Proceedings of the 2013 ACM Workshop on Cloud Computing Security Workshop 2013
DOI: 10.1145/2517488.2517493
|View full text |Cite
|
Sign up to set email alerts
|

Structural cloud audits that protect private information

Abstract: As organizations and individuals have begun to rely more and more heavily on cloud-service providers for critical tasks, cloud-service reliability has become a top priority. It is natural for cloud-service providers to use redundancy to achieve reliability. For example, a provider may replicate critical state in two data centers. If the two data centers use the same power supply, however, then a power outage will cause them to fail simultaneously; replication per se does not, therefore, enable the cloud-servic… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
8
0

Year Published

2013
2013
2024
2024

Publication Types

Select...
4
2
1

Relationship

1
6

Authors

Journals

citations
Cited by 9 publications
(8 citation statements)
references
References 18 publications
0
8
0
Order By: Relevance
“…Zhai et al [38] proposed a structural reliability auditor, which discovers dependencies between cloud components. This was later extended by Xiao et al [37] to achieve this privately in secure multi-party computation (SMPC). Their work argues over the dependency graph of cloud components, a data structure which can be directly implemented in the graph signature scheme presented here.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Zhai et al [38] proposed a structural reliability auditor, which discovers dependencies between cloud components. This was later extended by Xiao et al [37] to achieve this privately in secure multi-party computation (SMPC). Their work argues over the dependency graph of cloud components, a data structure which can be directly implemented in the graph signature scheme presented here.…”
Section: Related Workmentioning
confidence: 99%
“…Consequently, cloud security assurance sought to establish structural properties of virtual infrastructures for isolation and deployment patterns [4,3] as well as for hidden dependency graphs [38,37]. Our own work with an infrastructure cloud and auditing system provider similarly indicates that structural security properties and a projection of trust from an auditing system to a provider are deemed important.…”
Section: Introductionmentioning
confidence: 99%
“…They demonstrated the practicality of their system by implementing it, which also showed the lack of privacy measures for the data that is being used. Xiao et al [19] fixed the issue by adding a privacy aspect to the SRA system. They re-engineered the 3-step process of Ref.…”
Section: Related Workmentioning
confidence: 99%
“…They demonstrated the practicality of their system by implementing it, which also showed the lack of privacy measures for the data that is being used. Xiao et al [13] fixed the issue by adding a privacy aspect to the SRA system. They re-engineered the 3-step process of [12]'work by adding privacy to each step and using Secure Multi-Party Computation (SMPC).…”
Section: Related Workmentioning
confidence: 99%