Get 20M+ Full-Text Papers For Less Than $1.50/day. Start a 14-Day Trial for You or Your Team.

Learn More →

Sealed computation: a mechanism to support privacy-aware trustworthy cloud service

Sealed computation: a mechanism to support privacy-aware trustworthy cloud service The purpose of this study is to propose an approach to avoid having to trust a single entity in cloud-based applications. In cloud computing, data processing is delegated to a remote party for efficiency and flexibility reasons. A practical user requirement usually is data privacy; hence, the confidentiality and integrity of data processing needs to be protected. In the common scenarios of cloud computing today, this can only be achieved by assuming that the remote party does not in any form act maliciously.Design/methodology/approachAn approach that avoids having to trust a single entity is proposed. This approach is based on two concepts: the technical abstraction of sealed computation, i.e. a technical mechanism to confine a privacy-aware processing of data within a tamper-proof hardware container, and the role of an auditing party that itself cannot add functionality to the system but is able to check whether the system (including the mechanism for sealed computation) works as expected.FindingsDiscussion and analysis of the abstract, technical and procedural requirements of these concepts and how they can be applied in practice are explained.Originality/valueA preliminary version of this paper was published in the proceedings of the second International Workshop on SECurity and Privacy Requirements Engineering (SECPRE, 2018). http://www.deepdyve.com/assets/images/DeepDyve-Logo-lg.png Information and Computer Security Emerald Publishing

Sealed computation: a mechanism to support privacy-aware trustworthy cloud service

Information and Computer Security , Volume 27 (5): 20 – Oct 23, 2019

Loading next page...
 
/lp/emerald-publishing/sealed-computation-a-mechanism-to-support-privacy-aware-trustworthy-Y2diO9uib6

References (46)

Publisher
Emerald Publishing
Copyright
© Emerald Publishing Limited
ISSN
2056-4961
DOI
10.1108/ics-11-2018-0133
Publisher site
See Article on Publisher Site

Abstract

The purpose of this study is to propose an approach to avoid having to trust a single entity in cloud-based applications. In cloud computing, data processing is delegated to a remote party for efficiency and flexibility reasons. A practical user requirement usually is data privacy; hence, the confidentiality and integrity of data processing needs to be protected. In the common scenarios of cloud computing today, this can only be achieved by assuming that the remote party does not in any form act maliciously.Design/methodology/approachAn approach that avoids having to trust a single entity is proposed. This approach is based on two concepts: the technical abstraction of sealed computation, i.e. a technical mechanism to confine a privacy-aware processing of data within a tamper-proof hardware container, and the role of an auditing party that itself cannot add functionality to the system but is able to check whether the system (including the mechanism for sealed computation) works as expected.FindingsDiscussion and analysis of the abstract, technical and procedural requirements of these concepts and how they can be applied in practice are explained.Originality/valueA preliminary version of this paper was published in the proceedings of the second International Workshop on SECurity and Privacy Requirements Engineering (SECPRE, 2018).

Journal

Information and Computer SecurityEmerald Publishing

Published: Oct 23, 2019

Keywords: Data privacy; Auditor; Cloud service; Privacy by design; Sealed computation; Trustworthy cloud requirements

There are no references for this article.