Hardware-Based Security for Ensuring Data Privacy in the Cloud

Hardware-Based Security for Ensuring Data Privacy in the Cloud

Wassim Itani, Ayman Kayssi, Ali Chehab
Copyright: © 2013 |Pages: 24
ISBN13: 9781466621251|ISBN10: 1466621257|EISBN13: 9781466621268
DOI: 10.4018/978-1-4666-2125-1.ch008
Cite Chapter Cite Chapter

MLA

Itani, Wassim, et al. "Hardware-Based Security for Ensuring Data Privacy in the Cloud." Security Engineering for Cloud Computing: Approaches and Tools, edited by David G. Rosado, et al., IGI Global, 2013, pp. 147-170. https://doi.org/10.4018/978-1-4666-2125-1.ch008

APA

Itani, W., Kayssi, A., & Chehab, A. (2013). Hardware-Based Security for Ensuring Data Privacy in the Cloud. In D. Rosado, D. Mellado, E. Fernandez-Medina, & M. Piattini (Eds.), Security Engineering for Cloud Computing: Approaches and Tools (pp. 147-170). IGI Global. https://doi.org/10.4018/978-1-4666-2125-1.ch008

Chicago

Itani, Wassim, Ayman Kayssi, and Ali Chehab. "Hardware-Based Security for Ensuring Data Privacy in the Cloud." In Security Engineering for Cloud Computing: Approaches and Tools, edited by David G. Rosado, et al., 147-170. Hershey, PA: IGI Global, 2013. https://doi.org/10.4018/978-1-4666-2125-1.ch008

Export Reference

Mendeley
Favorite

Abstract

In this chapter, the authors present a set of hardware-based security mechanisms for ensuring the privacy, integrity, and legal compliance of customer data as it is stored and processed in the cloud. The presented security system leverages the tamper-proof capabilities of cryptographic coprocessors to establish a secure execution domain in the computing cloud that is physically and logically protected from unauthorized access. The main design goal is to maximize users’ control in managing the various aspects related to the privacy of sensitive data by implementing user-configurable software protection and data privacy categorization mechanisms. Moreover, the proposed system provides a privacy feedback protocol to inform users of the different privacy operations applied on their data and to make them aware of any data leaks or risks that may jeopardize the confidentiality of their sensitive information. Providing a secure privacy feedback protocol increases the users’ trust in the cloud computing services, relieves their privacy concerns, and supports a set of accountable auditing services required to achieve legal compliance and certification.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.