Security and Privacy-Enhancing Multicloud Architectures

被引:69
|
作者
Bohli, Jens-Matthias [1 ]
Gruschka, Nils [2 ]
Jensen, Meiko [3 ]
Lo Iacono, Luigi [4 ]
Marnau, Ninja [3 ]
机构
[1] NEC Labs Europe, D-69115 Heidelberg, BW, Germany
[2] Univ Appl Sci Kiel, FB Informat & Electrotech, D-24116 Kiel, SH, Germany
[3] Independent Ctr Privacy Protect Schleswig Holstei, Kiel, Germany
[4] Cologne Univ Appl Sci, Inst Media & Imaging Technol, D-50679 Cologne, NRW, Germany
关键词
Cloud; security; privacy; multicloud; application partitioning; tier partitioning; data partitioning; multiparty computation;
D O I
10.1109/TDSC.2013.6
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Security challenges are still among the biggest obstacles when considering the adoption of cloud services. This triggered a lot of research activities, resulting in a quantity of proposals targeting the various cloud security threats. Alongside with these security issues, the cloud paradigm comes with a new set of unique features, which open the path toward novel security approaches, techniques, and architectures. This paper provides a survey on the achievable security merits by making use of multiple distinct clouds simultaneously. Various distinct architectures are introduced and discussed according to their security and privacy capabilities and prospects.
引用
收藏
页码:212 / 224
页数:13
相关论文
共 50 条
  • [1] Privacy-Enhancing Security Protocol in LTE Initial Attack
    Jang, Uijin
    Lim, Hyungmin
    Kim, Hyungjoo
    [J]. SYMMETRY-BASEL, 2014, 6 (04): : 1011 - 1025
  • [2] Privacy-enhancing technologies
    Senicar, V
    Klobucar, T
    Jerman-Blazic, B
    [J]. SECURITY AND PRIVACY IN ADVANCED NETWORKING TECHNOLOGIES, 2004, 193 : 213 - 227
  • [3] On the Adoption of Privacy-enhancing Technologies
    Caulfield, Tristan
    Ioannidis, Christos
    Pym, David
    [J]. DECISION AND GAME THEORY FOR SECURITY, (GAMESEC 2016), 2016, 9996 : 175 - 194
  • [4] Privacy-Enhancing Overlays in Bitcoin
    Meiklejohn, Sarah
    Orlandi, Claudio
    [J]. FINANCIAL CRYPTOGRAPHY AND DATA SECURITY (FC 2015), 2015, 8976 : 127 - 141
  • [5] Inaccuracy as a privacy-enhancing tool
    Gloria González Fuster
    [J]. Ethics and Information Technology, 2010, 12 : 87 - 95
  • [6] A Privacy-Enhancing Architecture for Databases
    Wahlstrom, Kirsten
    Quirchmayr, Gerald
    [J]. JOURNAL OF RESEARCH AND PRACTICE IN INFORMATION TECHNOLOGY, 2008, 40 (03): : 151 - 162
  • [7] Privacy-enhancing technologies for the Internet
    Goldberg, I
    Wagner, D
    Brewer, E
    [J]. IEEE COMPCON 97, PROCEEDINGS, 1997, : 103 - 109
  • [8] Practical Privacy-Enhancing Technologies
    Hajny, Jan
    Malina, Lukas
    Dzurenda, Petr
    [J]. 2015 38TH INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS AND SIGNAL PROCESSING (TSP), 2015, : 60 - 64
  • [9] Collaborative eHealth Meets Security: Privacy-Enhancing Patient Profile Management
    Sanchez-Guerrero, Rosa
    Almenarez Mendoza, Florina
    Diaz-Sanchez, Daniel
    Arias Cabarcos, Patricia
    Marin Lopez, Andres
    [J]. IEEE JOURNAL OF BIOMEDICAL AND HEALTH INFORMATICS, 2017, 21 (06) : 1741 - 1749
  • [10] On privacy-enhancing architectures for distribution of real time performance demanding mobile services
    Zorkadis, V. C.
    Karras, D. A.
    [J]. INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2009, 2 (04) : 377 - 386