Abstract | ||
---|---|---|
Data leakages out of cloud computing environments are fundamental cloud security concerns for both the end-users and the cloud service providers. A literature survey of the existing technologies revealed the inadequacies of current technologies and the need for a new methodology. This position paper discusses the requirements and proposes a novel auditing methodology that enables tracking of data transferred out of Clouds. Initial results from our prototypes are reported. This research is aligned to our vision that by providing transparency, accountability and audit trails for all data events within and out of the Cloud, trust and confidence can be instilled into the industry as users will get to know what exactly is going on with their data in and out of the Cloud. |
Year | DOI | Venue |
---|---|---|
2012 | 10.1109/TrustCom.2012.282 | TrustCom |
Keywords | Field | DocType |
cloud service provider,data leakages,new methodology,cloud service providers,novel auditing methodology,cloud security,current technology,literature survey,fundamental cloud security,fundamental cloud security concern,cloud data provenance,initial result,data accountability,cloud computing,existing technology,data event,cloud computing environment,security of data,watermarking,servers | Transparency (graphic),Audit,Computer security,Computer science,Audit trail,Service provider,Accountability,Cloud computing security,Cloud testing,Cloud computing | Conference |
ISBN | Citations | PageRank |
978-1-4673-2172-3 | 13 | 0.67 |
References | Authors | |
13 | 11 |
Name | Order | Citations | PageRank |
---|---|---|---|
Yu Shyang Tan | 1 | 70 | 4.58 |
Ryan K. L. Ko | 2 | 515 | 31.73 |
Peter Jagadpramana | 3 | 174 | 6.65 |
Chun Hui Suen | 4 | 72 | 4.92 |
Markus Kirchberg | 5 | 495 | 42.65 |
Teck Hooi Lim | 6 | 13 | 0.67 |
Bu Sung Lee | 7 | 452 | 35.22 |
Anurag Singla | 8 | 14 | 1.04 |
Ken Mermoud | 9 | 71 | 5.31 |
Doron Keller | 10 | 13 | 0.67 |
Ha Duc | 11 | 13 | 0.67 |