRUST IN THE CONSUMER…
EXAMINING PRIVACY DISCLOSURE AND TRUST IN THE CONSUMER…
EXAMINING PRIVACY DISCLOSURE AND TRUST ...
doi:10.1007/978-3-030-41110-7_7
fatcat:hl6njkc5pzhzbpibhxbhugt4my
Privacy, Security and Trust in Cloud Computing: The Perspective of the Telecommunication Industry
2012
2012 9th International Conference on Ubiquitous Intelligence and Computing and 9th International Conference on Autonomic and Trusted Computing
In this paper we list such challenges and define a set of privacy, security and trust requirements that must be taken into account before cloud computing solutions can be fully integrated and deployed ...
The telecommunication industry has been successful in turning the Internet into a mobile service and stimulating the creation of a new set of networked, remote services. ...
In Section IV we present the privacy, security and trust requirements for the telecommunication industry when providing cloud computing services. The concluding remarks are presented in Section V. ...
doi:10.1109/uic-atc.2012.166
dblp:conf/uic/MartucciZSHJS12
fatcat:5uw2umsfwraolhmimiva27noee
Environmental Spatio-temporal Ontology for the Linked Open Data Cloud
2013
2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications
RDF representation made this ontology very flexible to publish on Linked Open Data Cloud environment. ...
The proposed ESTO was tested for optimization of the accessibility and usability issues related to big data sets and minimize the overall application costs. ...
ESTO could be used to identify errors within the spatiotemporal data sources, annotate the quality of the sensor observations and for trust calculation. ...
doi:10.1109/trustcom.2013.279
dblp:conf/trustcom/MorshedAD13
fatcat:fmdlyaxypbc25e557h2qzgzfhq
Enhancing Cloud Security and Privacy: Broadening the Service Level Agreement
2015
2015 IEEE Trustcom/BigDataSE/ISPA
Achieving security and privacy in the cloud is not a trivial exercise. ...
We address this issue by considering whether greater accountability, and particularly a broadening of the scope of Service Level Agreements, can enhance cloud security and privacy. ...
Bernstein et al [26] in their proposed framework for promoting trust in the use of cloud systems identified the need to ensure a proper audit trail is maintained. ...
doi:10.1109/trustcom.2015.487
dblp:conf/trustcom/DuncanW15
fatcat:f5tzliyjergnzlay24ok3gfwnu
RISK ASSESSMENT FOR BIG DATA IN CLOUD COMPUTING ENVIRONMENT FROM THE PERSPECTIVE OF SECURITY, PRIVACY AND TRUST
2020
JOURNAL OF MECHANICS OF CONTINUA AND MATHEMATICAL SCIENCES
In the cloud service situation, the planning, as well as also details, is shifting into the cloud, leading to the lack of trust between clients as well as additionally cloud business. ...
a service., etc. 400 holding, information security worries are natural as the absence of trust between cloud remedy users and a cloud expert. ...
Conclusion Privacy opposes, along with the liberty of using big data in the cloud and also when security, as well as privacy, are being checked out really, trust little by little develop. ...
doi:10.26782/jmcms.2020.08.00036
fatcat:zcxtahclqneezgvum42ib6mpci
WallDroid: Cloud Assisted Virtualized Application Specific Firewalls for the Android OS
2012
2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications
Key components used by the solution include VPN technologies like the Point to Point Tunneling Protocol (PPTP) and the Android Cloud to Device Messaging Framework (C2DM). ...
This paper proposes and evaluates an enhanced security model and architecture, WallDroid, enabling virtualized application specific firewalls managed by the cloud. ...
Android applications, via the Google Cloud. ...
doi:10.1109/trustcom.2012.298
dblp:conf/trustcom/KilincBA12
fatcat:5fkpqymcuva6begm5pwnwh3ba4
iPEKS: Fast and Secure Cloud Data Retrieval from the Public-Key Encryption with Keyword Search
2013
2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications
In recent years, considerable concern has arisen over the security of the data stored in the cloud. A number of studies have suggested the use of cryptographic primitives to protect the data. ...
The more the keywords have been searched previously, the better the efficiency can be improved. We provide theoretical analysis to show the security and privacy. ...
Figure 1 . 1 Cloud Storage Access Model
Search Privacy: The searchable keywords reveal nothing about the content of the underlying keywords. ...
doi:10.1109/trustcom.2013.57
dblp:conf/trustcom/TsengCL13
fatcat:wrdoo2kymnfa7gtesnnczh3yai
Cost Models for Distributed Pattern Mining in the Cloud
2015
2015 IEEE Trustcom/BigDataSE/ISPA
cost of storing and querying data in the cloud. ...
In this context, cost models are needed to help selecting the best parameters of the used approach in order to achieve a better performance especially in the cloud. ...
cost of storing and querying data in the cloud. ...
doi:10.1109/trustcom.2015.569
dblp:conf/trustcom/AridhidMN15
fatcat:gsydp4uxb5bfvfdxijhfrprvfm
A Security Analysis of the Emerging P2P-Based Personal Cloud Platform MaidSafe
2015
2015 IEEE Trustcom/BigDataSE/ISPA
trust are on their rise. ...
The emergence of decentralized crypto currencies such as Bitcoin and the success of the anonymizing network TOR lead to an increased interest in peer-to-peer based technologies lately -not only due to ...
The aspects of privacy, security and trust were previously discussed by Mondal et al. in [12] , however, with a focus on the applicability of the P2P paradigm on domains beyond traditional file-sharing ...
doi:10.1109/trustcom.2015.538
dblp:conf/trustcom/JacobMH15
fatcat:wxwsnltq4zbuhchupndlhbrwx4
« Previous
Showing results 1 — 15 out of 44,906 results