TY - GEN
T1 - Protection of users' data confidentiality in cloud computing
AU - Yau, Sik-Sang
AU - An, Ho G.
PY - 2010
Y1 - 2010
N2 - Current cloud computing systems pose serious limitation to protecting users' data confidentiality. Since users' sensitive data is presented in unencrypted forms to remote machines owned and operated by third party service providers, the risks of unauthorized disclosure of the users' sensitive data by service providers may be quite high. There are many techniques for protecting users' data from outside attackers, but currently no effective way is available for protecting users' sensitive data from service providers in cloud computing. In this paper, an approach is presented to protecting the confidentiality of users' data from service providers, and ensures service providers cannot collect users' confidential data while the data is processed and stored in cloud computing systems. Our approach has three major aspects: (1) separating software service providers and infrastructure service providers in cloud computing, (2) hiding information about the owners of data, and (3) data obfuscation. An example to show how our approach can protect the confidentiality of users' data from service providers in cloud computing is given.
AB - Current cloud computing systems pose serious limitation to protecting users' data confidentiality. Since users' sensitive data is presented in unencrypted forms to remote machines owned and operated by third party service providers, the risks of unauthorized disclosure of the users' sensitive data by service providers may be quite high. There are many techniques for protecting users' data from outside attackers, but currently no effective way is available for protecting users' sensitive data from service providers in cloud computing. In this paper, an approach is presented to protecting the confidentiality of users' data from service providers, and ensures service providers cannot collect users' confidential data while the data is processed and stored in cloud computing systems. Our approach has three major aspects: (1) separating software service providers and infrastructure service providers in cloud computing, (2) hiding information about the owners of data, and (3) data obfuscation. An example to show how our approach can protect the confidentiality of users' data from service providers in cloud computing is given.
KW - Cloud computing
KW - Data confidentiality
KW - Data obfuscation
KW - System architecture
UR - http://www.scopus.com/inward/record.url?scp=80053201294&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=80053201294&partnerID=8YFLogxK
U2 - 10.1145/2020723.2020734
DO - 10.1145/2020723.2020734
M3 - Conference contribution
AN - SCOPUS:80053201294
SN - 9781450306942
T3 - Proceedings of the 2nd Asia-Pacific Symposium on Internetware, Internetware 2010
BT - Proceedings of the 2nd Asia-Pacific Symposium on Internetware, Internetware 2010
T2 - 2nd Asia-Pacific Symposium on Internetware, Internetware 2010
Y2 - 3 November 2010 through 4 November 2010
ER -