Chair of Mobile Business & Multilateral Security

 

Basic Information
Type of Lecture: Lecture
Course: Bachelor
Hours/Week: 2
Credit Points: 6/8
Language: German
Term: Winter 2023/2024
Lecturers:
Email:
sThis email address is being protected from spambots. You need JavaScript enabled to view it.

 

Module Description

Cloud storage services are extremely popular, both among companies and private users. However, the fact that with such services data is stored, transmitted and processed outside of the premises of the user, often raises concerns about data security, in terms of privacy, confidentiality, integrity, and availability.

There is an increasing tendency among the users (private or company) to find out more about their data are treated and preserve their privacy.

To help them to determine this, and cover these concerns, privacy metrics should be identified. Identifying these metrics and concerns could lead to a methodology to evaluate the data privacy regarding the user perspective on cloud services.

Corresponding evaluating and ranking algorithms could turn the public view on service providers and change the business plan.

The objective of this seminar is to perform an extensive analysis of the state of the art in which privacy concerns and threats, and the implementation of counter-measures will be identified and analysed.

Literature

  • Parikh, Shalin, Dharmin D., Reema P., and Nishant D. (2019). Security and Privacy Issues in Cloud, Fog and Edge Computing. Procedia Computer Science (pp. 734-739)
  • Niknia, A., Correia, M., Karimpour, J. (2021, June). Secure cloud-of-clouds storage with space-efficient secret sharing. Journal of Information Security and Applications. (59)
  • Information technology — Security techniques — Guidelines for privacy impact assessment. ISO/IEC 29134. Edition 2017
  • Cloud Control Matrix (CCM). (2021), Cloud Security Alliance. https://cloudsecurityalliance.org/research/cloud-controls-matrix/
  • Ezhilarasan, E., and M. Dinakaran. (2021, April). Privacy preserving and data transpiration in multiple cloud using secure and robust data access management algorithm. Journal of Microprocessors and Microsystems. (82)
  • P. Mell, and T. Grance. 800-145. National Institute of Standards and Technology (NIST), Gaithersburg, MD, (September 2011)
  • Wagner and D. Eckhoff, ‘‘Technical privacy metrics: A systematic survey,’’ ACM Comput. Surv., vol. 51, no. 3, pp. 1–38, Jun. 2018, doi: 10.1145/3168389.
  • SILVA P., MONTEIRO E., and SIMÕES P. (2021). Privacy in the Cloud: A Survey of Existing Solutions and Research Challenges, (IEE Access, 2021, pp. 10473-10497