Loading presentation...

Present Remotely

Send the link below via email or IM


Present to your audience

Start remote presentation

  • Invited audience members will follow you as you navigate and present
  • People invited to a presentation do not need a Prezi account
  • This link expires 10 minutes after you close the presentation
  • A maximum of 30 users can follow your presentation
  • Learn more about this feature in our knowledge base article

Do you really want to delete this prezi?

Neither you, nor the coeditors you shared it with will be able to recover it again.



No description

tanish tanish

on 23 April 2010

Comments (0)

Please log in to add your comment.

Report abuse

Transcript of control

Controlling data in cloud bootstrapping reviewed the work in security engineering group of chair.
finding synergy, resuse work effort

Enterprise concerns One concern which eventually compromises the vision of cloud computing is.. lack of control Analogy business data outsourcing social networking data outsourcing architectures service level agreements

access control Service Level Agreements Outsourcing Relationship Management
security ?

Protection level
agreement Access Control proxy based re-encryption

what about continuous control ? cloud-wide reference monitor
usage control Social Networking social websites turning into platforms
users first implictly trust the platform
and then trust third party applications
cloud vendors like this idea Google App Engine SalesForce Information flow - challenges in designing
control techniques for
cloud platforms Confinement Mediation Programmability Future work redesign control techniques usage control encryption or obfuscation (data tainting) cloud wide reference monitor ? Karabulut, Y., Kerschbaum, F., Massacci, F., Robinson, P., and Yautsiukhin, A. 2007. Security and Trust in IT Business Outsourcing: a Manifesto
Wang, W., Li, Z., Owens, R., and Bhargava, B. 2009. Secure and efficient access to outsourced data. Chow, R., Golle, P., Jakobsson, M., Shi, E., Staddon, J., Masuoka, R., and Molina, J. 2009. Controlling data in the cloud: outsourcing computation without outsourcing control
Full transcript