Stage-oe-small.jpg

Inproceedings3425: Unterschied zwischen den Versionen

Aus Aifbportal
Wechseln zu:Navigation, Suche
Zeile 21: Zeile 21:
 
}}
 
}}
 
{{Inproceedings
 
{{Inproceedings
 +
|Referiert=True
 
|Title=Data protection in the Cloud – The MimoSecco approach
 
|Title=Data protection in the Cloud – The MimoSecco approach
|Referiert=True
 
 
|Year=2015
 
|Year=2015
 
|Month=Januar
 
|Month=Januar
|Note=Wird demnächst bei Springer veröffentlicht
+
|Booktitle=Trusted Cloud Computing
 +
|Pages=177-186
 +
|Publisher=Springer
 +
|Address=Heidelberg
 +
|Editor=Helmut Krcmar, Ralf Reussner, Bernhard Rumpe
 
|Referiert=True
 
|Referiert=True
 
|Booktitle=Trusted Cloud Computing
 
|Booktitle=Trusted Cloud Computing

Version vom 7. Januar 2015, 14:21 Uhr


Data protection in the Cloud – The MimoSecco approach


Data protection in the Cloud – The MimoSecco approach



Published: 2015 Januar
Herausgeber: Helmut Krcmar, Ralf Reussner, Bernhard Rumpe
Buchtitel: Trusted Cloud Computing
Seiten: 177-186
Verlag: Springer
Erscheinungsort: Heidelberg

Referierte Veröffentlichung

BibTeX

Kurzfassung
Cloud Computing is a technology with vast impact on IT systems. Costs can be significantly reduced through on-demand purchase of CPU time, memory and storage, offering high flexibility. The main reason to avoid cloud technology still is security. This leads to a lack of trust in cloud services. Most cloud providers secure their systems only against external adversaries by using firewalls and secure connections. Internal adversaries, however, remain a big threat in this scenario. Especially when using mobile devices as clients, usable security with a low performance impact remains a challenge. In this paper, we present concepts for using software as a service with mobile devices while guaranteeing a high level of data protection. MimoSecco uses an innovative encryption scheme and hard-to-clone secure hardware to guarantee data protection. Top secret data is encrypted directly, processible confidential data is encrypted and fragmented by the database proxy and transferred to different servers. Context-based access control makes the misuse of mobile devices for unauthorized data access difficult. These set of measures raises the privacy level of cloud computing significantly.

Download: Media:TrustedCloudWorkshop MimoSecco DataProtectionInTheCloud Manuskript AIFB Web.pdf

Projekt

MimoSecco



Forschungsgruppe

Betriebliche Informationssysteme


Forschungsgebiet