A Framework for Enhancing Privacy Provision in Cloud Computing
Abstract
Cloud computing is considered a new generation of technology that has offered many benefits such as flexibility, efficiency, reduction in IT cost and so on. However, the dependence on the cloud provider to process and manage the personal data leads to many privacy and confidentiality risks.. In this paper, we propose a framework that aims to evaluate if the cloud provider meets the privacy related issues. Moreover, this proposed framework helps the cloud provider to enhance the privacy provision level to increase the trust of customers on cloud provider services.
References (19)
- Peter Mell and Tim Grance, "The NIST Definition of Cloud Computing", NIST Information Technology Laboratory, 2009
- Ronald L. Krutz and Russell Dean Vines, " Cloud Security: A Comprehensive Guide to Secure Cloud Computing", Wiley Publishing, Inc., Indianapolis, Indiana, 2010, ISBN: 978-0-470-58987-8
- Dr. Arockiam L, Parthasarathy G and Monikandan S , "privacy in cloud computing: a survey", SIPM, FCST, ITCA, WSE, ACSIT, CS & IT 06, pp. 321-330, 2012. DOI : 10.5121/csit.2012.2331
- Tim Mather; Subra Kumaraswamy and Shahed Latif, "Cloud Security and Privacy: An Enterprise Perspective on Risks and Compliance", O'Reilly Media, Inc. 2009, ISBN-13: 978-0-596-80276-9
- Siani Pearson and Andrew Charlesworth. 2009. "Accountability as a Way Forward for Privacy Protection in the Cloud". In Proceedings of the 1st International Conference on Cloud computing (CloudCom '09), Martin Gilje Jaatun, Gansen Zhao, and Chunming Rong (Eds.). Springer-Verlag, Berlin, Heidelberg, 131-144, 2009
- Marko Hölbl, "Cloud Computing Security and Privacy Issues", CEPIS 2011, LSI SIN (10)02 , Version V17/15.03.2011
- Dr. Mohammed A. T. AlSudiari & Dr. TGK Vasista ," cloud computing and privacy regulations: an exploratory study on issues and implications", Advanced Computing: An International Journal ( ACIJ ), Vol.3, No.2, March 2012
- Tariq Ehsan Elahi and Siani Pearson; "Privacy Assurance: Bridging the Gap Between Preference and Practice", Trust, Privacy and Security in Digital Business Lecture Notes in Computer Science, 2007, Volume 4657, 65-74.
- Siani Pearson, "Taking account of privacy when designing cloud computing services," icse-cloud, 2009 ICSE Workshop on Software Engineering Challenges of Cloud Computing, 2009, pp.44-52.
- Murthy V. Rallapalli; " A Privacy Agreement Negotiation Model in B2C E-Commerce Transactions"; International Journal of Information Security and Privacy, October-December 2011, volume 5(4), 1-7.
- U.S.-Export.gov ,"Safe Harbor Privacy Principles", Available: http://export.gov/safeharbor/eu/eg_main_018475.asp
- FTC , "Federal Trade Commission Enforcement of the U.S.-EU and U.S.-Swiss Safe Harbor Frameworks" , Available: http://www.business.ftc.gov/documents/0494-federal-trade- commission-enforcement-us-eu-and-us-swiss-safe-harbor-frameworks
- White House-Washington, "National Strategy for Trusted Identities in Cyberspace: enhancing online choice, efficiency, security, and privacy", 2011
- OECD, "OECD Guidelines on the Protection of Privacy and Transborder Flows of Personal Data", Available: http://www.oecd.org/internet/ieconomy/oecdguidelinesontheprotectiono fprivacyandtransborderflowsofpersonaldata.htm
- APEC, "APEC Privacy Framework", APEC Secretariat, 35 Heng Mui Keng Terrace, Singapore 119616; 2005, ISBN 981-05-4471-5
- Madrid , "International Standards on the Protection of Personal Data and Privacy. The Madrid Resolution", International Conference of Data Protection and Privacy Commissioners, 2009
- Madrid, "Data protection authorities from over 50 countries approve the 'Madrid Resolution' on international privacy standards", 2009
- ISO/IEC 29100, "Information technology -Security techniques - Privacy framework", 2011
- Thomas, Haeberlen and Lionel Dupré, "Cloud Computing Benefits, risks and recommendations for information security", ENISA 2012, Rev. B, V no. 2