CLOUD DATA PATTERNS FOR CONFIDENTIALITY

Steve Strauch, Uwe Breitenbuecher, Oliver Kopp, Frank Leymann, Tobias Unger

2012

Abstract

Cloud computing enables cost-effective, self-service, and elastic hosting of applications in the Cloud. Applications may be partially or completely moved to the Cloud. When hosting or moving the database layer to the Cloud, challenges such as avoidance of disclosure of critical data have to be faced. The main challenges are handling different levels of confidentiality and satisfying security and privacy requirements. We provide reusable solutions in the form of patterns.

References

  1. Alexander, C. (1979). The Timeless Way of Building. Oxford University Press.
  2. Alexander, C. (1979). The Timeless Way of Building. Oxford University Press.
  3. Alexander, C. et al. (1977). A Pattern Language. Towns, Buildings, Construction. Oxford University Press.
  4. Alexander, C. et al. (1977). A Pattern Language. Towns, Buildings, Construction. Oxford University Press.
  5. Amazon.com, Inc. (2011a). Amazon Relational Database Service.
  6. Amazon.com, Inc. (2011a). Amazon Relational Database Service.
  7. Amazon.com, Inc. (2011b). Amazon Virtual Private Cloud.
  8. Amazon.com, Inc. (2011b). Amazon Virtual Private Cloud.
  9. ARISTA Networks, Inc. (2009). Cloud Networking: Design Patterns for Cloud-Centric Application Environments.
  10. ARISTA Networks, Inc. (2009). Cloud Networking: Design Patterns for Cloud-Centric Application Environments.
  11. Armbrust, M. et al. (2009). Above the Clouds: A Berkeley View of Cloud Computing. Technical Report UCB/EECS-2009-28, EECS Department, University of California, Berkeley.
  12. Armbrust, M. et al. (2009). Above the Clouds: A Berkeley View of Cloud Computing. Technical Report UCB/EECS-2009-28, EECS Department, University of California, Berkeley.
  13. Department of Defense Security Institute (1993). International Programs Security Handbook, Chapter 10: NATO Security Procedures.
  14. Department of Defense Security Institute (1993). International Programs Security Handbook, Chapter 10: NATO Security Procedures.
  15. Dunkel, J. et al. (2008). Systemarchitekturen fuer Verteilte Anwendungen. Hanser Verlag.
  16. Dunkel, J. et al. (2008). Systemarchitekturen fuer Verteilte Anwendungen. Hanser Verlag.
  17. Federal Ministry of Justice (1990). German Federal Data Protection Law.
  18. Federal Ministry of Justice (1990). German Federal Data Protection Law.
  19. Fehling, C. et al. (2011). An Architectural Pattern Language of Cloud-based Applications. PLoP'11. ACM.
  20. Fehling, C. et al. (2011). An Architectural Pattern Language of Cloud-based Applications. PLoP'11. ACM.
  21. Fowler, M. et al. (2002). Patterns of Enterprise Application Architecture. Addison-Wesley Professional.
  22. Fowler, M. et al. (2002). Patterns of Enterprise Application Architecture. Addison-Wesley Professional.
  23. Hafiz, M. (2006). A Collection of Privacy Design Patterns. PLoP'06.
  24. Hafiz, M. (2006). A Collection of Privacy Design Patterns. PLoP'06.
  25. Hohpe, G. and Woolf, B. (2003). Enterprise Integration Patterns: Designing, Building, and Deploying Messaging Solutions. Addison-Wesley.
  26. Hohpe, G. and Woolf, B. (2003). Enterprise Integration Patterns: Designing, Building, and Deploying Messaging Solutions. Addison-Wesley.
  27. Mell, P. and Grance, T. (2009). Cloud Computing Definition. National Institute of Standards and Technology.
  28. Mell, P. and Grance, T. (2009). Cloud Computing Definition. National Institute of Standards and Technology.
  29. Nock, C. (2008). Data Access Patterns: Database Interactions in Object Oriented Applications. Prentice Hall PTR.
  30. Nock, C. (2008). Data Access Patterns: Database Interactions in Object Oriented Applications. Prentice Hall PTR.
  31. Oracle Corporation (2011). MySQL.
  32. Oracle Corporation (2011). MySQL.
  33. Schumacher, M. et al. (2006). Security Patterns: Integrating Security and Systems Engineering. Wiley.
  34. Schumacher, M. et al. (2006). Security Patterns: Integrating Security and Systems Engineering. Wiley.
  35. Unger, T. and Bauer, T. (2008). Towards a Standardized Task Management. MKWI'08. GITO-Verlag, Berlin.
  36. Unger, T. and Bauer, T. (2008). Towards a Standardized Task Management. MKWI'08. GITO-Verlag, Berlin.
Download


Paper Citation


in Harvard Style

Strauch S., Breitenbuecher U., Kopp O., Leymann F. and Unger T. (2012). CLOUD DATA PATTERNS FOR CONFIDENTIALITY . In Proceedings of the 2nd International Conference on Cloud Computing and Services Science - Volume 1: CLOSER, ISBN 978-989-8565-05-1, pages 387-394. DOI: 10.5220/0003893903870394


in Harvard Style

Strauch S., Breitenbuecher U., Kopp O., Leymann F. and Unger T. (2012). CLOUD DATA PATTERNS FOR CONFIDENTIALITY . In Proceedings of the 2nd International Conference on Cloud Computing and Services Science - Volume 1: CLOSER, ISBN 978-989-8565-05-1, pages 387-394. DOI: 10.5220/0003893903870394


in Bibtex Style

@conference{closer12,
author={Steve Strauch and Uwe Breitenbuecher and Oliver Kopp and Frank Leymann and Tobias Unger},
title={CLOUD DATA PATTERNS FOR CONFIDENTIALITY},
booktitle={Proceedings of the 2nd International Conference on Cloud Computing and Services Science - Volume 1: CLOSER,},
year={2012},
pages={387-394},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0003893903870394},
isbn={978-989-8565-05-1},
}


in Bibtex Style

@conference{closer12,
author={Steve Strauch and Uwe Breitenbuecher and Oliver Kopp and Frank Leymann and Tobias Unger},
title={CLOUD DATA PATTERNS FOR CONFIDENTIALITY},
booktitle={Proceedings of the 2nd International Conference on Cloud Computing and Services Science - Volume 1: CLOSER,},
year={2012},
pages={387-394},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0003893903870394},
isbn={978-989-8565-05-1},
}


in EndNote Style

TY - CONF
JO - Proceedings of the 2nd International Conference on Cloud Computing and Services Science - Volume 1: CLOSER,
TI - CLOUD DATA PATTERNS FOR CONFIDENTIALITY
SN - 978-989-8565-05-1
AU - Strauch S.
AU - Breitenbuecher U.
AU - Kopp O.
AU - Leymann F.
AU - Unger T.
PY - 2012
SP - 387
EP - 394
DO - 10.5220/0003893903870394


in EndNote Style

TY - CONF
JO - Proceedings of the 2nd International Conference on Cloud Computing and Services Science - Volume 1: CLOSER,
TI - CLOUD DATA PATTERNS FOR CONFIDENTIALITY
SN - 978-989-8565-05-1
AU - Strauch S.
AU - Breitenbuecher U.
AU - Kopp O.
AU - Leymann F.
AU - Unger T.
PY - 2012
SP - 387
EP - 394
DO - 10.5220/0003893903870394