2017
DOI: 10.1007/s10723-017-9394-2
|View full text |Cite
|
Sign up to set email alerts
|

PaaSword: A Holistic Data Privacy and Security by Design Framework for Cloud Services

Abstract: Enterprises increasingly recognize the compelling economic and operational benefits from virtualizing and pooling IT resources in the cloud. Nevertheless, the significant and valuable transformation of organizations that adopt cloud computing is accompanied by a number of security threats that should be considered. In this paper, we outline significant security challenges presented when migrating to a cloud environment and propose PaaSword -a novel holistic framework that aspires to alleviate these challenges.… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
9
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
4
3
2

Relationship

4
5

Authors

Journals

citations
Cited by 33 publications
(9 citation statements)
references
References 38 publications
0
9
0
Order By: Relevance
“…This upgrade will allow MemTri to effectively locate evidence in the context of any specified criminal investigation, thus making it practical for use in a real-life environment. In addition to that, we plan to integrate our tool in a trusted cloud environment such as the one presented in [20,21,32,33] and allow users from different geographical locations to enhance the dictionary based on their experience. Finally, adding a weight on each of the existing words has the potential to improve the effectiveness of our tool since it will be easier for a digital investigator to identify real criminal activities and categorize them by their importance.…”
Section: Resultsmentioning
confidence: 99%
“…This upgrade will allow MemTri to effectively locate evidence in the context of any specified criminal investigation, thus making it practical for use in a real-life environment. In addition to that, we plan to integrate our tool in a trusted cloud environment such as the one presented in [20,21,32,33] and allow users from different geographical locations to enhance the dictionary based on their experience. Finally, adding a weight on each of the existing words has the potential to improve the effectiveness of our tool since it will be easier for a digital investigator to identify real criminal activities and categorize them by their importance.…”
Section: Resultsmentioning
confidence: 99%
“…The scheme was based on a Symmetric Searchable Encryption (SSE) scheme [7], [8], [9] that allows patients of an electronic healthcare system to securely store encrypted versions of their medical data and search directly on them without having to decrypt them first. Even though the scheme offers some kind of secure sharing it is not that flexible and efficient since it does not rely on policies.…”
Section: Related Workmentioning
confidence: 99%
“…The IaaS platform consists of cloud hosts which operate virtual machine guests and communicate through a network. In addition to that, we assume a Platform-as-a-Service (PaaS) provider, like the one described in [8], [12], that is built on top of the IaaS platform and can host multiple outsourced databases. Furthermore, the cloud service provider is responsible for storing the data of users and also providing data access.…”
Section: System Model and Problem Statementmentioning
confidence: 99%
“…In addition to that, we assume a PaaS provider is built on top of the IaaS platform and can host multiple outsourced databases. Furthermore, the PaaS provider offers an API through which a developer can built a privacyprivacy preserving application that offers searchable encryption functionality like the one presented in [16] and [17].…”
Section: Cloud Service Provider (Csp)mentioning
confidence: 99%