Sunday, April 6, 2014

Cloud Security & Protection

Benson, K., Dowsley,  & R., Shacham, H. (2011). Do you know where your Cloud files are? Retrieved from http://cseweb.ucsd.edu/~rdowsley/pdf/BenDowSha11.pdf
Although there are many ways of Amazon Cloud services can be verified to know where a file is being storing such as by end users and by contracts or service-level agreement, it’s not enough for users because of fear of losing the data. Moreover, even if cloud providers allow users to check if their data is replicated onto multiple disks, the providers still have to deal with the difficult task of assuring that their copies are store in the different locations. Therefore, this paper proposed a solution to how to verify the geolocation of data in the cloud and successfully identified the approximate geolocations of data in Amazon's Cloud.
Melchor, C., Fau, S., Fontaine, C., Gogniat, G., & Sirdey, R. (2013). Recent Advances in Homomorphic Encryption. IEEE Signal Processing Magazine, 108-117.
For years computer scientists have talked about the very interesting challenge regarding the desire to be able to operate over encrypted data in an advanced way called Homomorphic Encryption. This is a field that gets nuanced fast, with terms like partially homomorphic relevant to many existing systems that are in place, but Fully Homomorphic Encryption (FHE) thought by many to be so far away to be just a dream. This paper presented recent advances in FHE both from a cryptographic and software engineering point of view.
Song, D., Shi, E., Fischer, I., & Shankar, U. (2012). Cloud Data Protection for the Masses. IEEE Computer Society, 39-45.
Cloud computing promises low costs, rapid scaling, easy maintenance, and service availability: however, a key challenge is how to ensure and build confidence that the data in the cloud is secure. Although users are having a huge interest in cloud computing, they concern about security, availability, and privacy of their data. Therefore, Data Protection as a Service (DPaaS) is a suite of security primitives that build in data-protection solutions at the platform layer to enforce data security and privacy.
Sedayao, J. (2012). Enhancing Cloud Security Using Data Anonymization. Retrieved from http://www.intel.com/content/dam/www/public/us/en/documents/best-practices/enhancing-cloud-security-using-data-anonymization.pdf
Cloud computing is worth to be invested in terms of availability of the data; however, the security of cloud infrastructure is a major concern nowadays. Intel believe that data anonymization is able to ease this concern, allow for simpler demilitarized zone and security provisioning, and enable a more secure public cloud. According to Sedayao (2012), “Data anonymization is the process of obscuring published data to prevent the identication of key information.” Data anonymization can maintain data privacy on the cloud; in the meantime, the data owners can still process their data to obtain useful information.

0 comments:

Post a Comment