Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1109/TrustCom.2012.112guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

Confidentiality as a Service -- Usable Security for the Cloud

Published: 25 June 2012 Publication History

Abstract

There is an increasing number of easy-to-use cloud services to store and share information with others. Facebook, Dropbox, iCloud, Googlemail, Amazon S3, Windows SkyDrive and similar services encourage users to entrust the companies' servers with a large variety of information: from their holiday pictures to corporate documents. However, both private and corporate users commonly fail to take account of possible privacy consequences. Even though there are approaches to provide confidentiality for the users' data in the cloud, these are not widely adopted due to both awareness and usability issues. Therefore, we propose the novel Confidentiality as a Service (CaaS) paradigm to provide usable confidentiality and integrity for the bulk of users, for whom the current security mechanisms are too complex or require too much effort. The CaaS paradigm combines data security with usability by design and integrates effortlessly into available cloud service applications and workflows. We leverage the splitting of trust between the cloud service provider and one or more CaaS providers to improve usability. CaaS focuses on unobtrusive confidentiality by hiding all cryptographic artefacts from the prevalently non-technical users. Data protection is based on symmetric encryption and invisible key-management mechanisms. We present an integration for multiple popular cloud services to demonstrate the seamless applicability of CaaS.

Cited By

View all

Index Terms

  1. Confidentiality as a Service -- Usable Security for the Cloud
    Index terms have been assigned to the content through auto-classification.

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image Guide Proceedings
    TRUSTCOM '12: Proceedings of the 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications
    June 2012
    2049 pages
    ISBN:9780769547459

    Publisher

    IEEE Computer Society

    United States

    Publication History

    Published: 25 June 2012

    Qualifiers

    • Article

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)0
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 15 Oct 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2022)PosterProceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security10.1145/3548606.3563541(3499-3501)Online publication date: 7-Nov-2022
    • (2020)Private Cloud Storage: Client-Side Encryption and Usable Secure Utility FunctionsHCI for Cybersecurity, Privacy and Trust10.1007/978-3-030-50309-3_44(652-670)Online publication date: 19-Jul-2020
    • (2018)Trust modelling for opportunistic cloud servicesInternational Journal of Grid and Utility Computing10.5555/3292801.32928029:4(289-306)Online publication date: 1-Jan-2018
    • (2018)A comparative usability study of key management in secure emailProceedings of the Fourteenth USENIX Conference on Usable Privacy and Security10.5555/3291228.3291258(375-394)Online publication date: 12-Aug-2018
    • (2016)An inconvenient trustProceedings of the Twelfth USENIX Conference on Usable Privacy and Security10.5555/3235895.3235906(113-130)Online publication date: 22-Jun-2016
    • (2016)Expanded cloud plumes hiding Big Data ecosystemFuture Generation Computer Systems10.1016/j.future.2016.01.00359:C(63-92)Online publication date: 1-Jun-2016
    • (2015)Web-based mailing list administration on RMXProceedings of the 17th International Conference on Information Integration and Web-based Applications & Services10.1145/2837185.2837204(1-8)Online publication date: 11-Dec-2015
    • (2015)Web-based Intuitive Management of RMXProceedings of the 19th International Database Engineering & Applications Symposium10.1145/2790755.2790796(216-217)Online publication date: 13-Jul-2015
    • (2015)First step towards preserving the privacy of cloud-based IDS security policiesSecurity and Communication Networks10.1002/sec.12728:18(3481-3491)Online publication date: 1-Dec-2015
    • (2014)ShadowCryptProceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security10.1145/2660267.2660326(1028-1039)Online publication date: 3-Nov-2014
    • Show More Cited By

    View Options

    View options

    Get Access

    Login options

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media