Probst, C.W. and Sasse, A.M. and Pieters, W. and Dimkov, T. and Luysterborg, E. and Arnaud, M.
Privacy penetration testing -- how to establish trust in your cloud provider.
European Data Protection: In Good Health?
International, Foreign and Comparative Law XVIII.
Springer, London, .
Full text available as:
PDF - Univ. of Twente only
Official URL: http://dx.doi.org/10.1007/978-94-007-2903-2_12
In the age of cloud computing, IT infrastructure becomes virtualised and takes
the form of services. This virtualisation results in an increasing de-perimeterisation,
where the location of data and computation is irrelevant from a user’s
point of view. This irrelevance means that private and institutional users no
longer have a concept of where their data is stored, and whether they can trust
in cloud providers to protect their data. In this chapter we investigate methods
for increasing customers’ trust into cloud providers, and suggest a public penetration-
testing agency as an essential component in a trustworthy cloud infrastructure.
|Item Type:||Book Section|
|Research Group:||EWI-DIES: Distributed and Embedded Security, EWI-IS: Information Systems|
|Research Program:||CTIT-ISTRICE: Integrated Security and Privacy in a Networked World, UT-CST: Crime Science Twente|
|Research Project:||VISPER: The VIrtual Security PERimeter for digital, physical, and organisational security|
|Uncontrolled Keywords:||Cloud computing, privacy, trust, penetration testing, socio-technical system modelling|
|Deposited On:||15 February 2012|
Export this item as:
To request a copy of the PDF please email us request copy
To correct this item please ask your editor
Repository Staff Only: edit this item