Home // CLOUD COMPUTING 2012, The Third International Conference on Cloud Computing, GRIDs, and Virtualization // View article
Controlling Data-Flow in the Cloud
Authors:
Mandy Weißbach
Wolf Zimmermann
Keywords: data-flow; service-level agreement; cloud security
Abstract:
A big obstacle for using cloud services is that users have no control over the locations where their data are stored or processed, respectively. This paper presents a program analysis approach that enables clients to negotiate services with undesired locations. Clients may only use services that guarantee not to use (directly or indirectly) services on undesired locations for processing or storing the clients’ data. In order to increase trust in the answers given by services during the negotiation process, a cryptographic approach similar to Web page certification is proposed. We show that a static dataflow analysis combined with a cryptographic approach ensures that clients' data do not reach undesired locations in the cloud.
Pages: 24 to 29
Copyright: Copyright (c) IARIA, 2012
Publication date: July 22, 2012
Published in: conference
ISSN: 2308-4294
ISBN: 978-1-61208-216-5
Location: Nice, France
Dates: from July 22, 2012 to July 27, 2012