dc.contributor.author | Kronqvist, Jyrki | |
dc.contributor.author | Lehto, Martti | |
dc.contributor.editor | Abouzakhar, Nasser | |
dc.date.accessioned | 2015-07-24T11:32:49Z | |
dc.date.available | 2015-07-24T11:32:49Z | |
dc.date.issued | 2015 | |
dc.identifier.citation | Kronqvist, J., & Lehto, M. (2015). Adopting encryption to protect confidential data in public clouds: A review of solutions, implementation challenges and alternatives. In N. Abouzakhar (Ed.), <i>ECCWS 2015 : Proceedings of the 14th European Conference on Cyber Warfare & Security, University of Hertfordshire, Hatfield, UK, 2-3 July 2015</i> (pp. 151-158). Academic Conferences and Publishing International Limited. Proceedings of the European conference on cyber warfare and security. <a href="http://tinyurl.com/ECCWS2015" target="_blank">http://tinyurl.com/ECCWS2015</a> | |
dc.identifier.other | CONVID_24782946 | |
dc.identifier.uri | https://jyx.jyu.fi/handle/123456789/46542 | |
dc.description.abstract | A shift towards use of public cloud services is ongoing and more and more enterprises will start to use them
in the near future. As public cloud services certainly promise to deliver many benefits, this new way of
delivering services also introduces new types of risks. Due to the NSA’s surveillance programs, non-US
enterprises need to reassess the risks of public cloud services provided by US companies and look for
available solutions to protect their confidential data transferred and stored in the cloud.
Encryption is seen as a solution to help enterprises full fill the requirements related to security and privacy,
but is often challenging to implement. Encryption has its own security problems, like key management. Some
cloud service providers have also announced that they are improving their security by encrypting all
communications and other information flowing into their data centers.
This paper will explore the common encryption solutions available on the market for enterprises to protect
their confidential data transferred and stored in the cloud. In this paper we will review possible challenges
enterprises may face while implementing these solutions and if these challenges play a role in the decision
to use a public service. We will review also alternatives for data encryption. | fi |
dc.format.extent | 450 | |
dc.language.iso | eng | |
dc.publisher | Academic Conferences and Publishing International Limited | |
dc.relation.ispartof | ECCWS 2015 : Proceedings of the 14th European Conference on Cyber Warfare & Security, University of Hertfordshire, Hatfield, UK, 2-3 July 2015 | |
dc.relation.ispartofseries | Proceedings of the European conference on cyber warfare and security | |
dc.relation.uri | http://academic-conferences.org/eccws/eccws2015/eccws15-proceedings.htm | |
dc.rights | In Copyright | |
dc.subject.other | cyber espionage | |
dc.subject.other | data encryption | |
dc.subject.other | trustworthy | |
dc.subject.other | confidential data | |
dc.subject.other | public clouds | |
dc.title | Adopting encryption to protect confidential data in public clouds: A review of solutions, implementation challenges and alternatives | |
dc.type | conference paper | |
dc.identifier.urn | URN:NBN:fi:jyu-201507092559 | |
dc.contributor.laitos | Tietotekniikan laitos | fi |
dc.contributor.laitos | Department of Mathematical Information Technology | en |
dc.contributor.oppiaine | Tietotekniikka | fi |
dc.contributor.oppiaine | Mathematical Information Technology | en |
dc.type.uri | http://purl.org/eprint/type/ConferencePaper | |
dc.date.updated | 2015-07-09T06:15:05Z | |
dc.relation.isbn | 978-1-910810-28-6 | |
dc.type.coar | http://purl.org/coar/resource_type/c_5794 | |
dc.description.reviewstatus | peerReviewed | |
dc.format.pagerange | 151-158 | |
dc.relation.issn | 2048-8602 | |
dc.type.version | acceptedVersion | |
dc.rights.copyright | © 2015 the Authors & Academic Conferences and Publishing International Limited. | |
dc.rights.accesslevel | openAccess | |
dc.type.publication | conferenceObject | |
dc.relation.conference | European conference on information warfare and security | |
dc.subject.yso | salaus | |
dc.subject.yso | tietoturva | |
dc.subject.yso | pilvipalvelut | |
dc.subject.yso | luottamuksellisuus | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p5475 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p5479 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p24167 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p24493 | |
dc.rights.url | https://rightsstatements.org/page/InC/1.0/ | |
dc.type.okm | A4 | |