Securing Processes for Outsourcing into the Cloud
نویسندگان
چکیده
Cloud computing is yet one of the leading developments and depicts the biggest progress in web technologies. It offers a convenient way for using shared and easy accessible resources, in both a web-based and demandoriented sense. However, cloud computing brings concept-based risks, e.g. the risk of private data becoming publicly available. Outsourcing of services into a cloud computing environment arises numerous compliance and security-problems for the potential customer. Legal as well as business requirements have to be met after migration to a cloud environment. Compliance to laws, industry-specific regulations and other rules have to be kept. In this paper we present the research project SecureClouds and our ongoing research towards security and compliance analysis of processes which are to be outsourced into the cloud. We further show a first prototype of an analytic tool-environment that allows us to examine whether outsourcing of a business process is possible while keeping all security and compliance requirements. a aParts of this work have been funded financially by BMBF grant 01IS11008D (SecureClouds).
منابع مشابه
Threatening the Cloud: Securing Services and Data by Continuous, Model-Driven Negative Security Testing
Today’s increasing trend towards outsourcing IT landscapes and business processes into the Cloud is a double-edged sword. On the one side, companies can save time and money; however, on the other side, moving possible sensitive data and business processes into the Cloud demands for a high degree of information security. In the course of this chapter, the authors give an overview of a Cloud’s va...
متن کاملSESOS: A Verifiable Searchable Outsourcing Scheme for Ordered Structured Data in Cloud Computing
While cloud computing is growing at a remarkable speed, privacy issues are far from being solved. One way to diminish privacy concerns is to store data on the cloud in encrypted form. However, encryption often hinders useful computation cloud services. A theoretical approach is to employ the so-called fully homomorphic encryption, yet the overhead is so high that it is not considered a viable s...
متن کاملSurvey on Securing Data in Cloud
Cloud computing is an innovative information system architecture which reduces the overall client side resource requirements. Even though the data outsourcing reduce the burden of client storage the clients no longer have physical possession of data which will leads to so many security issues. Hence the user need to make sure that their data is secure in clouds. Auditing and reporting of cloud ...
متن کاملAn Approach Secret Sharing Algorithm in Cloud Computing Security over Single to Multi Cloud
These days rapid use of cloud computing in several IT industries and organizations offers new software at a reasonable cost. Cloud computing is an emerging technology that is at the top in the IT industry. Data is used, processed and stored in cloud environment all over the world. With, this there is unlimited benefits but the security risks are alarming in cloud computing environment. One of t...
متن کاملS4: A New Secure Scheme for Enforcing Privacy in Cloud Data Warehouses
Outsourcing data into the cloud becomes popular thanks to the pay-as-you-go paradigm. However, such practice raises privacy concerns. The conventional way to achieve data privacy is to encrypt sensitive data before outsourcing. When data are encrypted, a tradeoff must be achieved between security and efficient query processing. Existing solutions that adopt multiple encryption schemes induce a ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2012