PREVENTION OF INFORMATION HARVESTING IN A CLOUD SERVICES ENVIRONMENT

L. M. Batten, J. Abawajy, R. Doss

2011

Abstract

We consider a cloud data storage involving three entities, the cloud customer, the cloud business centre which provides services, and the cloud data storage centre. Data stored in the data storage centre comes from a variety of customers and some of these customers may compete with each other in the market place or may own data which comprises confidential information about their own clients. Cloud staff have access to data in the data storage centre which could be used to steal identities or to compromise cloud customers. In this paper, we provide an efficient method of data storage which prevents staff from accessing data which can be abused as described above. We also suggest a method of securing access to data which requires more than one staff member to access it at any given time. This ensures that, in case of a dispute, a staff member always has a witness to the fact that she accessed data.

References

  1. Abawajy, J. 2009. Determining Service Trustworthiness. In Intercloud Computing Environments, Proc. of the 10th IEEE International Symposium on the Pervasive Systems, Algorithms and Networks (ISPAN 2009), pp: 784-788, 2009.
  2. Abawajy, J. 2009. Determining Service Trustworthiness. In Intercloud Computing Environments, Proc. of the 10th IEEE International Symposium on the Pervasive Systems, Algorithms and Networks (ISPAN 2009), pp: 784-788, 2009.
  3. Buyya, R., Beloglazov, A. and Abawajy, J. 2010. EnergyEfficient Management of Data Center Resources for Cloud Computing: A Vision, Architectural Elements, and Open Challenges. In Proc. of PDPTA 2010, pp: 6- 20, July 12 - 15, Las Vegas, Nevada.
  4. Buyya, R., Beloglazov, A. and Abawajy, J. 2010. EnergyEfficient Management of Data Center Resources for Cloud Computing: A Vision, Architectural Elements, and Open Challenges. In Proc. of PDPTA 2010, pp: 6- 20, July 12 - 15, Las Vegas, Nevada.
  5. Cattedu, D. and Hogben, G., editors. 'Cloud computingsecurity benefits, risks and recommendations', Nov. 2009 - Report by the European Network andInformation Security Agency.
  6. Cattedu, D. and Hogben, G., editors. 'Cloud computingsecurity benefits, risks and recommendations', Nov. 2009 - Report by the European Network andInformation Security Agency.
  7. Cavoukian, A., 2008. Privacy in the Clouds. In Indentity inthe Information Society (pp. 89-108). Springer.
  8. Cavoukian, A., 2008. Privacy in the Clouds. In Indentity inthe Information Society (pp. 89-108). Springer.
  9. Gentry, C. (2009) 'Fully homomorphic encryption usingideal lattices'. Proceedings of the 41st annualACM symposium on Theory of computing, ACM, New York, pp. 169-178.
  10. Gentry, C. (2009) 'Fully homomorphic encryption usingideal lattices'. Proceedings of the 41st annualACM symposium on Theory of computing, ACM, New York, pp. 169-178.
  11. Menezes, A., van Oorschot, P. and Vanstone, S. 1997. Handbook of Applied Cryptography. CRC PressBoca Raton, USA.
  12. Menezes, A., van Oorschot, P. and Vanstone, S. 1997. Handbook of Applied Cryptography. CRC PressBoca Raton, USA.
  13. Parakh, A. and Kak, S. 2009. Online data storage using implicit security. Information Sciences 179 (2009)3323-3331.
  14. Parakh, A. and Kak, S. 2009. Online data storage using implicit security. Information Sciences 179 (2009)3323-3331.
  15. Ristenpart, T., Tromer, E., Shacham, H., & Savage, S. (2009). Hey, You, Get off of my Cloud: Exploring Information Leakage in Third Party Compute Clouds. CCS'09, (pp. 199 - 210). Chicago, Illinois, USA.
  16. Ristenpart, T., Tromer, E., Shacham, H., & Savage, S. (2009). Hey, You, Get off of my Cloud: Exploring Information Leakage in Third Party Compute Clouds. CCS'09, (pp. 199 - 210). Chicago, Illinois, USA.
  17. Upmanyu, M., Namboodiri, A., Srinathan, K. and Jawahar, C. V. 2010. 'Efficient Privacy Preserving KMeans Clustering' PAISI 2010, LNCS 6122, pp. 154- 166.
  18. Upmanyu, M., Namboodiri, A., Srinathan, K. and Jawahar, C. V. 2010. 'Efficient Privacy Preserving KMeans Clustering' PAISI 2010, LNCS 6122, pp. 154- 166.
  19. Wang, C., Wang, Q., Ren K. and Lou, W. 2010 “PrivacyPreserving Public Auditing for Storage Security in Cloud Computing,” Proc. IEEE INFOCOM 7810, Mar. 2010.
  20. Wang, C., Wang, Q., Ren K. and Lou, W. 2010 “PrivacyPreserving Public Auditing for Storage Security in Cloud Computing,” Proc. IEEE INFOCOM 7810, Mar. 2010.
  21. Yildiz, M., Abawajy, J., Ercan, T. and Bernoth, A., 2009. A Layered Security Approach for Cloud Computing Infrastructure. In Proc. of the 10th IEEE International Symposium on Pervasive Systems, Algorithms and Networks (ISPAN 2009), pp. 763-767, 2009.
  22. Yildiz, M., Abawajy, J., Ercan, T. and Bernoth, A., 2009. A Layered Security Approach for Cloud Computing Infrastructure. In Proc. of the 10th IEEE International Symposium on Pervasive Systems, Algorithms and Networks (ISPAN 2009), pp. 763-767, 2009.
Download


Paper Citation


in Harvard Style

Batten L., Abawajy J. and Doss R. (2011). PREVENTION OF INFORMATION HARVESTING IN A CLOUD SERVICES ENVIRONMENT . In Proceedings of the 1st International Conference on Cloud Computing and Services Science - Volume 1: CLOSER, ISBN 978-989-8425-52-2, pages 66-72. DOI: 10.5220/0003389700660072


in Harvard Style

Batten L., Abawajy J. and Doss R. (2011). PREVENTION OF INFORMATION HARVESTING IN A CLOUD SERVICES ENVIRONMENT . In Proceedings of the 1st International Conference on Cloud Computing and Services Science - Volume 1: CLOSER, ISBN 978-989-8425-52-2, pages 66-72. DOI: 10.5220/0003389700660072


in Bibtex Style

@conference{closer11,
author={L. M. Batten and J. Abawajy and R. Doss},
title={PREVENTION OF INFORMATION HARVESTING IN A CLOUD SERVICES ENVIRONMENT },
booktitle={Proceedings of the 1st International Conference on Cloud Computing and Services Science - Volume 1: CLOSER,},
year={2011},
pages={66-72},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0003389700660072},
isbn={978-989-8425-52-2},
}


in Bibtex Style

@conference{closer11,
author={L. M. Batten and J. Abawajy and R. Doss},
title={PREVENTION OF INFORMATION HARVESTING IN A CLOUD SERVICES ENVIRONMENT },
booktitle={Proceedings of the 1st International Conference on Cloud Computing and Services Science - Volume 1: CLOSER,},
year={2011},
pages={66-72},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0003389700660072},
isbn={978-989-8425-52-2},
}


in EndNote Style

TY - CONF
JO - Proceedings of the 1st International Conference on Cloud Computing and Services Science - Volume 1: CLOSER,
TI - PREVENTION OF INFORMATION HARVESTING IN A CLOUD SERVICES ENVIRONMENT
SN - 978-989-8425-52-2
AU - Batten L.
AU - Abawajy J.
AU - Doss R.
PY - 2011
SP - 66
EP - 72
DO - 10.5220/0003389700660072


in EndNote Style

TY - CONF
JO - Proceedings of the 1st International Conference on Cloud Computing and Services Science - Volume 1: CLOSER,
TI - PREVENTION OF INFORMATION HARVESTING IN A CLOUD SERVICES ENVIRONMENT
SN - 978-989-8425-52-2
AU - Batten L.
AU - Abawajy J.
AU - Doss R.
PY - 2011
SP - 66
EP - 72
DO - 10.5220/0003389700660072