Reference Hub4
An Approach to Data Confidentiality Protection in Cloud Environments

An Approach to Data Confidentiality Protection in Cloud Environments

Stephen S. Yau, Ho G. An, Arun Balaji Buduru
Copyright: © 2012 |Volume: 9 |Issue: 3 |Pages: 17
ISSN: 1545-7362|EISSN: 1546-5004|EISBN13: 9781466614758|DOI: 10.4018/jwsr.2012070104
Cite Article Cite Article

MLA

Yau, Stephen S., et al. "An Approach to Data Confidentiality Protection in Cloud Environments." IJWSR vol.9, no.3 2012: pp.67-83. http://doi.org/10.4018/jwsr.2012070104

APA

Yau, S. S., An, H. G., & Buduru, A. B. (2012). An Approach to Data Confidentiality Protection in Cloud Environments. International Journal of Web Services Research (IJWSR), 9(3), 67-83. http://doi.org/10.4018/jwsr.2012070104

Chicago

Yau, Stephen S., Ho G. An, and Arun Balaji Buduru. "An Approach to Data Confidentiality Protection in Cloud Environments," International Journal of Web Services Research (IJWSR) 9, no.3: 67-83. http://doi.org/10.4018/jwsr.2012070104

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

In current cloud computing systems, because users’ data is stored and processed by computing systems managed and operated by various service providers, users are concerned with the risks of unauthorized usage of their sensitive data by various entities, including service providers. The current cloud computing systems protect users’ data confidentiality from all entities, except service providers. In this paper, an approach is presented for improving the protection of users’ data confidentiality in cloud computing systems from all entities, including service providers. The authors’ approach has the following features: (1) separation of cloud application providers, data processing service providers and data storage providers, (2) anonymization of users’ identities, (3) grouping cloud application components and distributing their execution to distinct cloud infrastructures of data processing service providers, and (4) use of data obfuscation and cryptography for protecting the sensitive data from unauthorized access by all entities, including service providers. The proposed approach ensures that users’ sensitive data can be protected from their service providers even if the users do not have full cooperation from their service providers.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.