2015 IEEE/ACM 7th International Workshop on Principles of Engineering Service-Oriented and Cloud Systems 2015
DOI: 10.1109/pesos.2015.11
|View full text |Cite
|
Sign up to set email alerts
|

Architectural Runtime Models for Privacy Checks of Cloud Applications

Abstract: Cloud providers as well as cloud customers are obliged to comply with privacy regulations. In particular, these regulations prescribe compliance to geo-location policies that define at which geographical locations personal data may be stored or processed. However, cloud elasticity dynamically adapts computing resources to workload changes by replicating and migrating components as well as included data among data centers. As a result, data might be moved to different geographical locations, thereby violating g… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2015
2015
2018
2018

Publication Types

Select...
2
2

Relationship

1
3

Authors

Journals

citations
Cited by 4 publications
(1 citation statement)
references
References 21 publications
0
1
0
Order By: Relevance
“…Similarly to our approach, the work of Schmieders et al also applied modelbased adaptive methods to data protection in the cloud [24,25]. That work, however, is limited to one specific type of privacy goals: geo-location constraints.…”
Section: Model-based Approaches For Cloud Security and Privacymentioning
confidence: 99%
“…Similarly to our approach, the work of Schmieders et al also applied modelbased adaptive methods to data protection in the cloud [24,25]. That work, however, is limited to one specific type of privacy goals: geo-location constraints.…”
Section: Model-based Approaches For Cloud Security and Privacymentioning
confidence: 99%