You are not logged in.
Openly accessible

Prevention of information harvesting in a cloud services environment

Batten, L. M., Abawajy, J. and Doss, R. 2011, Prevention of information harvesting in a cloud services environment, in CLOSER 2011 : Proceedings of the 1st International Conference on Cloud Computing and Services Science, INSTICC, [Noordwijkerhout, The Netherlands], pp. 66-72.

Attached Files
Name Description MIMEType Size Downloads
batten-preventionof-2011.pdf Published version application/pdf 250.09KB 170

Title Prevention of information harvesting in a cloud services environment
Author(s) Batten, L. M.
Abawajy, J.
Doss, R.ORCID iD for Doss, R. orcid.org/0000-0001-6143-6850
Conference name International Conference on Cloud Computing and Services Science (1st : 2011 : Noordwijkerhout, The Netherlands)
Conference location Noordwijkerhout, The Netherlands
Conference dates 7-9 May 2011
Title of proceedings CLOSER 2011 : Proceedings of the 1st International Conference on Cloud Computing and Services Science
Editor(s) [Unknown]
Publication date 2011
Conference series International Conference on Cloud Computing and Services Science
Start page 66
End page 72
Total pages 7
Publisher INSTICC
Place of publication [Noordwijkerhout, The Netherlands]
Keyword(s) access
cloud computing
information harvesting
secret sharing scheme
Summary We consider a cloud data storage involving three entities, the cloud customer, the cloud business centre which provides services, and the cloud data storage centre. Data stored in the data storage centre comes from a variety of customers and some of these customers may compete with each other in the market place or may own data which comprises confidential information about their own clients. Cloud staff have access to data in the data storage centre which could be used to steal identities or to compromise cloud customers. In this paper, we provide an efficient method of data storage which prevents staff from accessing data which can be abused as described above. We also suggest a method of securing access to data which requires more than one staff member to access it at any given time. This ensures that, in case of a dispute, a staff member always has a witness to the fact that she accessed data.
Notes Reproduced with the kind permission of the copyright owner.
ISBN 9789898425522
Language eng
Field of Research 080501 Distributed and Grid Systems
Socio Economic Objective 890301 Electronic Information Storage and Retrieval Services
HERDC Research category E1 Full written paper - refereed
Copyright notice ©2011, INSTICC
Free to Read? Yes
Persistent URL http://hdl.handle.net/10536/DRO/DU:30042206

Document type: Conference Paper
Collections: School of Information Technology
Open Access Collection
Connect to link resolver
 
Unless expressly stated otherwise, the copyright for items in DRO is owned by the author, with all rights reserved.

Every reasonable effort has been made to ensure that permission has been obtained for items included in DRO. If you believe that your rights have been infringed by this repository, please contact drosupport@deakin.edu.au.

Versions
Version Filter Type
Citation counts: TR Web of Science Citation Count  Cited 0 times in TR Web of Science
Scopus Citation Count Cited 3 times in Scopus
Google Scholar Search Google Scholar
Access Statistics: 376 Abstract Views, 257 File Downloads  -  Detailed Statistics
Created: Tue, 14 Feb 2012, 15:16:49 EST

Every reasonable effort has been made to ensure that permission has been obtained for items included in DRO. If you believe that your rights have been infringed by this repository, please contact drosupport@deakin.edu.au.