Adopting encryption to protect confidential data in public clouds: A review of solutions, implementation challenges and alternatives
Kronqvist, J., & Lehto, M. (2015). Adopting encryption to protect confidential data in public clouds: A review of solutions, implementation challenges and alternatives. In N. Abouzakhar (Ed.), ECCWS 2015 : Proceedings of the 14th European Conference on Cyber Warfare & Security, University of Hertfordshire, Hatfield, UK, 2-3 July 2015 (pp. 151-158). Academic Conferences and Publishing International Limited. Proceedings of the European conference on cyber warfare and security. http://tinyurl.com/ECCWS2015
© 2015 the Authors & Academic Conferences and Publishing International Limited.
A shift towards use of public cloud services is ongoing and more and more enterprises will start to use them in the near future. As public cloud services certainly promise to deliver many benefits, this new way of delivering services also introduces new types of risks. Due to the NSA’s surveillance programs, non-US enterprises need to reassess the risks of public cloud services provided by US companies and look for available solutions to protect their confidential data transferred and stored in the cloud. Encryption is seen as a solution to help enterprises full fill the requirements related to security and privacy, but is often challenging to implement. Encryption has its own security problems, like key management. Some cloud service providers have also announced that they are improving their security by encrypting all communications and other information flowing into their data centers. This paper will explore the common encryption solutions available on the market for enterprises to protect their confidential data transferred and stored in the cloud. In this paper we will review possible challenges enterprises may face while implementing these solutions and if these challenges play a role in the decision to use a public service. We will review also alternatives for data encryption. ...
PublisherAcademic Conferences and Publishing International Limited
Parent publication ISBN
ConferenceEuropean conference on information warfare and security
Is part of publicationECCWS 2015 : Proceedings of the 14th European Conference on Cyber Warfare & Security, University of Hertfordshire, Hatfield, UK, 2-3 July 2015
Publication in research information system
MetadataShow full item record
Showing items with similar title or keywords.
Lindholm, Ronja (2019)Most encryption techniques have one essential problem: they are vulnerable to brute-force attacks. In 2014, a new defence mechanism was introduced against brute-force attack and this mechanism was called Honey Encryption. ...
Hyvärinen, Mikko (2016)Tausta: Hajautetut palvelunestohyökkäykset ovat jo kaksi vuosikymmentä vanhoja. Useita strategioita on kehitetty taistelemaan niiden kasvavaa määrää vastaan vuosien varrella. Sovelluskerroksen protokollien hyökkäykset ...
Artificial Intelligence in Protecting Smart Building’s Cloud Service Infrastructure from Cyberattacks Vähäkainu, Petri; Lehto, Martti; Kariluoto, Antti; Ojalainen, Anniina (Springer, 2020)Gathering and utilizing stored data is gaining popularity and has become a crucial component of smart building infrastructure. The data collected can be stored, for example, into private, public, or hybrid cloud service ...
Buure, Otto (2020)Pilvipohjaisista palveluista on tullut erittäin suosittuja yritysten kesken. Pilvi tuo mukanaan monia hyötyjä ja mahdollisuuksia yrityksille, mutta se tuo myös epävarmuutta ja haasteita datan turvallisuuteen ja yksityisyyteen. ...
Protection Motivation Theory in Information Systems Security Research : A Review of the Past and a Road Map for the Future Haag, Steffi; Siponen, Mikko; Liu, Fufan (ACM, 2021)Protection motivation theory (PMT) is one of the most commonly used theories to examine information security behaviors. Our systematic review of the application of PMT in information systems (IS) security and the comparison ...