Verifying cloud services: present and future

S Bouchenak, G Chockler, H Chockler… - ACM SIGOPS operating …, 2013 - dl.acm.org
As cloud-based services gain popularity in both private and enterprise domains, cloud
consumers are still lacking in tools to verify that these services work as expected. Such tools …

Data computation in a multi-domain cloud environment

R Jain, V Levy, U Mattsson, Y Rozenberg - US Patent 9,973,475, 2018 - Google Patents
A gateway device for implementing data security is described herein. The gateway device is
coupled between a client device and a server device, and is configured to receive encoded …

Secure the cloud: From the perspective of a service-oriented organization

A Roy, S Sarkar, R Ganesan, G Goel - ACM Computing Surveys (CSUR), 2015 - dl.acm.org
In response to the revival of virtualized technology by Rosenblum and Garfinkel [2005], NIST
defined cloud computing, a new paradigm in service computing infrastructures. In cloud …

Offering security diagnosis as a service for cloud SaaS applications

M Elsayed, M Zulkernine - Journal of information security and applications, 2019 - Elsevier
With the maturity of service-oriented architecture (SOA), microservices architecture, and Web
technologies, web services have become critical components of Software as a Service …

Assured deletion in the cloud: requirements, challenges and future directions

KM Ramokapane, A Rashid, JM Such - Proceedings of the 2016 ACM on …, 2016 - dl.acm.org
Inadvertent exposure of sensitive data is a major concern for potential cloud customers.
Much focus has been on other data leakage vectors, such as side channel attacks, while …

Data usage control for distributed systems

F Kelbert, A Pretschner - ACM Transactions on Privacy and Security …, 2018 - dl.acm.org
Data usage control enables data owners to enforce policies over how their data may be
used after they have been released and accessed. We address distributed aspects of this …

PivotWall: SDN-based information flow control

TJ OConnor, W Enck, WM Petullo… - Proceedings of the …, 2018 - dl.acm.org
Advanced Persistent Threats (APTs) commonly use step** stone attacks that allow the
adversary to move laterally undetected within an enterprise network towards a target …

End-to-end privacy policy enforcement in cloud infrastructure

S Betge-Brezetz, GB Kamga… - 2013 IEEE 2nd …, 2013 - ieeexplore.ieee.org
Privacy in the cloud is still a strong issue for the large adoption of cloud technologies by
enterprises which fear to actually put their sensitive data in the cloud. There is indeed a …

Complying with data handling requirements in cloud storage systems

M Henze, R Matzutt, J Hiller, E Mühmer… - … on Cloud Computing, 2020 - ieeexplore.ieee.org
In past years, cloud storage systems saw an enormous rise in usage. However, despite their
popularity and importance as underlying infrastructure for more complex cloud services …

Cloud Security Using Fine-Grained Efficient Information Flow Tracking

F Alqahtani, M Almutairi, FT Sheldon - Future Internet, 2024 - mdpi.com
This study provides a comprehensive review and comparative analysis of existing
Information Flow Tracking (IFT) tools which underscores the imperative for mitigating data …