Automatic Data Protection Certificates for Cloud-Services based on Secure Logging

2014 ◽  
pp. 59-75 ◽  
Author(s):  
Thomas Kunz ◽  
Annika Selzer ◽  
Ulrich Waldmann
2021 ◽  
Vol 2021 ◽  
pp. 1-11
Author(s):  
Amr M. Sauber ◽  
Passent M. El-Kafrawy ◽  
Amr F. Shawish ◽  
Mohamed A. Amin ◽  
Ismail M. Hagag

The main goal of any data storage model on the cloud is accessing data in an easy way without risking its security. A security consideration is a major aspect in any cloud data storage model to provide safety and efficiency. In this paper, we propose a secure data protection model over the cloud. The proposed model presents a solution to some security issues of cloud such as data protection from any violations and protection from a fake authorized identity user, which adversely affects the security of the cloud. This paper includes multiple issues and challenges with cloud computing that impairs security and privacy of data. It presents the threats and attacks that affect data residing in the cloud. Our proposed model provides the benefits and effectiveness of security in cloud computing such as enhancement of the encryption of data in the cloud. It provides security and scalability of data sharing for users on the cloud computing. Our model achieves the security functions over cloud computing such as identification and authentication, authorization, and encryption. Also, this model protects the system from any fake data owner who enters malicious information that may destroy the main goal of cloud services. We develop the one-time password (OTP) as a logging technique and uploading technique to protect users and data owners from any fake unauthorized access to the cloud. We implement our model using a simulation of the model called Next Generation Secure Cloud Server (NG-Cloud). These results increase the security protection techniques for end user and data owner from fake user and fake data owner in the cloud.


Cloud computing can store and manage the large amount of data. Storing the data on to cloud is widespread among companies additionally as private users. It permits its users to access the cloud services from the different locations. It wants solely a working internet connection to access the cloud services. A lot of attention is gained by cloud still there are some problems that need to be taken in considerations(i.e. data security, privacy and reliability)in which data security is one in all the most problems. The biggest challenge in the cloud is to maintain the integrity and confidentiality of data. Many techniques are urged for data protection in cloud. This paper focuses on the present security techniques for shielding the data in cloud. The paper has been carried out on the basis of cryptography, intrusion detection, attacks solutions, Data integrity and privacy as well as authentication and identity.


2011 ◽  
Vol 55 ◽  
pp. 117-130
Author(s):  
Angelė Pečeliūnaitė

Informacinės komunikacinės technologijos sparčiai vystosi ir tobulėja. Debesų kompiuterija (Cloud Computing) yra dar viena naujovė, sparčiai pradėjusi plisti XXI a. pradžioje. Debesų kompiuterija – tai galimybė naudotis kompiuterine ir programine įranga internete ir mokėti tik už tai, kiek teikiama paslauga buvo pasinaudota. Debesų kompiuterijos paslaugos pirmiausia buvo orientuotos į verslą. Šio straipsnio tikslas – apžvelgti debesų technologijas ir jų teikiamas galimybes akademinei bendruomenei – studijoms, mokslui, bendradarbiavimui ir mokslinei komunikacijai. Analizuojamos trijų korporacijų siūlomos paslaugos, kreipiant dėmesį į paslaugų įvairovę, galimybes rengti projektus, konferencijas etc., technologijos saugumą, mobilumą ir paslaugų kainą. Tyrimo išvadose pabrėžiama, kad debesų kompiuterija yra patraukli mokslui ir studijoms. Debesį galima panaudoti studijoms, moksliniam darbui, bendradarbiavimui ir mokslinėje komunikacijoje, tik svarbu pasirinkti poreikius tenkinantį atitinkamą debesį.Pagrindiniai žodžiai: debesų technologijos, debesų kompiuterija, viešas ir privatus debesis, virtualus privatus tinklas, SaaS, PaaS, IaaS, virtualizacijos procesai, duomenų centrai, Microsoft Office 365, Microsoft Web Apps, Zoho debesis, Google Apps studijoms, mokslo komunikacija.Cloud Computing: The job, co-operation and communication Does Cloud Meet the Needs of Students and Scholars?Angelė Pečeliūnaitė SummaryThe information and communication technologies are rapidly evolving and progressing. Cloud computing is one of the innovations that began rapidly spreading from the beginning of the 21st century. The article summarizes the cloud computing paradigm, an introduction to cloud computing platforms, the cloud service offered by the cloud providers, and highlights the attractive features of this technology. The collaboration and communication methods in the cloud are discussed. The cloud computing services were primarily focused on business. The aim of the article is an overview of the cloud technologies and opportunities for the academic community – in studies, research, col-laboration and scientific communication.Delic divides research into three significant periods: empirical, theoretical, and experimental/simulation (Delic et al., 2010, p. 3). This article falls within the third study phase: an experimen-tal study comparing the services of three selected cloud providers. We analyze the cloud services of Zoho Web Apps, Microsoft Web Apps and Google Apps for Education according to the selected five categories (information gathered from web sites and company experts speaking): education in a variety of services offered working with documents and projects, scientific communication and col-laboration, data protection, mobility and price.The results have shown that cloud services are attractive to the educational community. The largest variety of service diversity and performance improvements are offered by the Microsoft and Zoho clouds on the SaaS and PaaS platforms. Zoho is a leader of these cloud services. The most attractive environment for scientific communication and collaboration (including mobility) is the Microsoft cloud. Data protection takes care of all service providers: SLA of 99.9% guarantee. Zoho uses web encryption for 256-bit SSL, and Microsoft 128-bit SSL / TSL. Google Apps for Education is in many ways behind the above-mentioned corporations, while Google's cloud services are offered to meet students' needs; services are provided free of charge.The investigation was conducted in December 1–15, 2010.


2021 ◽  
pp. 100-144
Author(s):  
W Kuan Hon ◽  
Christopher Millard ◽  
Ian Walden ◽  
Conor Ward

This chapter examines negotiated contracts for cloud services. Given that the use of cloud services has now become widely accepted and in light of the fact that providers' standard contract terms have evolved if not improved, do customers still deem it necessary to seek to negotiate contracts and if so, which issues are typically focused on? Are providers willing to negotiate or have they hardened their attitudes to negotiation? The chapter outlines providers' perspectives on cloud contract terms and customers' perspectives on cloud contracts including the role of integrators. It looks at the factors that customers take into account when considering specific terms, including whether or not to negotiate the terms in question or look at other methods of risk mitigation. The fact that data breach response and liability for data breaches tops the list of most-negotiated terms suggests that cloud providers and customers are still grappling with the General Data Protection Regulation's (GDPR) requirements and trying to come up with terms that will satisfy both customers' and providers' needs.


2016 ◽  
Vol 24 ◽  
pp. 23
Author(s):  
Liliia Oprysk

Cloud-based services (especially IaaS) are widely used by businesses, including small and medium-sized enterprises. The recently adopted General Data Protection Regulation is going to influence the EU cloud computing market significantly, and SMEs using IaaS to process personal data of their clients face a need to adapt to those changes if they are to remain compliant with the data protection rules. The objective with the paper was to look into the regulation adopted and identify the aspects that significantly influence the relations between a cloud provider and a client, especially if seen from the perspective of SMEs. Further, the paper discusses whether IaaS will be an obvious choice for SMEs seeking to hire computer infrastructure resources for the purpose of processing personal data when the compliance efforts necessary after the General Data Protection Regulation comes into force are taken into account. The findings suggest that forthcoming changes could significantly affect the industry and, in light of the likely increase in transaction costs, that SMEs may want to consider traditional outsourcing services instead. Consequently, the results of the data protection reform would be contradictory to other objectives of the European Commission, especially that of wider adoption of cloud services by SMEs.


ITNOW ◽  
2020 ◽  
Vol 62 (2) ◽  
pp. 36-37
Author(s):  
Paolo Passeri

Abstract Paolo Passeri, Cyber Intelligence Principal at Netskope, explains how to navigate data protection when using cloud services and three key routes for immediate success.


Author(s):  
Sadie Creese ◽  
Paul Hopkins ◽  
Siani Pearson ◽  
Yun Shen

Author(s):  
Serhii Yevseiev ◽  
Oleksandr Laptiev ◽  
Sergii Lazarenko ◽  
Anna Korchenko ◽  
Iryna Manzhul

The article analyzes the parameters of social networks. The analysis is performed to identify critical threats. Threats may lead to leakage or damage to personal data. The complexity of this issue lies in the ever-increasing volume of data. Analysts note that the main causes of incidents in Internet resources are related to the action of the human factor, the mass hacking of IoT devices and cloud services. This problem is especially exacerbated by the strengthening of the digital humanistic nature of education, the growing role of social networks in human life in general. Therefore, the issue of personal information protection is constantly growing. To address this issue, let’s propose a method of assessing the dependence of personal data protection on the amount of information in the system and trust in social networks. The method is based on a mathematical model to determine the protection of personal data from trust in social networks. Based on the results of the proposed model, modeling was performed for different types of changes in confidence parameters and the amount of information in the system. As a result of mathematical modeling in the MatLab environment, graphical materials were obtained, which showed that the protection of personal data increases with increasing factors of trust in information. The dependence of personal data protection on trust is proportional to other data protection parameters. The protection of personal data is growing from growing factors of trust in information. Mathematical modeling of the proposed models of dependence of personal data protection on trust confirmed the reliability of the developed model and proved that the protection of personal data is proportional to reliability and trust


Author(s):  
Radi Petrov Romansky ◽  
Irina Stancheva Noninska

Globalization in the contemporary information society outlines new important challenges in privacy and personal data protection that apply to user security in cyberspace. This is also the case e-learning environments, which use new network technologies, such as remote access, distributed processing, information sharing, cloud services, social computing, etc. Strong security procedures based on authentication, authorization, and data protection should be proposed to protect system resources, user profiles, personal information, educational materials, and other specific information. The chapter presents the opportunities and challenges of some digital technologies that could increase the effectiveness of e-learning processes by developing a combined e-learning environment. A functional architecture with two sub-systems (front office and back office) and different information resources (public, internal, external) is discussed. Investigation by using formalization and modelling is made and assessments are presented.


Sign in / Sign up

Export Citation Format

Share Document