Advertisement

OpenWebCrypt—Securing Our Data in Public Cloud

  • Péter VörösEmail author
  • Attila Kiss
Chapter
Part of the Studies in Computational Intelligence book series (SCI, volume 769)

Abstract

Privacy is the ability of an individual or group to seclude themselves, or information about themselves, and thereby express themselves selectively. The increasing usage and popularity of web services indicate the likelihood of privacy disclosures. Users generate a high amount of data by using online services, such as social networks, mailing software, even calendars. These data can be sold to marketers, because of their increasing reliance on customer data to create a model of potential customers. While accessing the web services, users unknowingly agree to the privacy policy of the service provider through which they authorize the service providers to collect and share their personally identifiable information. In this paper, we aim to introduce a client-side open-source data securing system.

Keywords

Privacy Web service security Public cloud Personal data management Data breach 

Notes

Acknowledgment

This work was supported by EFOP-3.6.3-VEKOP-16. Authors thank Ericsson Ltd. for support via the ELTE CNL collaboration.

References

  1. 1.
    The treacherous twelve cloud—computing top threats in 2016 (2016). [Online]. https://cloudsecurityalliance.org/group/top-threats
  2. 2.
    Vörös, P., Kiss, A.: Tookie: a new way to secure sessions. In: Recent Developments in Intelligent Information and Database Systems, pp. 195–207. Springer (2016)Google Scholar
  3. 3.
    Csubák, D.., Szücs, K., Vörös, P., Kiss, A.: Big data testbed for network attack detection. Acta Polytechnica Hungarica, vol. 13, no. 2 (2016)Google Scholar
  4. 4.
    Vörös, P., Laki, S., Kiss, A.: Distributed firewall on dataplane against DDOS attack. In: 4th Winter School of Ph.D. Students in Informatics and Mathematics, p. 37Google Scholar
  5. 5.
    Ko, R.K., Lee, B.S., Pearson, S.: Towards achieving accountability, auditability and trust in cloud computing. Adv. Comput. Commun. 432–444 (2011)Google Scholar
  6. 6.
    Ren, K., Wang, C., Wang, Q.: Security challenges for the public cloud. IEEE Internet Comput. 16(1), 69–73 (2012)CrossRefGoogle Scholar
  7. 7.
    Kalloniatis, C., Mouratidis, H., Vassilis, M., Islam, S., Gritzalis, S., Kavakli, E.: Towards the design of secure and privacy-oriented information systems in the cloud: identifying the major concepts. Comput. Stand. Interfaces 36(4), 759–775 (2014)CrossRefGoogle Scholar
  8. 8.
    Sun, D., Chang, G., Sun, L., Wang, X.: Surveying and analyzing security, privacy and trust issues in cloud computing environments. Procedia Eng. 15, 2852–2856 (2011)CrossRefGoogle Scholar
  9. 9.
    Ko, R.K., Jagadpramana, P., Mowbray, M., Pearson, S., Kirchberg, M., Liang, Q., Lee, B.S.: Trustcloud: a framework for accountability and trust in cloud computing. In: 2011 IEEE World Congress on Services (SERVICES), pp. 584–588. IEEE (2011)Google Scholar
  10. 10.
    Fujitsu research institute: personal data in the cloud: a global survey of consumer attitudes (2010). [Online]. http://www.fujitsu.com/downloads/SOL/fai/reports/fujitsu_personal-data-in-the-cloud.pdf
  11. 11.
    Sun, Y., Zhang, J., Xiong, Y., Zhu, G.: Data security and privacy in cloud computing. Int. J. Distrib. Sens. Netw. 10(7), 190903 (2014)CrossRefGoogle Scholar
  12. 12.
    Verginadis, Y., Michalas, A., Gouvas, P., Schiefer, G., Hübsch, G., Paraskakis, I.: Paasword: a holistic data privacy and security by design framework for cloud services. J. Grid Comput. 1–16 (2017)Google Scholar
  13. 13.
    Google privacy policy (2017). [Online]. https://www.google.com/policies/privacy/

Copyright information

© Springer International Publishing AG 2018

Authors and Affiliations

  1. 1.Eötvös Loránd UniversityBudapestHungary

Personalised recommendations