Data Flow Management and Compliance in Cloud Computing

被引:19
作者
Singh, Jatinder [1 ]
Powles, Julia [2 ]
Pasquier, Thomas [1 ]
Bacon, Jean [3 ]
机构
[1] Univ Cambridge, Comp Lab, Cambridge CB2 1TN, England
[2] Univ Cambridge, Ctr Intellectual Property & Informat Law, Cambridge CB2 1TN, England
[3] Univ Cambridge, Opera Res Grp, Distributed Syst, Cambridge CB2 1TN, England
基金
英国工程与自然科学研究理事会;
关键词
cloud; compliance; data protection; information flow control; privacy; regulatory issues; security;
D O I
10.1109/MCC.2015.69
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As cloud computing becomes an increasingly dominant means of providing computing resources, legal and regulatory issues associated with the cloud also become more pronounced. In particular, there is a heightened focus on ensuring the privacy and integrity of users' personal data. At present, the cloud is opaque, a black box. The technical means for enforcing and demonstrating compliance with data management practices lag behind legal and regulatory aspirations. Information flow control (IFC) enables auditable, fine-grained management as data moves throughout systems. IFC offers the potential to improve the visibility and control over data flows within and between cloud services and cloud-hosted applications. The authors use real-world legal/regulatory examples to show how IFC can help satisfy data management obligations and improve the accountability of responsible parties. © 2014 IEEE.
引用
收藏
页码:24 / 32
页数:9
相关论文
共 15 条
[1]  
[Anonymous], 2011, SEC GUID CRIT AR FOC
[2]   Information Flow Control for Secure Cloud Computing [J].
Bacon, Jean ;
Eyers, David ;
Pasquier, Thomas F. J. -M. ;
Singh, Jatinder ;
Papagiannis, Ioannis ;
Pietzuch, Peter .
IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2014, 11 (01) :76-89
[3]  
Crowcroft J, 2011, LECT NOTES COMPUT SC, V6522, P29, DOI 10.1007/978-3-642-17679-1_3
[4]  
Dwork C, 2006, LECT NOTES COMPUT SC, V4052, P1
[5]  
Hon K., 2014, POLICY LEGAL REGULAT
[6]   Trustworthy Geographically Fenced Hybrid Clouds [J].
Jayaram, K. R. ;
Safford, David ;
Sharma, Upendra ;
Naik, Vijay ;
Pendarakis, Dimitrios ;
Tao, Shu .
ACM/IFIP/USENIX MIDDLEWARE 2014, 2014, :37-48
[7]  
Lauter K, 2011, PROCEEDINGS OF THE 3RD ACM WORKSHOP CLOUD COMPUTING SECURITY WORKSHOP (CCSW'11), P113
[8]  
Millard C., 2013, Cloud Computing Law
[9]  
Myers A. C., 1997, Operating Systems Review, V31, P129, DOI 10.1145/269005.266669
[10]  
Pasquier T., 2015, ARXIV150604391