A guide to the SQL standard
Secure and selective dissemination of XML documents
ACM Transactions on Information and System Security (TISSEC)
Identity-Based Encryption from the Weil Pairing
SIAM Journal on Computing
A Privacy-Enhancing e-Business Model Based on Infomediaries
MMM-ACNS '01 Proceedings of the International Workshop on Information Assurance in Computer Networks: Methods, Models, and Architectures for Network Security
Web Privacy with P3p
DEXA '03 Proceedings of the 14th International Workshop on Database and Expert Systems Applications
SOUPS '05 Proceedings of the 2005 symposium on Usable privacy and security
Trusted Computing Platforms: TCPA Technology in Context
Trusted Computing Platforms: TCPA Technology in Context
Obfuscated databases and group privacy
Proceedings of the 12th ACM conference on Computer and communications security
Determining user privacy preferences by asking the right questions: an automated approach
Proceedings of the 2005 ACM workshop on Privacy in the electronic society
User interfaces for privacy agents
ACM Transactions on Computer-Human Interaction (TOCHI)
VLDB '02 Proceedings of the 28th international conference on Very Large Data Bases
Controlling access to published data using cryptography
VLDB '03 Proceedings of the 29th international conference on Very large data bases - Volume 29
MapReduce: simplified data processing on large clusters
Communications of the ACM - 50th anniversary issue: 1958 - 2008
Securing Information Transfer in Distributed Computing Environments
IEEE Security and Privacy
Consistent privacy preferences (CPP): model, semantics, and properties
Proceedings of the 2008 ACM symposium on Applied computing
How to generate and exchange secrets
SFCS '86 Proceedings of the 27th Annual Symposium on Foundations of Computer Science
Trusted virtual platforms: a key enabler for converged client devices
ACM SIGOPS Operating Systems Review
Fully homomorphic encryption using ideal lattices
Proceedings of the forty-first annual ACM symposium on Theory of computing
A "nutrition label" for privacy
Proceedings of the 5th Symposium on Usable Privacy and Security
A client-based privacy manager for cloud computing
Proceedings of the Fourth International ICST Conference on COMmunication System softWAre and middlewaRE
XPref: a preference language for P3P
Computer Networks: The International Journal of Computer and Telecommunications Networking - Web security
P2P reputation management: Probabilistic estimation vs. social networks
Computer Networks: The International Journal of Computer and Telecommunications Networking - Management in peer-to-peer systems
A Privacy Manager for Cloud Computing
CloudCom '09 Proceedings of the 1st International Conference on Cloud Computing
Building Automated Trust Negotiation architecture in virtual computing environment
The Journal of Supercomputing
An adaptive privacy management system for data repositories
TrustBus'05 Proceedings of the Second international conference on Trust, Privacy, and Security in Digital Business
Evaluating 2-DNF formulas on ciphertexts
TCC'05 Proceedings of the Second international conference on Theory of Cryptography
Trusted computing: strengths, weaknesses and further opportunities for enhancing privacy
iTrust'05 Proceedings of the Third international conference on Trust Management
A systemic approach to automate privacy policy enforcement in enterprises
PET'06 Proceedings of the 6th international conference on Privacy Enhancing Technologies
Risk Modeling, Assessment, And Management
IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews
Privacy assurance: bridging the gap between preference and practice
TrustBus'07 Proceedings of the 4th international conference on Trust, Privacy and Security in Digital Business
Privacy management in global organisations
CMS'12 Proceedings of the 13th IFIP TC 6/TC 11 international conference on Communications and Multimedia Security
Creating optimal cloud storage systems
Future Generation Computer Systems
XML privacy protection model based on cloud storage
Computer Standards & Interfaces
Hi-index | 0.00 |
In this paper, we describe a privacy manager for cloud computing that controls policy-based obfuscation and de-obfuscation of personal, sensitive, or confidential data within cloud service provision. By these means, cloud computing users may reduce the risk of their private data being stolen or misused, and in addition assistance may be given to cloud computing providers in helping them conform to privacy law. We describe different possible architectures for such privacy management in cloud computing, give an algebraic description of obfuscation features provided by the privacy manager, and describe how policies may be defined to control such obfuscation. Furthermore, we assess the performance and scalability of this approach and consider mechanisms to enhance usability. Several examples of how the privacy manager might be used are given, including protection of private metadata associated with online photos and of confidential information contained within share portfolios.