Details
Original language | English |
---|---|
Pages | 1063-1069 |
Number of pages | 7 |
Publication status | Published - 2012 |
Event | 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom-2012 - Liverpool, United Kingdom (UK) Duration: 25 Jun 2012 → 27 Jun 2012 |
Conference
Conference | 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom-2012 |
---|---|
Country/Territory | United Kingdom (UK) |
City | Liverpool |
Period | 25 Jun 2012 → 27 Jun 2012 |
Abstract
Cloud transformations require dynamic redistribution of resources across cloud infrastructure. From a legal perspective this movement of data from one data processor to another without the explicit consent of the data subject is a threat to data privacy. Levels of assurance and accountability have to be provided from the cloud infrastructure providers to the data subject in order to maintain trust. In cases of Cloud Transformation multiple providers are present and passing accountability down the chain is essential. Existing Service Level Agreements (SLA) and policy based privacy implementations fail to provide the flexibility and accountability needed in establishing these new relationships. By introducing combined risk and privacy assessment alongside SLA negotiation, the legal and data management implications of Cloud Transformation events can be better accounted for. This will better protect the privacy of data subjects and increase confidence and trust in the Cloud computing platform.
Keywords
- Cloud, Privacy, Risk, SLA
ASJC Scopus subject areas
- Computer Science(all)
- Computer Networks and Communications
- Computer Science(all)
- Computer Science Applications
Cite this
- Standard
- Harvard
- Apa
- Vancouver
- BibTeX
- RIS
2012. 1063-1069 Paper presented at 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom-2012, Liverpool, United Kingdom (UK).
Research output: Contribution to conference › Paper › Research › peer review
}
TY - CONF
T1 - Assuring data privacy in cloud transformations
AU - Kirkham, Tom
AU - Armstrong, Django
AU - Djemame, Karim
AU - Corrales, Marcelo
AU - Kiran, Mariam
AU - Nwankwo, Iheanyi
AU - Jiang, Ming
AU - Forgó, Nikolaus
PY - 2012
Y1 - 2012
N2 - Cloud transformations require dynamic redistribution of resources across cloud infrastructure. From a legal perspective this movement of data from one data processor to another without the explicit consent of the data subject is a threat to data privacy. Levels of assurance and accountability have to be provided from the cloud infrastructure providers to the data subject in order to maintain trust. In cases of Cloud Transformation multiple providers are present and passing accountability down the chain is essential. Existing Service Level Agreements (SLA) and policy based privacy implementations fail to provide the flexibility and accountability needed in establishing these new relationships. By introducing combined risk and privacy assessment alongside SLA negotiation, the legal and data management implications of Cloud Transformation events can be better accounted for. This will better protect the privacy of data subjects and increase confidence and trust in the Cloud computing platform.
AB - Cloud transformations require dynamic redistribution of resources across cloud infrastructure. From a legal perspective this movement of data from one data processor to another without the explicit consent of the data subject is a threat to data privacy. Levels of assurance and accountability have to be provided from the cloud infrastructure providers to the data subject in order to maintain trust. In cases of Cloud Transformation multiple providers are present and passing accountability down the chain is essential. Existing Service Level Agreements (SLA) and policy based privacy implementations fail to provide the flexibility and accountability needed in establishing these new relationships. By introducing combined risk and privacy assessment alongside SLA negotiation, the legal and data management implications of Cloud Transformation events can be better accounted for. This will better protect the privacy of data subjects and increase confidence and trust in the Cloud computing platform.
KW - Cloud
KW - Privacy
KW - Risk
KW - SLA
UR - http://www.scopus.com/inward/record.url?scp=84868110607&partnerID=8YFLogxK
U2 - 10.1109/TrustCom.2012.97
DO - 10.1109/TrustCom.2012.97
M3 - Paper
AN - SCOPUS:84868110607
SP - 1063
EP - 1069
T2 - 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom-2012
Y2 - 25 June 2012 through 27 June 2012
ER -