Enhancing privacy in cloud computing via policy-based obfuscation

被引:0
|
作者
Miranda Mowbray
Siani Pearson
Yun Shen
机构
[1] HP Labs,
来源
关键词
Cloud computing; Privacy; Obfuscation; Encryption; Hybrid cloud;
D O I
暂无
中图分类号
学科分类号
摘要
In this paper, we describe a privacy manager for cloud computing that controls policy-based obfuscation and de-obfuscation of personal, sensitive, or confidential data within cloud service provision. By these means, cloud computing users may reduce the risk of their private data being stolen or misused, and in addition assistance may be given to cloud computing providers in helping them conform to privacy law. We describe different possible architectures for such privacy management in cloud computing, give an algebraic description of obfuscation features provided by the privacy manager, and describe how policies may be defined to control such obfuscation. Furthermore, we assess the performance and scalability of this approach and consider mechanisms to enhance usability. Several examples of how the privacy manager might be used are given, including protection of private metadata associated with online photos and of confidential information contained within share portfolios.
引用
收藏
页码:267 / 291
页数:24
相关论文
共 50 条
  • [1] Enhancing privacy in cloud computing via policy-based obfuscation
    Mowbray, Miranda
    Pearson, Siani
    Shen, Yun
    [J]. JOURNAL OF SUPERCOMPUTING, 2012, 61 (02): : 267 - 291
  • [2] Security and Privacy in Cloud Computing via Obfuscation and Diversification: a Survey
    Hosseinzadeh, Shohreh
    Hyrynsalmi, Sami
    Conti, Mauro
    Leppanen, Ville
    [J]. 2015 IEEE 7TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING TECHNOLOGY AND SCIENCE (CLOUDCOM), 2015, : 529 - 535
  • [3] Data Obfuscation for Privacy and Confidentiality in Cloud Computing
    Khan, Khaled M.
    Shaheen, Mahboob
    [J]. 2015 IEEE INTERNATIONAL CONFERENCE ON SOFTWARE QUALITY, RELIABILITY AND SECURITY - COMPANION (QRS-C 2015), 2015, : 195 - 196
  • [4] An effective cloud computing model enhancing privacy in cloud computing
    Chawki, Mohamed
    [J]. INFORMATION SECURITY JOURNAL, 2024,
  • [5] A policy-based privacy storage approach
    Nowalczyk, Julien
    Tastet-Cherel, Frederique
    [J]. ICEIS 2007: PROCEEDINGS OF THE NINTH INTERNATIONAL CONFERENCE ON ENTERPRISE INFORMATION SYSTEMS: DATABASES AND INFORMATION SYSTEMS INTEGRATION, 2007, : 605 - 608
  • [6] An Efficient Policy-Based Scheduling and Allocation of Virtual Machines in Cloud Computing Environment
    Supreeth, S.
    Patil, Kirankumari
    Patil, Shantala Devi
    Rohith, S.
    Vishwanath, Y.
    Prasad, K. S. Venkatesh
    [J]. JOURNAL OF ELECTRICAL AND COMPUTER ENGINEERING, 2022, 2022
  • [7] POLICY-BASED SECURITY CHANNELS FOR PROTECTING NETWORK COMMUNICATION IN MOBILE CLOUD COMPUTING
    Itani, Wassim
    Kayssi, Ayman
    Chehab, Ali
    [J]. SECRYPT 2011: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2011, : 450 - 456
  • [8] POLICY-BASED SCHEDULING OF CLOUD SERVICES
    Nizamic, Faris
    Degeler, Viktoriya
    Groenboom, Rix
    Lazovik, Alexander
    [J]. SCALABLE COMPUTING-PRACTICE AND EXPERIENCE, 2012, 13 (03): : 187 - 199
  • [9] Towards privacy enhancement in policy-based system
    Khurat, Assadarat
    Abendroth, Joerg
    [J]. WSEAS Transactions on Information Science and Applications, 2007, 4 (03): : 576 - 583
  • [10] END USER PRIVACY AND POLICY-BASED NETWORKING
    Paterson, Nancy E.
    [J]. JOURNAL OF INFORMATION POLICY, 2014, 4 : 28 - 43