Protection of users' data confidentiality in cloud computing

Sik-Sang Yau, Ho G. An

Research output: Chapter in Book/Report/Conference proceedingConference contribution

12 Scopus citations

Abstract

Current cloud computing systems pose serious limitation to protecting users' data confidentiality. Since users' sensitive data is presented in unencrypted forms to remote machines owned and operated by third party service providers, the risks of unauthorized disclosure of the users' sensitive data by service providers may be quite high. There are many techniques for protecting users' data from outside attackers, but currently no effective way is available for protecting users' sensitive data from service providers in cloud computing. In this paper, an approach is presented to protecting the confidentiality of users' data from service providers, and ensures service providers cannot collect users' confidential data while the data is processed and stored in cloud computing systems. Our approach has three major aspects: (1) separating software service providers and infrastructure service providers in cloud computing, (2) hiding information about the owners of data, and (3) data obfuscation. An example to show how our approach can protect the confidentiality of users' data from service providers in cloud computing is given.

Original languageEnglish (US)
Title of host publicationProceedings of the 2nd Asia-Pacific Symposium on Internetware, Internetware 2010
DOIs
StatePublished - 2010
Event2nd Asia-Pacific Symposium on Internetware, Internetware 2010 - Suzhou, China
Duration: Nov 3 2010Nov 4 2010

Publication series

NameProceedings of the 2nd Asia-Pacific Symposium on Internetware, Internetware 2010

Other

Other2nd Asia-Pacific Symposium on Internetware, Internetware 2010
Country/TerritoryChina
CitySuzhou
Period11/3/1011/4/10

Keywords

  • Cloud computing
  • Data confidentiality
  • Data obfuscation
  • System architecture

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Hardware and Architecture

Fingerprint

Dive into the research topics of 'Protection of users' data confidentiality in cloud computing'. Together they form a unique fingerprint.

Cite this