skip to main content
10.1145/1621890.1621897acmconferencesArticle/Chapter ViewAbstractPublication PagescomswareConference Proceedingsconference-collections
research-article

A client-based privacy manager for cloud computing

Published:16 June 2009Publication History

ABSTRACT

A significant barrier to the adoption of cloud services is that users fear data leakage and loss of privacy if their sensitive data is processed in the cloud. In this paper, we describe a client-based privacy manager that helps reduce this risk, and that provides additional privacy-related benefits. We assess its usage within a variety of cloud computing scenarios. We have built a proof-of-concept demo that shows how privacy may be protected via reducing the amount of sensitive information sent to the cloud.

References

  1. Amazon Web Services LLC. 2009. Case Studies: TC3 Health. Web page, http://aws.amazon.com/solutions/case-studies/tc3-health/Google ScholarGoogle Scholar
  2. Boneh, D. and Franklin, M. 2001. Identity-based Encryption from the Weil Pairing. In Advantages in Cryptology -- CRYPTO 2001, G. Goos, J. Hartmanis and J. van Leeuwen, Eds. Springer LNCS Series 2139. Springer, Berlin/Heidelberg, 213--229. DOI= http://dx.doi.org/10.1007/3-540-44647-8_13 Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Casassa Mont, M., Pearson, S. and Bramhall, P. 2003. Towards Accountable Management of Identity and Privacy: Sticky Policies and Enforceable Tracing Services. In Proceedings of the IEEE Workshop on Data and Expert Systems Applications (Prague, Czech Republic, September 1--5, 2003). DEXA'03. IEEE Computer Society, Washington DC, USA, 377--382. DOI= http://dx.doi.org/10.1109/DEXA.2003.1232051 Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Casassa Mont, M. and Thyne, R. 2006. A Systemic Approach to Automate Privacy Policy Enforcement in Enterprises. In Proceedings of the 6th Workshop on Privacy Enhancing Technologies (Cambridge, UK, June 28--30, 2006). PET'06. Springer LNCS series 4258, Springer Berlin/Heidelberg, 118--134. DOI= http://dx.doi.org/10.1007/11957454_7Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. EnCoRe. EnCoRe: Ensuring Consent and Revocation. Project web site. http://www.encore-project.infoGoogle ScholarGoogle Scholar
  6. Fischer-Hübner, S. 2001. IT-Security and Privacy: Design and Use of Privacy-Enhancing Security Mechanisms. Springer LNCS series 1958, Springer Berlin/Heidelberg. DOI= http://dx.doi.org/10.1007/3-540-45150-1Google ScholarGoogle Scholar
  7. Greenberg, A. 2008. Cloud Computing's Stormy Side. Forbes Magazine (19 Feb 2008).Google ScholarGoogle Scholar
  8. Horrigan, J. B. 2008. Use of cloud computing applications and services. Pew Internet&American Life project memo (Sept 2008).Google ScholarGoogle Scholar
  9. Information Commissioner's Office, UK, 2007. Privacy enhancing techologies (PETs). Data protection guidance note (29 March 2007).Google ScholarGoogle Scholar
  10. Lindell, Y. and Pinkas, B. 2008. Privacy Preserving Data Mining. J. Cryptology 15 (3) (2002), 151--222. DOI= http://dx.doi.org/10.1007/s00145-001-0019-2Google ScholarGoogle Scholar
  11. Liu, K. 2006. Privacy Preserving Data Mining Bibliography. Web site. http://www.cs.umbc.edu/~kunliu1/research/privacy_review.htmlGoogle ScholarGoogle Scholar
  12. Mather, T. 2008. More Cloud Computing. RSA Conference 365 blog (26 Sept 2008). https://365.rsaconference.com/blogs/tim_mather/2008/09/26/more-cloud-computingGoogle ScholarGoogle Scholar
  13. Organization for Economic Co-operation and Development (OECD). 1980. Guidelines Governing the Protection of Privacy and Transborder Flow of Personal Data (1980). OECD, Geneva.Google ScholarGoogle Scholar
  14. Patrick, A. and Kenny, S. 2003. From Privacy Legislation to Interface Design: Implementing Information Privacy. In Human-Computer Interactions, R. Dingledine (ed.), PET 2003, LNCS 2760, Springer-Verlag Berlin, pp. 107--124.Google ScholarGoogle Scholar
  15. PRIME, Privacy and Identity Management for Europe. 2008. Project web page. https://www.prime-project.eu/Google ScholarGoogle Scholar
  16. RSA Security. 2008. Data Loss Prevention (DLP) Suite. Web page. http://www.rsa.com/node.aspx?id=3426Google ScholarGoogle Scholar
  17. Salesforce.com, Inc. 2000--2009. Sales Force Automation. Web page. http://www.salesforce.com/products/sales-force-automation/Google ScholarGoogle Scholar
  18. Salmon, J. 2008. Clouded in uncertainty -- the legal pitfalls of cloud computing. Computing magazine (24 Sept 2008). http://www.computing.co.uk/computing/features/2226701/clouded-uncertainty-4229153Google ScholarGoogle Scholar
  19. Sobirey, M., Fischer-Hűbner, S. and Rannenberg, K. 1997. Pseudonymous Audit for Privacy Enhanced Intrusion Detection. Elsevier Computers and Security 16 (3), p. 207. DOI= http://dx.doi.org/10.1016/S0167-4048(97)84519-1Google ScholarGoogle ScholarCross RefCross Ref
  20. Voltage Security, 2009. Format-Preserving Encryption. Web page. http://www.voltage.com/technology/Technology_FormatPreservingEncryption.htmGoogle ScholarGoogle Scholar
  21. World Wide Web Consortium (W3C). Platform for Privacy Preferences (P3P) Project web site. http://www.w3.org/P3PGoogle ScholarGoogle Scholar
  22. Yao, A. C. 1986. How to Generate and Exchange Secrets. Proceedings of the 27th Symposium of Foundations of Computer Science (FoCS), IEEE, pp. 162--167. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. A client-based privacy manager for cloud computing

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      COMSWARE '09: Proceedings of the Fourth International ICST Conference on COMmunication System softWAre and middlewaRE
      June 2009
      183 pages
      ISBN:9781605583532
      DOI:10.1145/1621890

      Copyright © 2009 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 16 June 2009

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader