Assuring Data Privacy in Cloud Transformations

Publikation: Bidrag til bog/antologi/rapportKonferencebidrag i proceedingsForskningfagfællebedømt

Standard

Assuring Data Privacy in Cloud Transformations. / Kirkham, Tom; Armstrong, Django; Djemame, Karim; Corrales Compagnucci, Marcelo; Kiran, Mariam; Nwankwo, Iheanyi; Jiang, Ming; Forgó, Nikolaus.

Proceedings of the 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-12). IEEE, 2012. s. 1063.

Publikation: Bidrag til bog/antologi/rapportKonferencebidrag i proceedingsForskningfagfællebedømt

Harvard

Kirkham, T, Armstrong, D, Djemame, K, Corrales Compagnucci, M, Kiran, M, Nwankwo, I, Jiang, M & Forgó, N 2012, Assuring Data Privacy in Cloud Transformations. i Proceedings of the 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-12). IEEE, s. 1063. https://doi.org/10.1109/TrustCom.2012.97

APA

Kirkham, T., Armstrong, D., Djemame, K., Corrales Compagnucci, M., Kiran, M., Nwankwo, I., Jiang, M., & Forgó, N. (2012). Assuring Data Privacy in Cloud Transformations. I Proceedings of the 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-12) (s. 1063). IEEE. https://doi.org/10.1109/TrustCom.2012.97

Vancouver

Kirkham T, Armstrong D, Djemame K, Corrales Compagnucci M, Kiran M, Nwankwo I o.a. Assuring Data Privacy in Cloud Transformations. I Proceedings of the 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-12). IEEE. 2012. s. 1063 https://doi.org/10.1109/TrustCom.2012.97

Author

Kirkham, Tom ; Armstrong, Django ; Djemame, Karim ; Corrales Compagnucci, Marcelo ; Kiran, Mariam ; Nwankwo, Iheanyi ; Jiang, Ming ; Forgó, Nikolaus. / Assuring Data Privacy in Cloud Transformations. Proceedings of the 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-12). IEEE, 2012. s. 1063

Bibtex

@inproceedings{6f67e58c64f149e195c80874c026d7e2,
title = "Assuring Data Privacy in Cloud Transformations",
abstract = "Cloud transformations require dynamic redistribution of resources across cloud infrastructure. From a legal perspective this movement of data from one data processor to another without the explicit consent of the data subject is a threat to data privacy. Levels of assurance and accountability have to be provided from the cloud infrastructure providers to the data subject in order to maintain trust. In cases of Cloud Transformation multiple providers are present and passing accountability down the chain is essential. Existing Service Level Agreements (SLA) and policy based privacy implementations fail to provide the flexibility and accountability needed in establishing these new relationships. By introducing combined risk and privacy assessment alongside SLA negotiation, the legal and data management implications of Cloud Transformation events can be better accounted for. This will better protect the privacy of data subjects and increase confidence and trust in the Cloud computing platform.",
author = "Tom Kirkham and Django Armstrong and Karim Djemame and {Corrales Compagnucci}, Marcelo and Mariam Kiran and Iheanyi Nwankwo and Ming Jiang and Nikolaus Forg{\'o}",
year = "2012",
doi = "10.1109/TrustCom.2012.97",
language = "English",
pages = "1063",
booktitle = "Proceedings of the 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-12)",
publisher = "IEEE",

}

RIS

TY - GEN

T1 - Assuring Data Privacy in Cloud Transformations

AU - Kirkham, Tom

AU - Armstrong, Django

AU - Djemame, Karim

AU - Corrales Compagnucci, Marcelo

AU - Kiran, Mariam

AU - Nwankwo, Iheanyi

AU - Jiang, Ming

AU - Forgó, Nikolaus

PY - 2012

Y1 - 2012

N2 - Cloud transformations require dynamic redistribution of resources across cloud infrastructure. From a legal perspective this movement of data from one data processor to another without the explicit consent of the data subject is a threat to data privacy. Levels of assurance and accountability have to be provided from the cloud infrastructure providers to the data subject in order to maintain trust. In cases of Cloud Transformation multiple providers are present and passing accountability down the chain is essential. Existing Service Level Agreements (SLA) and policy based privacy implementations fail to provide the flexibility and accountability needed in establishing these new relationships. By introducing combined risk and privacy assessment alongside SLA negotiation, the legal and data management implications of Cloud Transformation events can be better accounted for. This will better protect the privacy of data subjects and increase confidence and trust in the Cloud computing platform.

AB - Cloud transformations require dynamic redistribution of resources across cloud infrastructure. From a legal perspective this movement of data from one data processor to another without the explicit consent of the data subject is a threat to data privacy. Levels of assurance and accountability have to be provided from the cloud infrastructure providers to the data subject in order to maintain trust. In cases of Cloud Transformation multiple providers are present and passing accountability down the chain is essential. Existing Service Level Agreements (SLA) and policy based privacy implementations fail to provide the flexibility and accountability needed in establishing these new relationships. By introducing combined risk and privacy assessment alongside SLA negotiation, the legal and data management implications of Cloud Transformation events can be better accounted for. This will better protect the privacy of data subjects and increase confidence and trust in the Cloud computing platform.

UR - https://ieeexplore.ieee.org/document/6296092/metrics#metrics

U2 - 10.1109/TrustCom.2012.97

DO - 10.1109/TrustCom.2012.97

M3 - Article in proceedings

SP - 1063

BT - Proceedings of the 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-12)

PB - IEEE

ER -

ID: 228545013