Enabling enterprise-scale systems using cloud-based personal media

Personal cloud services are emerging as a disruptive technology for tools and services that use digital media assets. As the shift to a bring-your-own-device and app workplace becomes commonplace, the opportunity exists to leverage these personal services to create enterprise scale approaches. However, a key limiting feature is the ability to provide private and secure assets, whether they are photos, videos, audio and text in a unified way layered on top of personal cloud services. We discuss an approach to support this shift and illustrate its feasibility using a prototype secure email service that is layered on top of a popular unsecured cloud service. One of the primary benefits of our approach is that companies can create secure enterprise services on top of a third party cloud used by individuals alleviating the need for a complex IT infrastructure for digital media assets. These solutions are particularly relevant for emerging markets.

[1]  Rob Miller,et al.  Johnny 2: a user test of key continuity management with S/MIME and Outlook Express , 2005, SOUPS '05.

[2]  Paul Dourish,et al.  Security in the wild: user strategies for managing security as an everyday, practical problem , 2004, Personal and Ubiquitous Computing.

[3]  Sidney S. Fels,et al.  Lessons from ICT design of a healthcare worker-centered system for a chronic mental care hospital , 2014, CHI Extended Abstracts.

[4]  Enrique Castro-Leon Consumerization in the IT Service Ecosystem , 2014, IT Professional.

[5]  Matthew Smith,et al.  Helping Johnny 2.0 to encrypt his Facebook conversations , 2012, SOUPS.

[6]  Uwe Röhm,et al.  User Awareness and Policy Compliance of Data Privacy in Cloud Computing , 2013, AWC.

[7]  白石 善明,et al.  "Confused Johnny: When Automatic Encryption Leads to Confusion and Mistakes"の紹介 , 2013 .

[8]  Dawn Xiaodong Song,et al.  Practical techniques for searches on encrypted data , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.

[9]  J. Doug Tygar,et al.  Why Johnny Can't Encrypt: A Usability Evaluation of PGP 5.0 , 1999, USENIX Security Symposium.

[10]  Leire Orue-Echevarria Arrieta From Software as a good to software as a service: Preparing the evolution of software products into the cloud , 2012, 2012 IEEE 6th International Workshop on the Maintenance and Evolution of Service-Oriented and Cloud-Based Systems (MESOCA).

[11]  Sidney S. Fels,et al.  Seamless And Always-on Security in a Bring-Your-Own-Application World , 2015, CHI Extended Abstracts.