Inter-cloud data security for secure cloud-based business collaborations

被引:0
|
作者
Tsuda, Hiroshi [1 ]
Matsuo, Akihiko [1 ]
Abiru, Kenichi [1 ]
Hasebe, Takayuki [1 ]
机构
[1] Fujitsu Laboratories Ltd., Japan
来源
关键词
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
With the advent of cloud computing, the boundary separating internal and external data has become increasingly blurred due to the utilization of external services. As a result, existing methods of preventing data leakage, such as only using a gateway to block the outflow of confidential data, have become insufficient. Therefore, there is increased demand for new security technology to allow confidential data to be safely used even in the cloud. We have developed new cloud information gateway and access gateway technologies that can mask confidential information contained within data before it is processed in the cloud. They can also transfer applications from the cloud to inside the company for internal processing. In this way, they make it possible to utilize cloud services without transmitting actual data. These technologies enable users to safely utilize confidential data in the cloud, encouraging new uses of cloud computing, such as cross-industry collaborations and specialized uses in specific industries. This paper outlines information gateway and access gateway and describes their applications.
引用
收藏
页码:169 / 176
相关论文
共 50 条
  • [1] Inter-Cloud Data Security for Secure Cloud-Based Business Collaborations
    Tsuda, Hiroshi
    Matsuo, Akihiko
    Abiru, Kenichi
    Hasebe, Takayuki
    [J]. FUJITSU SCIENTIFIC & TECHNICAL JOURNAL, 2012, 48 (02): : 169 - 176
  • [2] Secure service interaction for collaborative business processes in the inter-cloud
    Schwarzbach, Bjoern
    Gloeckner, Michael
    Pirogov, Alexander
    Roehling, Martin Max
    Franczyk, Bogdan
    [J]. PROCEEDINGS OF THE 2015 FEDERATED CONFERENCE ON COMPUTER SCIENCE AND INFORMATION SYSTEMS, 2015, 5 : 1377 - 1386
  • [3] Inter-cloud secure data sharing and its formal verification
    Lu, Jintian
    Zhang, Yunyi
    Yang, Likun
    Jin, Shuyuan
    [J]. TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2022, 33 (01):
  • [4] Inter-Cloud Data Security Framework to Build Trust Based on Compliance with Controls
    Akhtar, Syed Imran
    Rauf, Abdul
    Amjad, Muhammad Faisal
    Batool, Ifra
    [J]. IET INFORMATION SECURITY, 2024, 2024
  • [5] Cloud-Based Data Architecture Security
    N. A. Semenov
    A. A. Poltavtsev
    [J]. Automatic Control and Computer Sciences, 2019, 53 : 1056 - 1064
  • [6] Cloud-Based Data Architecture Security
    Semenov, N. A.
    Poltavtsev, A. A.
    [J]. AUTOMATIC CONTROL AND COMPUTER SCIENCES, 2019, 53 (08) : 1056 - 1064
  • [7] Inter-Cloud Computing
    Tomonori Aoyama
    Hiroshi Sakai
    [J]. Business & Information Systems Engineering, 2011, 3 : 173 - 177
  • [8] Data Security in Cloud-Based Applications
    Pandey, Surabhi
    Purohit, G. N.
    Munshi, Usha Mujoo
    [J]. DATA SCIENCE LANDSCAPE: TOWARDS RESEARCH STANDARDS AND PROTOCOLS, 2018, 38 : 321 - 326
  • [9] A Secure Architecture for Inter-cloud Virtual Machine Migration
    Zeb, Tayyaba
    Ghafoor, Abdul
    Shibli, Awais
    Yousaf, Muhammad
    [J]. INTERNATIONAL CONFERENCE ON SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, SECURECOMM 2014, PT I, 2015, 152 : 24 - 35
  • [10] Inter-Cloud Computing
    Aoyama, Tomonori
    Sakai, Hiroshi
    [J]. BUSINESS & INFORMATION SYSTEMS ENGINEERING, 2011, 3 (03): : 173 - 177