Preventing Data Leakage in a Cloud Environment

Release Date:2014-01-13 Author:Fuzhi Cang, Mingxing Zhang, Yongwei Wu, and Weimin Zheng Click:

[Abstract] Despite the multifaceted advantages of cloud computing, concerns about data leakage or abuse impedes its adoption for security-sensitive tasks. Recent investigations have revealed that the risk of unauthorized data access is one of the biggest concerns of users of cloud-based services. Transparency and accountability for data managed in the cloud is necessary. Specifically, when using a cloud-host service, a user typically has to trust both the cloud service provider and cloud infrastructure provider to properly handling private data. This is a multi-party system. Three particular trust models can be used according to the credibility of these providers. This paper describes techniques for preventing data leakage that can be used with these different models.

[Keywords] cloud computing; data leakage; data tracking; data provenance; homomorphic encryption