Assuring data privacy in cloud transformations

Publikation: KonferenzbeitragPaperForschungPeer-Review

Autoren

  • Tom Kirkham
  • Django Armstrong
  • Karim Djemame
  • Marcelo Corrales
  • Mariam Kiran
  • Iheanyi Nwankwo
  • Ming Jiang
  • Nikolaus Forgó

Organisationseinheiten

Externe Organisationen

  • University of Leeds
Forschungs-netzwerk anzeigen

Details

OriginalspracheEnglisch
Seiten1063-1069
Seitenumfang7
PublikationsstatusVeröffentlicht - 2012
Veranstaltung11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom-2012 - Liverpool, Großbritannien / Vereinigtes Königreich
Dauer: 25 Juni 201227 Juni 2012

Konferenz

Konferenz11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom-2012
Land/GebietGroßbritannien / Vereinigtes Königreich
OrtLiverpool
Zeitraum25 Juni 201227 Juni 2012

Abstract

Cloud transformations require dynamic redistribution of resources across cloud infrastructure. From a legal perspective this movement of data from one data processor to another without the explicit consent of the data subject is a threat to data privacy. Levels of assurance and accountability have to be provided from the cloud infrastructure providers to the data subject in order to maintain trust. In cases of Cloud Transformation multiple providers are present and passing accountability down the chain is essential. Existing Service Level Agreements (SLA) and policy based privacy implementations fail to provide the flexibility and accountability needed in establishing these new relationships. By introducing combined risk and privacy assessment alongside SLA negotiation, the legal and data management implications of Cloud Transformation events can be better accounted for. This will better protect the privacy of data subjects and increase confidence and trust in the Cloud computing platform.

ASJC Scopus Sachgebiete

Zitieren

Assuring data privacy in cloud transformations. / Kirkham, Tom; Armstrong, Django; Djemame, Karim et al.
2012. 1063-1069 Beitrag in 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom-2012, Liverpool, Großbritannien / Vereinigtes Königreich.

Publikation: KonferenzbeitragPaperForschungPeer-Review

Kirkham, T, Armstrong, D, Djemame, K, Corrales, M, Kiran, M, Nwankwo, I, Jiang, M & Forgó, N 2012, 'Assuring data privacy in cloud transformations', Beitrag in 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom-2012, Liverpool, Großbritannien / Vereinigtes Königreich, 25 Juni 2012 - 27 Juni 2012 S. 1063-1069. https://doi.org/10.1109/TrustCom.2012.97
Kirkham, T., Armstrong, D., Djemame, K., Corrales, M., Kiran, M., Nwankwo, I., Jiang, M., & Forgó, N. (2012). Assuring data privacy in cloud transformations. 1063-1069. Beitrag in 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom-2012, Liverpool, Großbritannien / Vereinigtes Königreich. https://doi.org/10.1109/TrustCom.2012.97
Kirkham T, Armstrong D, Djemame K, Corrales M, Kiran M, Nwankwo I et al.. Assuring data privacy in cloud transformations. 2012. Beitrag in 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom-2012, Liverpool, Großbritannien / Vereinigtes Königreich. doi: 10.1109/TrustCom.2012.97
Kirkham, Tom ; Armstrong, Django ; Djemame, Karim et al. / Assuring data privacy in cloud transformations. Beitrag in 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom-2012, Liverpool, Großbritannien / Vereinigtes Königreich.7 S.
Download
@conference{76d63c184f9744bdb7f5284408c6e340,
title = "Assuring data privacy in cloud transformations",
abstract = "Cloud transformations require dynamic redistribution of resources across cloud infrastructure. From a legal perspective this movement of data from one data processor to another without the explicit consent of the data subject is a threat to data privacy. Levels of assurance and accountability have to be provided from the cloud infrastructure providers to the data subject in order to maintain trust. In cases of Cloud Transformation multiple providers are present and passing accountability down the chain is essential. Existing Service Level Agreements (SLA) and policy based privacy implementations fail to provide the flexibility and accountability needed in establishing these new relationships. By introducing combined risk and privacy assessment alongside SLA negotiation, the legal and data management implications of Cloud Transformation events can be better accounted for. This will better protect the privacy of data subjects and increase confidence and trust in the Cloud computing platform.",
keywords = "Cloud, Privacy, Risk, SLA",
author = "Tom Kirkham and Django Armstrong and Karim Djemame and Marcelo Corrales and Mariam Kiran and Iheanyi Nwankwo and Ming Jiang and Nikolaus Forg{\'o}",
year = "2012",
doi = "10.1109/TrustCom.2012.97",
language = "English",
pages = "1063--1069",
note = "11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom-2012 ; Conference date: 25-06-2012 Through 27-06-2012",

}

Download

TY - CONF

T1 - Assuring data privacy in cloud transformations

AU - Kirkham, Tom

AU - Armstrong, Django

AU - Djemame, Karim

AU - Corrales, Marcelo

AU - Kiran, Mariam

AU - Nwankwo, Iheanyi

AU - Jiang, Ming

AU - Forgó, Nikolaus

PY - 2012

Y1 - 2012

N2 - Cloud transformations require dynamic redistribution of resources across cloud infrastructure. From a legal perspective this movement of data from one data processor to another without the explicit consent of the data subject is a threat to data privacy. Levels of assurance and accountability have to be provided from the cloud infrastructure providers to the data subject in order to maintain trust. In cases of Cloud Transformation multiple providers are present and passing accountability down the chain is essential. Existing Service Level Agreements (SLA) and policy based privacy implementations fail to provide the flexibility and accountability needed in establishing these new relationships. By introducing combined risk and privacy assessment alongside SLA negotiation, the legal and data management implications of Cloud Transformation events can be better accounted for. This will better protect the privacy of data subjects and increase confidence and trust in the Cloud computing platform.

AB - Cloud transformations require dynamic redistribution of resources across cloud infrastructure. From a legal perspective this movement of data from one data processor to another without the explicit consent of the data subject is a threat to data privacy. Levels of assurance and accountability have to be provided from the cloud infrastructure providers to the data subject in order to maintain trust. In cases of Cloud Transformation multiple providers are present and passing accountability down the chain is essential. Existing Service Level Agreements (SLA) and policy based privacy implementations fail to provide the flexibility and accountability needed in establishing these new relationships. By introducing combined risk and privacy assessment alongside SLA negotiation, the legal and data management implications of Cloud Transformation events can be better accounted for. This will better protect the privacy of data subjects and increase confidence and trust in the Cloud computing platform.

KW - Cloud

KW - Privacy

KW - Risk

KW - SLA

UR - http://www.scopus.com/inward/record.url?scp=84868110607&partnerID=8YFLogxK

U2 - 10.1109/TrustCom.2012.97

DO - 10.1109/TrustCom.2012.97

M3 - Paper

AN - SCOPUS:84868110607

SP - 1063

EP - 1069

T2 - 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom-2012

Y2 - 25 June 2012 through 27 June 2012

ER -