Adopting encryption to protect confidential data in public clouds: A review of solutions, implementation challenges and alternatives
Kronqvist, J., & Lehto, M. (2015). Adopting encryption to protect confidential data in public clouds: A review of solutions, implementation challenges and alternatives. In N. Abouzakhar (Ed.), ECCWS 2015 : Proceedings of the 14th European Conference on Cyber Warfare & Security, University of Hertfordshire, Hatfield, UK, 2-3 July 2015 (pp. 151-158). Academic Conferences and Publishing International Limited. Proceedings of the European conference on cyber warfare and security. http://tinyurl.com/ECCWS2015
Julkaistu sarjassa
Proceedings of the European conference on cyber warfare and securityToimittajat
Päivämäärä
2015Tekijänoikeudet
© 2015 the Authors & Academic Conferences and Publishing International Limited.
A shift towards use of public cloud services is ongoing and more and more enterprises will start to use them
in the near future. As public cloud services certainly promise to deliver many benefits, this new way of
delivering services also introduces new types of risks. Due to the NSA’s surveillance programs, non-US
enterprises need to reassess the risks of public cloud services provided by US companies and look for
available solutions to protect their confidential data transferred and stored in the cloud.
Encryption is seen as a solution to help enterprises full fill the requirements related to security and privacy,
but is often challenging to implement. Encryption has its own security problems, like key management. Some
cloud service providers have also announced that they are improving their security by encrypting all
communications and other information flowing into their data centers.
This paper will explore the common encryption solutions available on the market for enterprises to protect
their confidential data transferred and stored in the cloud. In this paper we will review possible challenges
enterprises may face while implementing these solutions and if these challenges play a role in the decision
to use a public service. We will review also alternatives for data encryption.
...
Julkaisija
Academic Conferences and Publishing International LimitedEmojulkaisun ISBN
978-1-910810-28-6Konferenssi
European conference on information warfare and securityKuuluu julkaisuun
ECCWS 2015 : Proceedings of the 14th European Conference on Cyber Warfare & Security, University of Hertfordshire, Hatfield, UK, 2-3 July 2015ISSN Hae Julkaisufoorumista
2048-8602Asiasanat
Alkuperäislähde
http://academic-conferences.org/eccws/eccws2015/eccws15-proceedings.htmJulkaisu tutkimustietojärjestelmässä
https://converis.jyu.fi/converis/portal/detail/Publication/24782946
Metadata
Näytä kaikki kuvailutiedotKokoelmat
Lisenssi
Samankaltainen aineisto
Näytetään aineistoja, joilla on samankaltainen nimeke tai asiasanat.
-
Honey Encryption : implementation challenges and solutions
Lindholm, Ronja (2019)Most encryption techniques have one essential problem: they are vulnerable to brute-force attacks. In 2014, a new defence mechanism was introduced against brute-force attack and this mechanism was called Honey Encryption. ... -
Detection of distributed denial-of-service attacks in encrypted network traffic
Hyvärinen, Mikko (2016)Tausta: Hajautetut palvelunestohyökkäykset ovat jo kaksi vuosikymmentä vanhoja. Useita strategioita on kehitetty taistelemaan niiden kasvavaa määrää vastaan vuosien varrella. Sovelluskerroksen protokollien hyökkäykset ... -
Effects of PSD2 on security architecture of mobile banking : a review of literature
Kaipainen, Lauri (2017)This thesis aims to find out the changes that the Payment Service Directive (PSD2) will bring to the security architecture of mobile banking. PSD2 will create a situation where security mechanisms are separated from the ... -
Artificial Intelligence in Protecting Smart Building’s Cloud Service Infrastructure from Cyberattacks
Vähäkainu, Petri; Lehto, Martti; Kariluoto, Antti; Ojalainen, Anniina (Springer, 2020)Gathering and utilizing stored data is gaining popularity and has become a crucial component of smart building infrastructure. The data collected can be stored, for example, into private, public, or hybrid cloud service ... -
Challenges in moving to cloud computing environment : case Finnish teleoperator
Buure, Otto (2020)Pilvipohjaisista palveluista on tullut erittäin suosittuja yritysten kesken. Pilvi tuo mukanaan monia hyötyjä ja mahdollisuuksia yrityksille, mutta se tuo myös epävarmuutta ja haasteita datan turvallisuuteen ja yksityisyyteen. ...
Ellei toisin mainittu, julkisesti saatavilla olevia JYX-metatietoja (poislukien tiivistelmät) saa vapaasti uudelleenkäyttää CC0-lisenssillä.