Towards a Framework for Privacy-Preserving Data Sharing in Portable Clouds

被引:0
作者
Zeidler, Clemens [1 ]
Asghar, Muhammad Rizwan [1 ]
机构
[1] Univ Auckland, Dept Comp Sci, Auckland 1142, New Zealand
来源
CLOUD COMPUTING AND SERVICES SCIENCE, CLOSER 2016 | 2017年 / 740卷
关键词
Portable cloud; Privacy; Data sharing; Data migration; Migration costs; Migration agent; ACCESS-CONTROL;
D O I
10.1007/978-3-319-62594-2_14
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Cloud storage is a cheap and reliable solution for users to share data with their contacts. However, the lack of standardisation and migration tools makes it difficult for users to migrate to another Cloud Service Provider (CSP) without losing contacts, thus resulting in a vendor lock-in problem. In this work, we aim at providing a generic framework, named PortableCloud, that is flexible enough to enable users to migrate seamlessly to a different CSP keeping all their data and contacts. To preserve the privacy of users, the data in the portable cloud is concealed from the CSP by employing encryption techniques. Moreover, we introduce a migration agent that assists users in automatically finding a suitable CSP that can satisfy their needs.
引用
收藏
页码:272 / 292
页数:21
相关论文
共 39 条
[1]  
[Anonymous], 2013, MOBICOM 13
[2]  
[Anonymous], 2012, P 8 INT ICST C SEC P
[3]   A View of Cloud Computing [J].
Armbrust, Michael ;
Fox, Armando ;
Griffith, Rean ;
Joseph, Anthony D. ;
Katz, Randy ;
Konwinski, Andy ;
Lee, Gunho ;
Patterson, David ;
Rabkin, Ariel ;
Stoica, Ion ;
Zaharia, Matei .
COMMUNICATIONS OF THE ACM, 2010, 53 (04) :50-58
[4]  
Asghar M. R., 2011, 2011 Sixth International Conference on Availability, Reliability and Security, P99, DOI 10.1109/ARES.2011.23
[5]  
Asghar M.R., 2013, P ACM WORKSHOP CLOUD, P77, DOI DOI 10.1145/2517488.2517492
[6]   E-GRANT: Enforcing Encrypted Dynamic Security Constraints in the Cloud [J].
Asghar, Muhammad Rizwan ;
Russello, Giovanni ;
Crispo, Bruno .
2015 3RD INTERNATIONAL CONFERENCE ON FUTURE INTERNET OF THINGS AND CLOUD (FICLOUD) AND INTERNATIONAL CONFERENCE ON OPEN AND BIG (OBD), 2015, :135-144
[7]   ESPOONERBAC: Enforcing security policies in outsourced environments [J].
Asghar, Muhammad Rizwan ;
Ion, Mihaela ;
Russello, Giovanni ;
Crispo, Bruno .
COMPUTERS & SECURITY, 2013, 35 :2-24
[8]  
Asghar MR, 2012, LECT NOTES COMPUT SC, V7039, P145
[9]  
Bessani A, 2011, EUROSYS 11: PROCEEDINGS OF THE EUROSYS 2011 CONFERENCE, P31
[10]  
Burr W E., 1996, A proposed federal pki using x. 509 v3 certificates