Assuring data privacy in cloud transformations

Research output: Contribution to conferencePaperResearchpeer review

Authors

  • Tom Kirkham
  • Django Armstrong
  • Karim Djemame
  • Marcelo Corrales
  • Mariam Kiran
  • Iheanyi Nwankwo
  • Ming Jiang
  • Nikolaus Forgó

Research Organisations

External Research Organisations

  • University of Leeds
View graph of relations

Details

Original languageEnglish
Pages1063-1069
Number of pages7
Publication statusPublished - 2012
Event11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom-2012 - Liverpool, United Kingdom (UK)
Duration: 25 Jun 201227 Jun 2012

Conference

Conference11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom-2012
Country/TerritoryUnited Kingdom (UK)
CityLiverpool
Period25 Jun 201227 Jun 2012

Abstract

Cloud transformations require dynamic redistribution of resources across cloud infrastructure. From a legal perspective this movement of data from one data processor to another without the explicit consent of the data subject is a threat to data privacy. Levels of assurance and accountability have to be provided from the cloud infrastructure providers to the data subject in order to maintain trust. In cases of Cloud Transformation multiple providers are present and passing accountability down the chain is essential. Existing Service Level Agreements (SLA) and policy based privacy implementations fail to provide the flexibility and accountability needed in establishing these new relationships. By introducing combined risk and privacy assessment alongside SLA negotiation, the legal and data management implications of Cloud Transformation events can be better accounted for. This will better protect the privacy of data subjects and increase confidence and trust in the Cloud computing platform.

Keywords

    Cloud, Privacy, Risk, SLA

ASJC Scopus subject areas

Cite this

Assuring data privacy in cloud transformations. / Kirkham, Tom; Armstrong, Django; Djemame, Karim et al.
2012. 1063-1069 Paper presented at 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom-2012, Liverpool, United Kingdom (UK).

Research output: Contribution to conferencePaperResearchpeer review

Kirkham, T, Armstrong, D, Djemame, K, Corrales, M, Kiran, M, Nwankwo, I, Jiang, M & Forgó, N 2012, 'Assuring data privacy in cloud transformations', Paper presented at 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom-2012, Liverpool, United Kingdom (UK), 25 Jun 2012 - 27 Jun 2012 pp. 1063-1069. https://doi.org/10.1109/TrustCom.2012.97
Kirkham, T., Armstrong, D., Djemame, K., Corrales, M., Kiran, M., Nwankwo, I., Jiang, M., & Forgó, N. (2012). Assuring data privacy in cloud transformations. 1063-1069. Paper presented at 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom-2012, Liverpool, United Kingdom (UK). https://doi.org/10.1109/TrustCom.2012.97
Kirkham T, Armstrong D, Djemame K, Corrales M, Kiran M, Nwankwo I et al.. Assuring data privacy in cloud transformations. 2012. Paper presented at 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom-2012, Liverpool, United Kingdom (UK). doi: 10.1109/TrustCom.2012.97
Kirkham, Tom ; Armstrong, Django ; Djemame, Karim et al. / Assuring data privacy in cloud transformations. Paper presented at 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom-2012, Liverpool, United Kingdom (UK).7 p.
Download
@conference{76d63c184f9744bdb7f5284408c6e340,
title = "Assuring data privacy in cloud transformations",
abstract = "Cloud transformations require dynamic redistribution of resources across cloud infrastructure. From a legal perspective this movement of data from one data processor to another without the explicit consent of the data subject is a threat to data privacy. Levels of assurance and accountability have to be provided from the cloud infrastructure providers to the data subject in order to maintain trust. In cases of Cloud Transformation multiple providers are present and passing accountability down the chain is essential. Existing Service Level Agreements (SLA) and policy based privacy implementations fail to provide the flexibility and accountability needed in establishing these new relationships. By introducing combined risk and privacy assessment alongside SLA negotiation, the legal and data management implications of Cloud Transformation events can be better accounted for. This will better protect the privacy of data subjects and increase confidence and trust in the Cloud computing platform.",
keywords = "Cloud, Privacy, Risk, SLA",
author = "Tom Kirkham and Django Armstrong and Karim Djemame and Marcelo Corrales and Mariam Kiran and Iheanyi Nwankwo and Ming Jiang and Nikolaus Forg{\'o}",
year = "2012",
doi = "10.1109/TrustCom.2012.97",
language = "English",
pages = "1063--1069",
note = "11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom-2012 ; Conference date: 25-06-2012 Through 27-06-2012",

}

Download

TY - CONF

T1 - Assuring data privacy in cloud transformations

AU - Kirkham, Tom

AU - Armstrong, Django

AU - Djemame, Karim

AU - Corrales, Marcelo

AU - Kiran, Mariam

AU - Nwankwo, Iheanyi

AU - Jiang, Ming

AU - Forgó, Nikolaus

PY - 2012

Y1 - 2012

N2 - Cloud transformations require dynamic redistribution of resources across cloud infrastructure. From a legal perspective this movement of data from one data processor to another without the explicit consent of the data subject is a threat to data privacy. Levels of assurance and accountability have to be provided from the cloud infrastructure providers to the data subject in order to maintain trust. In cases of Cloud Transformation multiple providers are present and passing accountability down the chain is essential. Existing Service Level Agreements (SLA) and policy based privacy implementations fail to provide the flexibility and accountability needed in establishing these new relationships. By introducing combined risk and privacy assessment alongside SLA negotiation, the legal and data management implications of Cloud Transformation events can be better accounted for. This will better protect the privacy of data subjects and increase confidence and trust in the Cloud computing platform.

AB - Cloud transformations require dynamic redistribution of resources across cloud infrastructure. From a legal perspective this movement of data from one data processor to another without the explicit consent of the data subject is a threat to data privacy. Levels of assurance and accountability have to be provided from the cloud infrastructure providers to the data subject in order to maintain trust. In cases of Cloud Transformation multiple providers are present and passing accountability down the chain is essential. Existing Service Level Agreements (SLA) and policy based privacy implementations fail to provide the flexibility and accountability needed in establishing these new relationships. By introducing combined risk and privacy assessment alongside SLA negotiation, the legal and data management implications of Cloud Transformation events can be better accounted for. This will better protect the privacy of data subjects and increase confidence and trust in the Cloud computing platform.

KW - Cloud

KW - Privacy

KW - Risk

KW - SLA

UR - http://www.scopus.com/inward/record.url?scp=84868110607&partnerID=8YFLogxK

U2 - 10.1109/TrustCom.2012.97

DO - 10.1109/TrustCom.2012.97

M3 - Paper

AN - SCOPUS:84868110607

SP - 1063

EP - 1069

T2 - 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom-2012

Y2 - 25 June 2012 through 27 June 2012

ER -