44,906 Hits in 3.3 sec

Secure Data Sharing in the Cloud [chapter]

Danan Thilakanathan, Shiping Chen, Surya Nepal, Rafael A. Calvo
2013 Security, Privacy and Trust in Cloud Systems  
With multiple users from different organisations contributing to data in the Cloud, the time and cost will be much less compared to having to manually exchange data and hence creating a clutter of redundant  ...  Also in modern healthcare environments, healthcare providers are willing to store and share electronic medical records via the Cloud and hence remove the geographical dependence between healthcare provider  ...  Privacy Issues in the Cloud Privacy Issues Privacy has many definitions in literature.  ... 
doi:10.1007/978-3-642-38586-5_2 fatcat:jebyicfjijf3vmy6k763py2xja

Research on the Tradeoff Between Privacy and Trust in Cloud Computing

Pan Jun Sun
2019 IEEE Access  
In this paper, we research the relationship between privacy and trust in the cloud computing.  ...  Promoting cloud services must consider the privacy requirements between the user and the provider.  ...  In this paper, we research the relationship between privacy and trust in the cloud environment.  ... 
doi:10.1109/access.2019.2891589 fatcat:u3fq4ij7fngefgdzorjewstnve

Trust in the Balance: Data Protection Laws as Tools for Privacy and Security in the Cloud

2017 Algorithms  
This article examines two legal tools for ensuring the privacy and security of records in the cloud, data protection laws, and data localization laws, through the framework of "trust" as understood in  ...  The importance of these issues has led to a multitude of legal and regulatory efforts to find a balance and, ultimately, to ensure trust in both digital records and their storage in the cloud.  ...  Luciana Duranti has integrated the content throughout and ensured consistency. The research was conducted by all authors in the context of the InterPARES Trust project.  ... 
doi:10.3390/a10020047 fatcat:gonj7bhmqfdidmdtkfb76okv44

Trusted Block as a Service: Towards Sensitive Applications on the Cloud

Jianan Hao, Wentong Cai
2011 2011IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications  
Cloud computing grows rapidly as today's advanced information technology. However, by allowing outsourcing computation on the Cloud, users risk of disclosing privacy and obtaining forged results.  ...  In this paper, we characterize sensitive applications on the Cloud (SAND) problem and define two critical security requirements: confidentiality and verifiability.  ...  In other words, only Alice knows what is running on the Cloud. Cloud provider or a third party is thereby hard to violate user's privacy.  ... 
doi:10.1109/trustcom.2011.13 dblp:conf/trustcom/HaoC11 fatcat:2srnuhfqp5bxvgzfrnt4i7c2cy

Increasing Internet Users Trust in the Cloud Computing Era: The Role of Privacy

Christos Kalloniatis
2016 Journal of Mass Communication and Journalism  
Users' trust towards cloud computing is one of the greatest socio-technical issues today and one of the key factors that formulate users' trust is the protection of their privacy.  ...  This paper moves towards this direction identifying the privacy characteristics that must be realized when designing services for cloud users.  ...  report on privacy issues in the cloud era [9].  ... 
doi:10.4172/2165-7912.1000306 fatcat:ofgmonwpdbbc7lx6zq2232obma

Signatures for Privacy, Trust and Accountability in the Cloud: Applications and Requirements [chapter]

Alaa Alaqra, Simone Fischer-Hübner, Thomas Groß, Thomas Lorünser, Daniel Slamanig
2016 IFIP Advances in Information and Communication Technology  
Acknowledgements: The authors have received funding from the the European Union's Horizon 2020 research and innovation programme under grant agreement No 644962 (Prismacloud project).  ...  A special thanks to the workshop participants for their input.  ...  (c) Requirements elicitation of cryptographic tools from part (b) to enhance usability, privacy, and trust in the cloud.  ... 
doi:10.1007/978-3-319-41763-9_6 fatcat:jmgjwbeuirg2hcffokhzo63kwi

Examining Privacy Disclosure and Trust in the Consumer Internet of Things: An Integrated Research Framework [chapter]

Grace Fox, Theo Lynn
2020 The Cloud-to-Thing Continuum  
We present a framework for testing the effectiveness of privacy disclosures in building consumers' perceptions of privacy and trust and empowering consumers to adopt IoT devices whilst retaining some level  ...  To foster a sense of privacy and trust among consumers, IoT service providers must communicate with consumers regarding their data practices in a transparent manner.  ...  DISCLOSURE AND TRUST IN THE CONSUMER… EXAMINING PRIVACY DISCLOSURE AND TRUST IN THE CONSUMER… EXAMINING PRIVACY DISCLOSURE AND TRUST IN THE CONSUMER… EXAMINING PRIVACY DISCLOSURE AND TRUST  ... 
doi:10.1007/978-3-030-41110-7_7 fatcat:hl6njkc5pzhzbpibhxbhugt4my

Privacy, Security and Trust in Cloud Computing: The Perspective of the Telecommunication Industry

Leonardo A. Martucci, Albin Zuccato, Ben Smeets, Sheikh M. Habib, Thomas Johansson, Nahid Shahmehri
2012 2012 9th International Conference on Ubiquitous Intelligence and Computing and 9th International Conference on Autonomic and Trusted Computing  
In this paper we list such challenges and define a set of privacy, security and trust requirements that must be taken into account before cloud computing solutions can be fully integrated and deployed  ...  The telecommunication industry has been successful in turning the Internet into a mobile service and stimulating the creation of a new set of networked, remote services.  ...  In Section IV we present the privacy, security and trust requirements for the telecommunication industry when providing cloud computing services. The concluding remarks are presented in Section V.  ... 
doi:10.1109/uic-atc.2012.166 dblp:conf/uic/MartucciZSHJS12 fatcat:5uw2umsfwraolhmimiva27noee

Environmental Spatio-temporal Ontology for the Linked Open Data Cloud

Ahsan Morshed, Jagannath Aryal, Ritaban Dutta
2013 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications  
RDF representation made this ontology very flexible to publish on Linked Open Data Cloud environment.  ...  The proposed ESTO was tested for optimization of the accessibility and usability issues related to big data sets and minimize the overall application costs.  ...  ESTO could be used to identify errors within the spatiotemporal data sources, annotate the quality of the sensor observations and for trust calculation.  ... 
doi:10.1109/trustcom.2013.279 dblp:conf/trustcom/MorshedAD13 fatcat:fmdlyaxypbc25e557h2qzgzfhq

Enhancing Cloud Security and Privacy: Broadening the Service Level Agreement

Bob Duncan, Mark Whittington
2015 2015 IEEE Trustcom/BigDataSE/ISPA  
Achieving security and privacy in the cloud is not a trivial exercise.  ...  We address this issue by considering whether greater accountability, and particularly a broadening of the scope of Service Level Agreements, can enhance cloud security and privacy.  ...  Bernstein et al [26] in their proposed framework for promoting trust in the use of cloud systems identified the need to ensure a proper audit trail is maintained.  ... 
doi:10.1109/trustcom.2015.487 dblp:conf/trustcom/DuncanW15 fatcat:f5tzliyjergnzlay24ok3gfwnu


Anitha Vemulapalli
In the cloud service situation, the planning, as well as also details, is shifting into the cloud, leading to the lack of trust between clients as well as additionally cloud business.  ...  a service., etc. 400 holding, information security worries are natural as the absence of trust between cloud remedy users and a cloud expert.  ...  Conclusion Privacy opposes, along with the liberty of using big data in the cloud and also when security, as well as privacy, are being checked out really, trust little by little develop.  ... 
doi:10.26782/jmcms.2020.08.00036 fatcat:zcxtahclqneezgvum42ib6mpci

WallDroid: Cloud Assisted Virtualized Application Specific Firewalls for the Android OS

Caner Kilinc, Todd Booth, Karl Andersson
2012 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications  
Key components used by the solution include VPN technologies like the Point to Point Tunneling Protocol (PPTP) and the Android Cloud to Device Messaging Framework (C2DM).  ...  This paper proposes and evaluates an enhanced security model and architecture, WallDroid, enabling virtualized application specific firewalls managed by the cloud.  ...  Android applications, via the Google Cloud.  ... 
doi:10.1109/trustcom.2012.298 dblp:conf/trustcom/KilincBA12 fatcat:5fkpqymcuva6begm5pwnwh3ba4

iPEKS: Fast and Secure Cloud Data Retrieval from the Public-Key Encryption with Keyword Search

Fu-Kuo Tseng, Rong-Jaye Chen, Bao-Shuh Paul Lin
2013 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications  
In recent years, considerable concern has arisen over the security of the data stored in the cloud. A number of studies have suggested the use of cryptographic primitives to protect the data.  ...  The more the keywords have been searched previously, the better the efficiency can be improved. We provide theoretical analysis to show the security and privacy.  ...  Figure 1 . 1 Cloud Storage Access Model Search Privacy: The searchable keywords reveal nothing about the content of the underlying keywords.  ... 
doi:10.1109/trustcom.2013.57 dblp:conf/trustcom/TsengCL13 fatcat:wrdoo2kymnfa7gtesnnczh3yai

Cost Models for Distributed Pattern Mining in the Cloud

Sabeur Aridhi, Laurent dOrazio, Mondher Maddouri, Engelbert Mephu Nguifo
2015 2015 IEEE Trustcom/BigDataSE/ISPA  
cost of storing and querying data in the cloud.  ...  In this context, cost models are needed to help selecting the best parameters of the used approach in order to achieve a better performance especially in the cloud.  ...  cost of storing and querying data in the cloud.  ... 
doi:10.1109/trustcom.2015.569 dblp:conf/trustcom/AridhidMN15 fatcat:gsydp4uxb5bfvfdxijhfrprvfm

A Security Analysis of the Emerging P2P-Based Personal Cloud Platform MaidSafe

Florian Jacob, Jens Mittag, Hannes Hartenstein
2015 2015 IEEE Trustcom/BigDataSE/ISPA  
trust are on their rise.  ...  The emergence of decentralized crypto currencies such as Bitcoin and the success of the anonymizing network TOR lead to an increased interest in peer-to-peer based technologies lately -not only due to  ...  The aspects of privacy, security and trust were previously discussed by Mondal et al. in [12] , however, with a focus on the applicability of the P2P paradigm on domains beyond traditional file-sharing  ... 
doi:10.1109/trustcom.2015.538 dblp:conf/trustcom/JacobMH15 fatcat:wxwsnltq4zbuhchupndlhbrwx4
« Previous Showing results 1 — 15 out of 44,906 results