2017
DOI: 10.1109/msp.2017.16
|View full text |Cite
|
Sign up to set email alerts
|

Cloud Data Auditing Techniques with a Focus on Privacy and Security

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
19
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
5
3
1

Relationship

1
8

Authors

Journals

citations
Cited by 38 publications
(19 citation statements)
references
References 20 publications
0
19
0
Order By: Relevance
“…Technical complexity also makes it difficult to audit a system without perturbing it. Further, there is a risk that sensitive data may be exposed during the audit process itself (Kolhar et al, 2017). To manage this challenge, third party auditors can be given privileged and secured access to private information to assess whether claims about the safety, privacy, and accuracy made by the system developer are valid.…”
Section: Technical Constraintsmentioning
confidence: 99%
See 1 more Smart Citation
“…Technical complexity also makes it difficult to audit a system without perturbing it. Further, there is a risk that sensitive data may be exposed during the audit process itself (Kolhar et al, 2017). To manage this challenge, third party auditors can be given privileged and secured access to private information to assess whether claims about the safety, privacy, and accuracy made by the system developer are valid.…”
Section: Technical Constraintsmentioning
confidence: 99%
“…Sustaining a culture of trust also requires that people who breach ethical and social norms are subject to proportional sanctions (Ellemers et al, 2019 ). By providing avenues for whistle-blowers and promoting a culture of ethical behaviour, EBA also helps strengthen interpersonal accountability within organisations (Koene et al, 2019 ). At the same time, doing the right thing should be made easy.…”
Section: Criteria For Successful Implementationmentioning
confidence: 99%
“…A serious concern was to define whether the Cloud service provider (CSP) fulfills the users ' legal expectations of data integrity [38,39,40], for which there are too many explanations. The first cause was the fear of loss of control over cloud data, so data controllers are no longer able to authenticate their data integrity by conventional methods that are popularly involved in local data processing.…”
Section: Data Integritymentioning
confidence: 99%
“…The authors demanded that their work named SOLID, approach succeed over existing algorithms in terms of makes pan, financial costs and resource competence. M.Kalhar et.al [18] make a review focusing cloud data auditing techniques. Huge quantities of data are accumulated with cloud service providers nowadays.…”
Section: Related Workmentioning
confidence: 99%