Secure Information Systems in the Age of Cloud Computing

RODRIGUES, Marcos (2016). Secure Information Systems in the Age of Cloud Computing. In: PAPANIKOS, Gregory T., (ed.) Library and Information Science Abstracts 3rd annual international conference on Library and Information Science. Athens, Athens Institute for Education and Research, 26-27.

[img]
Preview
PDF
Abstract.pdf - Accepted Version
Creative Commons Public Domain Dedication.

Download (43kB) | Preview
[img] PDF (Acceptance letter)
Rodrigues 12175.pdf - Supplemental Material
Restricted to Repository staff only

Download (143kB)
Official URL: http://www.atiner.gr/library
Related URLs:

Abstract

Recent revelations by Edward Snowden speak volumes about the need to protect sensitive data to comply with privacy regulations worldwide. The Cloud Computing paradigm in which servers, storage and applications are delivered to an organization’s computers and devices through the Internet is here to stay. The benefits of this mode is that it enables data centres to be accessed and shared as virtual resources in a secure and scalable manner. For businesses, this is a very attractive model as services can expand or shrink as needs change. For information systems stored in the cloud to comply with EU data protection and privacy regulations, both the stored data and the connection between provider and customer need to be adequately protected against all known security risks. Recent reports indicate that 82% of cloud providers encrypt data in transit, protecting against man-in-the-middle attacks as data are transmitted. However, only 9.4% of cloud providers encrypt data once stored in the cloud, for file sharing convenience. This is a serious issue leaving the cloud vulnerable to data breaches and unauthorized access. In this paper, we will review security threats to cloud computing and present a solution based on our unique patented compression-encryption method. We focus on threat prevention through cryptographic methods that, when properly implemented, are virtually impossible to break directly. Our solution compresses data in a unique way tackling security, performance, data protection, privacy and cost issues. A unique, data-dependent symmetric key is generated as a side effect to the compression method. Without the key, the data cannot be decompressed. It is also important to realise that not all data in the cloud need to be encrypted, and not all data should be encrypted in the same way. For instance, images and video may be encrypted by a lossy method while text and other documents need to be lossless. Our algorithms cover both lossless and lossy requirements giving the user full control over what and where it is compressed-encrypted, either at the local machine or in the cloud. We highlight the benefits of the solution concerning less bandwidth requirements, faster data transmission and response times, less storage space, and less energy consumption. Finally, we consider that data protection and privacy legislations are not similar across the globe. It is demonstrated that our solution addresses security and privacy concerns according to current European legislation on data protection whether the servers are located or not in the EU.

Item Type: Book Section
Additional Information: Conference held 25-28 July 2016, Athens, Greece.
Research Institute, Centre or Group - Does NOT include content added after October 2018: Cultural Communication and Computing Research Institute > Communication and Computing Research Centre
Page Range: 26-27
Depositing User: Marcos Rodrigues
Date Deposited: 09 May 2016 11:17
Last Modified: 18 Mar 2021 00:25
URI: https://shura.shu.ac.uk/id/eprint/12175

Actions (login required)

View Item View Item

Downloads

Downloads per month over past year

View more statistics