2015
DOI: 10.1007/978-3-662-48616-0_5
|View full text |Cite
|
Sign up to set email alerts
|

Runtime Model-Based Privacy Checks of Big Data Cloud Services

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
10
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
3
2
2

Relationship

2
5

Authors

Journals

citations
Cited by 10 publications
(10 citation statements)
references
References 15 publications
0
10
0
Order By: Relevance
“…To answer question Q1, we expressed all data flow scenarios described above using our DSL (M1.1). We were able to formulate data flow constraints using our DSL for all scenarios, except for one Geolocation scenario [27]. This scenario handles personally identifiable information which prohibits selected data flow from different location to be joined together.…”
Section: Evaluation Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…To answer question Q1, we expressed all data flow scenarios described above using our DSL (M1.1). We were able to formulate data flow constraints using our DSL for all scenarios, except for one Geolocation scenario [27]. This scenario handles personally identifiable information which prohibits selected data flow from different location to be joined together.…”
Section: Evaluation Resultsmentioning
confidence: 99%
“…Our evaluation is based on data flow constraints gathered from case studies and related work. This includes the Geolocation scenarios derived from privacy violations in cloud services [27], the ContactSMSManager and DistanceTracker case studies from iFlow [28] which were used to evaluate DDSA [4] and the SecureLinks constraint from UMLsec [13].…”
Section: B Evaluation Designmentioning
confidence: 99%
“…With the rise of cloud computing, the run-time detection of dynamically arising threats became important. For example, Massonet et al [18] and Schmieders et al [42] propose approaches to detect emerging violations of data location restrictions in cloud systems through appropriate monitoring and analysis techniques. These approaches are limited to one specific type of threat stemming from geolocation violations, and do not mitigate the identified threats.…”
Section: Related Workmentioning
confidence: 99%
“…It does support access control, however, the rules specification happens on the control flow, which is more complicated than on the dataflow. R-PRIS [22] is an approach, which investigates changes during runtime, that might lead to privacy issues. Therefore a runtime model is used, which is then checked against the privacy rules.…”
Section: Related Workmentioning
confidence: 99%