Proceedings of the 6th Edition of the ACM Workshop on Cloud Computing Security 2014
DOI: 10.1145/2664168.2664174
|View full text |Cite
|
Sign up to set email alerts
|

CloudSafetyNet

Abstract: When tenants deploy applications under the control of third-party cloud providers, they must trust the provider's security mechanisms for inter-tenant isolation, resource sharing and access control. Despite a provider's best efforts, accidental data leakage may occur due to misconfigurations or bugs in the cloud platform. Especially in Platform-as-a-Service (PaaS) clouds, which rely on weaker forms of isolation, the potential for unnoticed data leakage is high. Prior work to raise tenants' trust in clouds reli… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 20 publications
(2 citation statements)
references
References 33 publications
0
2
0
Order By: Relevance
“…While deploying monitors outside, the encrypted channel can partially mitigate the problem, future DLPD solution needs a way to monitor encrypted channels in order to effectively detect stealthy data leaks. A possible direction is the use of data flow tracking or differential analysis. For example, researchers recently leveraged differential analysis technique to achieve obfuscation resilient privacy leak detection on smartphone platforms .…”
Section: Further Research Opportunitiesmentioning
confidence: 99%
“…While deploying monitors outside, the encrypted channel can partially mitigate the problem, future DLPD solution needs a way to monitor encrypted channels in order to effectively detect stealthy data leaks. A possible direction is the use of data flow tracking or differential analysis. For example, researchers recently leveraged differential analysis technique to achieve obfuscation resilient privacy leak detection on smartphone platforms .…”
Section: Further Research Opportunitiesmentioning
confidence: 99%
“…According to Brindha et al [27], detection, access control, encryption, and intelligent security measures, such as honeypots, are the primary techniques for preventing data leakage. Cloudsafenet [28] is an example of implementing modules that use monitoring to detect data leakages by applying them to the cloud. Other techniques applicable to clouds include watermarking [29] and machine learning [30].…”
Section: Related Workmentioning
confidence: 99%