Policing as a Service in the Cloud

Security and Privacy are fundamental concerns in cloud computing both in terms of legal complications and user trust. Cloud computing is a new computing paradigm, aiming to provide reliable, customized, and guaranteed computing dynamic environment for end-users. However, the existing security and privacy issues in the cloud still present a strong barrier for users to adopt cloud computing solutions. This paper investigates the security and privacy challenges in cloud computing in order to explore methods that improve the users' trust in the adaptation of the cloud. Policing As A Service can be offered by the cloud providers with the intention of empowering the users to monitor and guard their assets in the cloud. This service is beneficial both to the cloud providers and the users. However, at first, the cloud providers may only be able to offer basic auditing services due to undeveloped tools and applications. Similar to other services delivered in the cloud, this service can be purchased by the users to gain some control over their data. The sub services of the proposed service can be Privacy As A Service and Forensics As A Service. These services give the cloud users a sense of transparency and having control over their data in the cloud while better security and privacy safeguards are sought.

[1]  Paula T. Kaufman,et al.  The USA PATRIOT Act. , 2002 .

[2]  Steven Hand,et al.  Improving Xen security through disaggregation , 2008, VEE '08.

[3]  Siani Pearson,et al.  Taking account of privacy when designing cloud computing services , 2009, 2009 ICSE Workshop on Software Engineering Challenges of Cloud Computing.

[4]  Kai Hwang,et al.  Cloud Security with Virtualized Defense and Reputation-Based Trust Mangement , 2009, 2009 Eighth IEEE International Conference on Dependable, Autonomic and Secure Computing.

[5]  Borja Sotomayor,et al.  Virtual Infrastructure Management in Private and Hybrid Clouds , 2009, IEEE Internet Computing.

[6]  Markus Jakobsson,et al.  Controlling data in the cloud: outsourcing computation without outsourcing control , 2009, CCSW '09.

[7]  Idit Keidar,et al.  Trusting the cloud , 2009, SIGA.

[8]  D Jayalatchumy,et al.  Preserving Privacy through Data Control in a Cloud Computing Architecture Using Discretion Algorithm , 2010, 2010 3rd International Conference on Emerging Trends in Engineering and Technology.

[9]  Vikas Ranganathan,et al.  Privacy Issues with Cloud Applications , 2010 .

[10]  Kai Hwang,et al.  Trusted Cloud Computing with Secure Resources and Data Coloring , 2010, IEEE Internet Computing.

[11]  Dan Feng,et al.  SafeVanish: An Improved Data Self-Destruction for Protecting Data Privacy , 2010, 2010 IEEE Second International Conference on Cloud Computing Technology and Science.

[12]  Carla Merkle Westphall,et al.  Intrusion Detection for Grid and Cloud Computing , 2010, IT Professional.

[13]  Adrian Perrig,et al.  TrustVisor: Efficient TCB Reduction and Attestation , 2010, 2010 IEEE Symposium on Security and Privacy.

[14]  Andrew Charlesworth,et al.  A Privacy Impact Assessment Tool for Cloud Computing , 2010, 2010 IEEE Second International Conference on Cloud Computing Technology and Science.

[15]  Igor Nai Fovino-Head Evolution of Cyber Security and Cyber Threats with focus on Cloud Computing , 2011 .

[16]  Miguel Correia,et al.  The Final Frontier: Confidentiality and Privacy in the Cloud , 2011, Computer.

[17]  Kevin Curran,et al.  Cloud Computing Security , 2011, Int. J. Ambient Comput. Intell..

[18]  Cong Wang,et al.  Toward Secure and Dependable Storage Services in Cloud Computing , 2012, IEEE Transactions on Services Computing.

[19]  Hong Zhao,et al.  Data Security and Privacy Protection Issues in Cloud Computing , 2012, 2012 International Conference on Computer Science and Electronics Engineering.

[20]  Nahid Shahmehri,et al.  Privacy, Security and Trust in Cloud Computing: The Perspective of the Telecommunication Industry , 2012, 2012 9th International Conference on Ubiquitous Intelligence and Computing and 9th International Conference on Autonomic and Trusted Computing.

[21]  Tim Storer,et al.  Calm Before the Storm: The Challenges of Cloud Computing in Digital Forensics , 2014, Int. J. Digit. Crime Forensics.

[22]  Shahrzad Zargari,et al.  Cloud Forensics: Concepts, Issues, and Challenges , 2012, 2012 Third International Conference on Emerging Intelligent Data and Web Technologies.

[23]  Mohamed Hamdi Security of cloud computing, storage, and networking , 2012, 2012 International Conference on Collaboration Technologies and Systems (CTS).

[24]  N. van Eijk,et al.  Cloud Computing in Higher Education and Research Institutions and the USA Patriot Act , 2012 .

[25]  Peng Zhang,et al.  Public Data Integrity Verification for Secure Cloud Storage , 2013, J. Networks.

[26]  Mark Ryan,et al.  Cloud computing security: The scientific challenge, and a survey of solutions , 2013, J. Syst. Softw..

[27]  P. Parthasarathi,et al.  Enhanced audit services for the correctness of outsourced data in cloud storage , 2013 .

[28]  P. N. B. S. Srinivas,et al.  Secure Data transfer in Cloud Storage Systems using Dynamic Tokens , 2013 .

[29]  S. K. Dubey,et al.  Security and Privacy in Cloud Computing: A Survey , 2013 .

[30]  Miguel Correia,et al.  DepSky: Dependable and Secure Storage in a Cloud-of-Clouds , 2013, TOS.

[31]  James M Lutz,et al.  USA Patriot Act , 2014 .