Skip to main content

Privacy, Security and Trust in Cloud Computing

  • Chapter
  • First Online:
Privacy and Security for Cloud Computing

Part of the book series: Computer Communications and Networks ((CCN))

Abstract

Cloud computing refers to the underlying infrastructure for an emerging model of service provision that has the advantage of reducing cost by sharing computing and storage resources, combined with an on-demand provisioning mechanism relying on a pay-per-use business model. These new features have a direct impact on information technology (IT) budgeting but also affect traditional security, trust and privacy mechanisms. The advantages of cloud computing—its ability to scale rapidly, store data remotely and share services in a dynamic environment—can become disadvantages in maintaining a level of assurance sufficient to sustain confidence in potential customers. Some core traditional mechanisms for addressing privacy (such as model contracts) are no longer flexible or dynamic enough, so new approaches need to be developed to fit this new paradigm. In this chapter, we assess how security, trust and privacy issues occur in the context of cloud computing and discuss ways in which they may be addressed.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Mell, P., Grance, T.: A NIST definition of cloud computing. National Institute of Standards and Technology. NIST SP 800–145. http://www.nist.gov/itl/cloud/upload/cloud-def-v15.pdf (2009)

  2. IDC: Enterprise Panel, Sept. http://www.slideshare.net/JorFigOr/cloud-computing-2010-an-idc-update (2009)

  3. Cloud Industry Forum: Transition to the Cloud: The case for a code of practice. CIF Report. http://www.cloudindustryforum.org/downloads/transition-to-the-cloud.pdf (2011)

  4. Cloud Security Alliance: Top Threats to Cloud Computing. v1.0, Mar (2010)

    Google Scholar 

  5. Horrigan, J.B.: Use of cloud computing applications and services. Pew Internet & American Life project memo, Sept (2008)

    Google Scholar 

  6. Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism Act (USA PATRIOT ACT) Title V, s 505 (2001)

    Google Scholar 

  7. Catteddu, D., Hogben, G. (eds.): Cloud computing: Benefits, risks and recommendations for information security. ENISA Report, Nov. http://www.enisa.europa.eu/activities/risk-management/files/deliverables/cloud-computing-risk-assessment/ (2009)

  8. Marchini, R.: Cloud Computing: A Practical Introduction to the Legal Issues. BSI, London (2010)

    Book  Google Scholar 

  9. McKinley, P.K., Samimi, F.A., Shapiro, J.K., Chiping, T.: Service clouds: a distributed infrastructure for constructing autonomic communication services. In: Dependable, Autonomic and Secure Computing, IEEE, 12–14 Dec 2011, Sydney, Australia, 341–348 (2006)

    Google Scholar 

  10. Warren, S., Brandeis, L.: The right to privacy. Harv. Law Rev. 4, 193 (1890)

    Article  Google Scholar 

  11. Westin, A.: Privacy and Freedom. Atheneum, New York (1967)

    Google Scholar 

  12. American Institute of Certified Public Accountants (AICPA) and CICA: Generally accepted privacy principles. Aug. http://www.aicpa.org/interestareas/informationtechnology/resources/privacy/generallyacceptedprivacyprinciples/downloadabledocuments/gapp_prac_%200909.pdf (2009)

  13. Solove, D.J.: A taxonomy of privacy. Univ. Pennsylvania Law Rev. 154(3), 477, Jan. http://papers.ssrn.com/sol3/papers.cfm?abstract_id=667622 (2006)

  14. Nissenbaum, H.: Privacy as contextual integrity. Washington Law Rev. 79, 101–139 (2004)

    Google Scholar 

  15. Nissenbaum, H.: Privacy in Context: Technology, Policy and the Integrity of Social Life. Stanford University Press, Stanford (2009)

    Google Scholar 

  16. Swire, P.P., Bermann, S.: Information Privacy: Official Reference for the Certified Information Privacy Professional, CIPP. International Association of Privacy Professionals, York (2007)

    Google Scholar 

  17. European Commission: Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data. http://ec.europa.eu/justice/policies/privacy/docs/95-46-ce/dir1995-46_part1_en.pdf (1995)

  18. Privacy Protection Study Commission: Personal privacy in Information society, United States Privacy Protection Study Commission fair information practices. http://epic.org/privacy/ppsc1977report/ (1977)

  19. Organization for Economic Co-operation and Development (OECD): Guidelines for the protection of personal data and transborder data flows. http://www.oecd.org/document/18/0,3746,en_2649_34223_1815186_1_1_1_1,00.html (1980)

  20. Safe Harbor website: http://export.gov/safeharbor/ (2012)

  21. The White House: Consumer data privacy in a networked world: a framework for protecting privacy and promoting innovation in the global digital economy, Feb. http://www.whitehouse.gov/sites/default/Files/privacy-Final.pdf (2012)

    Google Scholar 

  22. European Commission: Proposal for a Directive of the European Parliament and of the Council on the protection of individuals with regard to the processing of personal data by competent authorities for the purposes of prevention, investigation, detection or prosecution of criminal offences or the execution of criminal penalties, and the free movement of such data, Jan. http://ec.europa.eu/justice/data-protection/document/review2012/com_2012_10_en.pdf (2012)

  23. ISO: 27001: Information Security Management – Specification with Guidance for Use. ISO, London (2005)

    Google Scholar 

  24. Rousseau, D., Sitkin, S., Burt, R., Camerer, C.: Not so different after all: a cross-discipline view of trust. Acad. Manage. Rev. 23(3), 393–404 (1998)

    Article  Google Scholar 

  25. Baier, A.: Trust and antitrust. Ethics 96(2), 231–260 (1986)

    Google Scholar 

  26. Gambetta, D.: Can we trust trust? In: Gambetta, D. (ed.) Trust: Making and Breaking Cooperative Relations. Basil Blackwell, New York (1988)

    Google Scholar 

  27. Nooteboom, B.: Social capital, institutions and trust. Rev. Soc. Econ. 65(1), 29–53 (2007)

    Article  Google Scholar 

  28. Sitkin, S., Roth, N.: Explaining the limited effectiveness of legalistic ‘remedies’ for trust/distrust. Org. Sci. 4, 367–392 (1993)

    Article  Google Scholar 

  29. Wang, Y., Lin, K.-J.: Reputation-oriented trustworthy computing in e-commerce environments. Internet Comput. IEEE 12(4), 55–59 (2008)

    Article  Google Scholar 

  30. Singh, S., Morley, C.: Young Australians’ privacy, security and trust in internet banking. In: Proceedings of the 21st Annual Conference of the Australian Computer-Human Interaction Special interest Group: Design: Open 24/7 (2009)

    Google Scholar 

  31. Osterwalder, D.: Trust through evaluation and certification. Soc. Sci. Comput. Rev. 19(1), 32–46 (2001)

    Article  Google Scholar 

  32. Best, S.J., Kreuger, B.S., Ladewig, J.: The effect of risk perceptions on online political participatory decisions. J. Inform. Technol. Polit. 4, 5–17 (2005)

    Article  Google Scholar 

  33. Chang, E., Dillon, T., Calder, D.: Human system interaction with confident computing: the megatrend. In: Proceedings of the Conference on Human System Interactions, Krakow, Poland (2008)

    Google Scholar 

  34. Jaeger, P.T., Fleischmann, K.R.: Public libraries, values, trust, and e-government. Inf. Technol. Libr. 26(4), 35–43 (2007)

    Google Scholar 

  35. Nissenbaum, H.: Can trust be secured online? A theoretical perspective. Etica e Politica, 2 (1999)

    Google Scholar 

  36. Giff, S.: The influence of metaphor, smart cards and interface dialogue on trust in e-commerce. M.Sc. project, University College, London (2000)

    Google Scholar 

  37. Nielsen, J.: Trust or bust: communicating trustworthiness in web design. Jacob Nielsen’s Alertbox. http://www.useit.com/alertbox/990307.html (1999)

  38. Huynh, T.: A personalized framework for trust assessment. ACM Symp. Appl. Comput. 2, 1302–1307 (2008)

    Google Scholar 

  39. Leiven, R.: Attack resistant trust metrics. Ph.D. thesis, University of California, Berkeley (2003)

    Google Scholar 

  40. Ziegler, C.N., Lausen, G.: Spreading activation models for trust propagation. In: EEE 2004, IEEE, Taipei (2004)

    Google Scholar 

  41. Kosko, B.: Fuzzy cognitive maps. Int. J. Man-Mach. Stud. 24, 65–75 (1986)

    Article  MATH  Google Scholar 

  42. Pearson, S., Casassa Mont, M., Crane, S.: Persistent and dynamic trust: analysis and the related impact of trusted platforms. In: Herrmann, P., Issarny, V., Shiu, S. (eds.) Trust Management, Proc. iTrust 2005, LNCS 3477, pp. 355–363. Springer-Verlag, Berlin/Heidelberg/Paris (2005)

    Google Scholar 

  43. Gellman, R.: Privacy in the clouds: risks to privacy and confidentiality from cloud computing. World Privacy Forum. http://www.worldprivacyforum.org/pdf/WPF_Cloud_Privacy_Report.pdf (2009)

  44. Greenberg, A.: Cloud computing’s stormy Side. Forbes Magazine, 19 Feb (2008)

    Google Scholar 

  45. Fratto, M.: Internet evolution. The Big Report, Cloud Control. http://www.internetevolution.com/document.asp?doc_id=170782 (2009)

  46. Hall, J.A., Liedtka, S.L.: The Sarbanes-Oxley Act: implications for large-scale IT outsourcing. Commun. ACM 50(3), 95–100 (2007)

    Article  Google Scholar 

  47. Reidenberg, J.: Technology and internet jurisdiction. Univ. Pennsylvania Law Rev.1, SSRN eLibrary (2005)

    Google Scholar 

  48. Kohl, U.: Jurisdiction and the Internet. Cambridge University Press, Cambridge (2007)

    Book  Google Scholar 

  49. Mowbray, M.: The fog over the Grimpen Mire: cloud computing and the law. Script-ed J. Law, Technol. Soc. 6(1), 132–143 (Apr 2009)

    Article  Google Scholar 

  50. Goldberg, N.M., Wildon-Byrne, M.: Securing communications on the cloud. Bloomberg Law Rep.—Technol. Law. 1(10). http://www.infolawgroup.com/uploads/file/Goldberg%20Article.pdf (2009)

  51. Salmon, J.: Clouded in uncertainty—the legal pitfalls of cloud computing. Computing Magazine, 24 Sept. http://www.computing.co.uk/computing/features/2226701/clouded-uncertainty-4229153 (2008)

  52. Crompton, M.:, Cowper, C., Jefferis, C.: The Australian Dodo Case: an insight for data protection regulation. World Data Protection Report. 9(1), BNA (2009)

    Google Scholar 

  53. Hon, K.: Personal data in the UK, anonymisation and encryption. Queen Mary University of London, 9 June. http://www.cloudlegal.ccls.qmul.ac.uk/Research/49700.html (2011)

  54. Cloud Security Alliance: Security guidance for critical areas of focus in cloud computing. v2.1, English language version, Dec. http://cloudsecurityalliance.org/guidance/csaguide.v2.1.pdf (2009)

  55. Mather, T., Kumaraswamy, S., Latif, S.: Cloud Security and Privacy. O’Reilly, Sebastopol, CA (2009)

    Google Scholar 

  56. Vaquero, L., Rodero-Merino, L., Morán, D.: Locking the sky: a survey on IaaS cloud security. Computing 91, 93–118 (2011)

    Article  MATH  Google Scholar 

  57. Regulation of Investigatory Powers Act: Part II, s 28, UK (2000)

    Google Scholar 

  58. Narayanan, A., Shmatikov, V.: Robust deanonymization of large sparse datasets. IEEE Symp. Sec. Privacy (S&P) 111–125 (2008). doi:10.1109/SP.2008.33

  59. VMWare: Virtual appliances. http://www.vmware.com/appliances/getting-started/learn/ovf.html (2012)

  60. Open Cloud Computing Interface (OCCI): http://occi-wg.org/ (2012)

  61. Google: Data liberation front. http://www.dataliberation.org/ (2012)

  62. SNIA: Cloud data management interface. http://www.snia.org/cdmi (2012)

  63. OASIS. Security Assertion Markup Language (SAML). http://www.oasis-open.org/standards#samlv2.0 (2005)

  64. Wei, J., Zhang, X., Ammons, G., Bala, V., Ning, P.: Managing security of virtual machine images in a cloud environment. In: Proceedings of the CCSW ‘09. ACM, New York, pp. 91–96 (2009)

    Google Scholar 

  65. Google App Engine: http://code.google.com/appengine

  66. Kortchinsky, K.: CLOUDBURST: A VMWare Guest to Host Escape Story. BlackHat, Las Vegas (2009)

    Google Scholar 

  67. Ristenpart, T., Tromer, E., Shacham, H., Savage, S.: Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds. In: Proceedings of CCS’09, ACM, Chicago, Nov (2009)

    Google Scholar 

  68. IBM: X-force® 2010 mid-year trend and risk report. Aug. ftp://public.dhe.ibm.com/common/ssi/ecm/en/wgl03003usen/WGL03003USEN.PDF (2010)

  69. ENISA: Cloud computing information assurance framework. In: Catteddu, D., Hogben, G. (eds.), Nov. http://www.enisa.europa.eu/act/rm/files/deliverables/cloud-computing-information-assurance-framework (2009)

  70. UK Cabinet Office and CESG: HMG information assurance maturity model and assessment framework. www.cesg.gov.uk/publications/Documents/iamm-assessment-framework.pdf (2010)

  71. Jansen, W., Grance, T.: Guidelines on security and privacy in public cloud computing. NIST Special Publication 800–144, Dec (2011)

    Google Scholar 

  72. International Organisation for Standardisation (ISO): ISO/IEC 27001:2005 Information technology—security techniques—information security management systems—requirements. http://www.iso.org/iso/catalogue_detail?csnumber=42103 (2005)

  73. ISO: ISO/IEC 27002:2005 Information technology—Security techniques—Code of practice for information security management. http://www.iso.org/iso/catalogue_detail?csnumber=50297 (2005)

  74. ISO: ISO 31000:2009 Risk management—Principles and guidelines. http://www.iso.org/iso/catalogue_detail?csnumber=43170 (2009)

  75. Shared Assessments: Evaluating cloud risk for the enterprise. The Santa Fe Group, Oct. http://www.sharedassessments.org/media/pdf-EnterpriseCloud-SA.pdf (2010)

  76. Hagen, J.M., Sivertsen, T.K., Rong, C.: Protection against unauthorized access and computer crime in Norwegian enterprises. J. Comput. Secur. 16(3), 341–366 (2008)

    Article  Google Scholar 

  77. CSA: Trusted cloud initiative. http://www.cloudsecurityalliance.org/trustedcloud.html (2012)

  78. Information Commissioner’s Office (ICO): Privacy impact assessment handbook. Version 2, June. http://www.ico.gov.uk/for_organisations/data_protection/topic_guides/privacy_impact_assessment.aspx (2009)

  79. Ardagna, C.A., et al.: Exploiting cryptography for privacy-enhanced access control. J. Comput. Soc. 18(1), 123–160 (2010) (IOS Press)

    Google Scholar 

  80. Data Loss Prevention: http://datalossprevention.com/ (2012)

  81. Bier, E., et al.: The rules of redaction: identify, protect, review (and repeat). Secur. Privacy, IEEE 7(6), 46–53 (2009)

    Article  Google Scholar 

  82. Information Commissioner’s Office UK ICO: Data protection guidance note: Privacy enhancing technologies: http://www.ico.gov.uk/upload/documents/library/data_protection/detailed_specialist_guides/privacy_enhancing_technologies_v2.pdf (2007)

  83. Informatica: Dynamic data masking. http://www.informatica.com/au/products_services/data_masking/Pages/index.aspx (2012)

  84. Cranor, L.: Web Privacy with P3P. O’Reilly and Associates, Sebastopol, CA (2002)

    Google Scholar 

  85. EnCoRe: Ensuring Consent and Revocation project: http://www.encore-project.info (2012)

  86. Cachin, C., Schunter, M.: A cloud you can trust. Dec. http://spectrum.ieee.org/computing/networks/a-cloud-you-can-trust/4 (2011)

  87. SAS 70: http://sas70.com/

  88. SysTrust and WebTrust: http://www.webtrust.org/

  89. RSA Archer: eGRC. http://www.emc.com/security/rsa-archer.htm (2012)

  90. CSA: GRC stack. http://www.cloudsecurityalliance.org/grcstack.html (2012)

  91. CSA: CloudAudit. http://cloudaudit.org/CloudAudit/Home.html (2012)

  92. Takabi, H., Joshi, J.B.D., Ahn, G.: Security and privacy challenges in cloud computing environments. Secur. Privacy, IEEE 8(6), 24–31 (2010)

    Article  Google Scholar 

  93. EGEE project: Logging and Bookkeeping (LB) service. http://egee.cesnet.cz/en/JRA1/LB/ (2012)

  94. Chuckwa: http://incubator.apache.org/chukwa/ (2012)

  95. Nicolett, M., Kavanagh, K.M.: Critical capabilities for security information and event management technology, Gartner Report (2011)

    Google Scholar 

  96. RSA: EnVision platform. http://www.rsa.com/experience/envision/3n1/ (2012)

  97. HP: ArcSight. http://www.arcsight.com/ (2012)

  98. Stoneburner, G., Goguen, A., Feringa, A.: Risk management guide for information technology systems: recommendations of the National Institute of Standards and Technology. Special publication 800–30, July (2002)

    Google Scholar 

  99. Committee of Sponsoring Organisations of the Treadway Commission (COSO): http://www.coso.org (2012)

  100. ISACA: http://www.isaca.org (2012)

  101. American Institute of CPAs (AICPA): http://www.aicpa.org/INTERESTAREAS/INFORMATIONTECHNOLOGY/RESOURCES/TRUSTSERVICES/Pages/default.aspx (2012)

  102. Amazon: CloudWatch. http://aws.amazon.com/cloudwatch/ (2012)

  103. Haeberlen, A.: A case for the accountable cloud. ACM SIGOPS OS Rev. 44(2), 52–57 (2010)

    Article  Google Scholar 

  104. Haeberlen, A., et al.: Accountable virtual machines. In: Proceedings of the OSDI’10, USENIX, Vancouver, Canada (2010)

    Google Scholar 

  105. HyTrust: http://www.hytrust.com/product/overview/ (2012)

  106. Chen, S., Wang, C.: Accountability as a service for the cloud: from concept to implementation with BPEL. In: Proceedings of the 6th IEEE World Congress on Services, IEEE, pp. 91–98 (2010)

    Google Scholar 

  107. Jaeger, P., Lin, J., Grimes, J.: Cloud computing and information policy: computing in a policy cloud? J. Inf. Technol. Polit. 5, 269–283 (2008)

    Article  Google Scholar 

  108. European Commission: Attitudes on data protection and electronic identity in the European Union. June. http://ec.europa.eu/public_opinion/archives/ebs/ebs_359_en.pdf (2011)

  109. IDC: Cloud computing attitudes, Survey, Doc.#223077 (2010)

    Google Scholar 

  110. Forrester Research, Inc.: Ignoring cloud risks: a growing gap between I&O and the business. Mar (2011)

    Google Scholar 

  111. Forrester Research, Inc.: You’re not ready for internal cloud. July (2010)

    Google Scholar 

  112. Goldman Sachs: Equity Research, Jan (2011)

    Google Scholar 

  113. Fujitsu Research Institute: Personal data in the cloud: a global survey of consumer attitudes. http://www.fujitsu.com/downloads/SOL/fai/reports/fujitsu_personaldata-in-the-cloud.pdf (2010)

  114. Uusitalo, I., Karppinen, K., Arto, J., Savola, R.: Trust and cloud services – an interview study. In: Proceedings of the CloudCom 2010, IEEE, Indianapolis (2010)

    Google Scholar 

  115. Lacohé, H., Crane, S., Phippen, A.: Trustguide Final Report, October. DTI Sciencewise Programme. www.trustguide.org (2006)

    Google Scholar 

  116. Artz, D., Gil, Y.: A survey of trust in computer science and the semantic web. Web Semant. Sci. Serv. Agents World Wide Web 5, 58–71 (2007)

    Article  Google Scholar 

  117. Li, W., Ping, L.: Trust model to enhance security and interoperability of cloud environment. In: Cloud Computing. Lecture Notes in Computer Science, vol. 5931, pp. 69–79. Springer, Berlin (2009)

    Chapter  Google Scholar 

  118. Marsh, S.: Formalising trust as a computational concept. Doctoral dissertation, University of Stirling (1994)

    Google Scholar 

  119. Banerjee, S., Mattmann, C., Medvidovic, N., Golubchik, L.: Leveraging architectural models to inject trust into software systems. In: Proceedings of SESS ‘05, pp. 1–7. ACM, New York (2005)

    Google Scholar 

  120. The Centre for Information Policy Leadership (CIPP): Demonstrating and measuring accountability: a discussion document. Accountability Phase II—The Paris Project. http://www.huntonFiles.com/Files/webupload/CIPL_Accountability_Phase_II_Paris_Project.PDF (2010)

    Google Scholar 

  121. Shin, D., Ahn, G.-J.: Role-based privilege and trust management. Comput. Syst. Sci. Eng. J. 20(6), 401–410 (2005)

    Google Scholar 

  122. CSA: Cloud trust protocol https://cloudsecurityalliance.org/research/ctp/ (2012).

  123. Weitzner, D.J., Abelson, H., Berners-Lee, T., Feigenbaum, J., Hendler, J., Sussman, G.J.: Information accountability. Commun. ACM 51(6), 87 June (2008)

    Article  Google Scholar 

  124. Pearson, S., Charlesworth, A.: Accountability as a way forward for privacy protection in the cloud. In: Jaatun, M.G., Zhao, G., Rong, C. (eds.) Proceedings of the 1st International Conference on Cloud Computing (CloudCom 2009), Beijing, Dec. LNCS, vol. 5931, pp. 131–144. Springer, Berlin (2009)

    Google Scholar 

  125. Pearson, S., et al.: Scalable, accountable privacy management for large organizations. In: INSPEC 2009, IEEE, Sept, pp. 168–175 (2009)

    Google Scholar 

  126. Information Commissioners Office: Privacy by design. Report. www.ico.gov.uk (2008)

  127. Cavoukian, A., Taylor, S., Abrams, M.: Privacy by design: essential for organizational accountability and strong business practices. Identity Inf. Soc. 3(2), 405–413. http://www.springerlink.com/content/96852p1667mwl665/ (2010)

  128. Cavoukian, A.: Privacy by design: origins, meaning, and prospects for assuring privacy and trust in the information era. In: Yee, G. (ed.) Privacy Protection Measures and Technologies in Business Organizations: Aspects and Standards, pp. 170–208. IGI Global, Hershey (2012)

    Chapter  Google Scholar 

  129. Camenisch, J., Fischer-Hübner, S., Rannenberg, K. (eds.): Privacy and Identity Management for Life. Springer, Heidelberg (2011)

    Google Scholar 

  130. Kamara, S., Lauter, K.: Cryptographic cloud storage. In: Financial Cloud and Data Security. LNCS, vol. 6054, pp. 136–149. Springer, Berlin (2010). doi:10.1007/978%973%97642%9714992%974_13

    Chapter  Google Scholar 

  131. Gentry, C.: Fully homomorphic encryption using ideal lattices. In: 41st ACM Symposium on Theory of Computing (STOC), pp. 169–178. ACM, New York (2009)

    Google Scholar 

  132. Spiekermann, S., Cranor, L.F.: Engineering privacy. IEEE Trans. Software Eng. 35(1), 67–82, Jan/Feb (2009)

    Google Scholar 

Recommended Reading

Download references

Acknowledgements

The influence and input contributing to development of the ideas in this chapter of various colleagues is gratefully acknowledged, notably Daniel Pradelles.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Siani Pearson .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag London

About this chapter

Cite this chapter

Pearson, S. (2013). Privacy, Security and Trust in Cloud Computing. In: Pearson, S., Yee, G. (eds) Privacy and Security for Cloud Computing. Computer Communications and Networks. Springer, London. https://doi.org/10.1007/978-1-4471-4189-1_1

Download citation

  • DOI: https://doi.org/10.1007/978-1-4471-4189-1_1

  • Published:

  • Publisher Name: Springer, London

  • Print ISBN: 978-1-4471-4188-4

  • Online ISBN: 978-1-4471-4189-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics