Show simple item record  

dc.contributor.authorKo, Ryan K.L.en_NZ
dc.contributor.authorRussello, Giovannien_NZ
dc.contributor.authorNelson, Richarden_NZ
dc.contributor.authorPang, Shaoningen_NZ
dc.contributor.authorCheang, Aloysiusen_NZ
dc.contributor.authorDobbie, Gillen_NZ
dc.contributor.authorSarrafzadeh, Abdolhosseinen_NZ
dc.contributor.authorChaisiri, Sivadonen_NZ
dc.contributor.authorAsghar, Muhammad Rizwanen_NZ
dc.contributor.authorHolmes, Geoffreyen_NZ
dc.contributor.editorWang, G.en_NZ
dc.contributor.editorZomaya, A.en_NZ
dc.contributor.editorPerez, G.M.en_NZ
dc.contributor.editorLi, K.en_NZ
dc.coverage.spatialZhangjiajie, Chinaen_NZ
dc.date.accessioned2016-04-28T02:39:54Z
dc.date.available2015en_NZ
dc.date.available2016-04-28T02:39:54Z
dc.date.issued2015en_NZ
dc.identifier.citationKo, R. K. L., Russello, G., Nelson, R., Pang, S., Cheang, A., Dobbie, G., … Holmes, G. (2015). STRATUS: Towards returning data control to cloud users. In G. Wang, A. Zomaya, G. M. Perez, & K. Li (Eds.), Algorithms and Architectures for Parallel Processing: ICA3PP International Workshops and Symposiums Proceedings (Vol. LNCS 9532, pp. 57–70). Switzerland: Springer International Publishing. http://doi.org/10.1007/978-3-319-27161-3_6en
dc.identifier.isbn978-3-319-27160-6en_NZ
dc.identifier.urihttps://hdl.handle.net/10289/10147
dc.description.abstractWhen we upload or create data into the cloud or the web, we immediately lose control of our data. Most of the time, we will not know where the data will be stored, or how many copies of our files are there. Worse, we are unable to know and stop malicious insiders from accessing the possibly sensitive data. Despite being transferred across and within clouds over encrypted channels, data often has to be decrypted within the database for it to be processed. Exposing the data at some point in the cloud to a few privileged users is undoubtedly a vendor-centric approach, and hinges on the trust relationships data owners have with their cloud service providers. A recent example of the abuse of the trust relationship is the high-profile Edward Snowden case. In this paper, we propose a user-centric approach which returns data control to the data owners – empowering users with data provenance, transparency and auditability, homomorphic encryption, situation awareness, revocation, attribution and data resilience. We also cover key elements of the concept of user data control. Finally, we introduce how we attempt to address these issues via the New Zealand Ministry of Business Innovation and Employment (MBIE)-funded STRATUS (Security Technologies Returning Accountability, Trust and User-centric Services in the Cloud) research project.
dc.format.mimetypeapplication/pdf
dc.language.isoen
dc.publisherSpringer International Publishingen_NZ
dc.rights©2015 Springer.This is the author's accepted version. The final publication is available at Springer via dx.doi.org/10.1007/978-3-319-27161-3_6
dc.sourceICA3PP International Workshops and Symposiumsen_NZ
dc.subjectCloud security
dc.subjectCloud computing
dc.subjectUser data control
dc.subjectUser-centric security
dc.subjectData provenance
dc.subjectHomomorphic encryption
dc.subjectSituation awareness
dc.subjectData resiliency
dc.subjectcomputer science
dc.subjectMachine learning
dc.titleSTRATUS: Towards returning data control to cloud usersen_NZ
dc.typeConference Contribution
dc.identifier.doi10.1007/978-3-319-27161-3_6en_NZ
dc.relation.isPartOfAlgorithms and Architectures for Parallel Processing: ICA3PP International Workshops and Symposiums Proceedingsen_NZ
pubs.begin-page57
pubs.elements-id133554
pubs.end-page70
pubs.finish-date2015-11-20en_NZ
pubs.place-of-publicationSwitzerland
pubs.start-date2015-11-18en_NZ
pubs.volumeLNCS 9532en_NZ


Files in this item

This item appears in the following Collection(s)

Show simple item record