Presentation is loading. Please wait.

Presentation is loading. Please wait.

Introduction Cloud characteristics Security and Privacy aspects Principal parties in the cloud Trust in the cloud 1. Trust-based privacy protection 2.Subjective.

Similar presentations


Presentation on theme: "Introduction Cloud characteristics Security and Privacy aspects Principal parties in the cloud Trust in the cloud 1. Trust-based privacy protection 2.Subjective."— Presentation transcript:

1

2 Introduction Cloud characteristics Security and Privacy aspects Principal parties in the cloud Trust in the cloud 1. Trust-based privacy protection 2.Subjective logic Privacy enhanced cloud services Summary AGENDA

3 Scope of the privacy is potentially the lifetime of the privacy subject Investigated trust issues and privacy aspects for cloud service users, using subjective logic as a primary tool. Subjective logic can be a useful tool for developing trust models for cloud computing. INTRODUCTION

4 Location Independent and Mobility as a basic premise Lifetime of security and privacy protection 1.Communications Security 2.Device Security 3.Data Storage Security 4.Archival Storage 5.Personal Storage CLOUD CHARACTERISTICS

5 Security aspects 1.Service aspects 2.Service execution security Right to privacy Privacy aspects Long-Term view of privacy Privacy points and counterpoints SECURITY AND PRIVACY ASPECTS

6 Individual users Aggregate users Cloud service providers 1.Private vs Public cloud service provider 2.Virtual cloud service provider 3.Physical cloud service provider Cloud intruders PRINCIPAL PARTIES IN TE CLOUD

7 Economically feasible to provide trust in a cloud service provider with encryption techniques alone To enhance privacy, investigates trust and trust relationships between the principal parties using 1.Trust-based privacy protection 2.Subjective logic TRUST IN THE CLOUD

8 Level of trust will vary during the lifetime and depends on various factors. Opinion in below two points by a specific client and other clients are considered as trustworthy. 1.Reputation on keeping private data protected 2.Reputation of behaving according to agreement A long term privacy can be protected by monitoring trustworthiness of service providers. TRUST-BASED PRIVACY PROTECTION

9 Anonymization is an approach that can be used to achieve the needed level of privacy protection. To provide privacy protection, user should be able to measure and continually monitor trustworthiness of Anonymizers. Another approach would be to split data into separate parts. ANONYMIZATION

10 SUBJECTIVE LOGIC

11

12 Scope of the privacy is potentially the lifetime of the privacy subject User either select trustworthy service provider Or try to reduce privacy sensitivity of data ie. r π(r) denote privacy sensitivity of r,defined by user Privacy sensitivity of r can be reduced by Encryption Anonymization Splitting data PRIVACY ENHANCED CLOUD SERVICES

13 Cryptographic techniques cannot always provide protection(especially in long term) This research proposed a trust-based privacy protection The approach based on subjective logic. The users have to handle their data to minimize privacy threats in the cloud SUMMARY

14 QUESTIONS

15 Thank You


Download ppt "Introduction Cloud characteristics Security and Privacy aspects Principal parties in the cloud Trust in the cloud 1. Trust-based privacy protection 2.Subjective."

Similar presentations


Ads by Google