Centonze, 2019 - Google Patents
Cloud auditing and complianceCentonze, 2019
- Document ID
- 12750582063888616904
- Author
- Centonze P
- Publication year
- Publication venue
- Security, Privacy, and Digital Forensics in the Cloud
External Links
Snippet
Information Technology (IT) services and infrastructures significantly depend on auditing in order to reduce security, privacy, trust and forensics issues. Auditing is even more vital and complex in cloud computing environments due to non‐transparent architectures, multi …
- 238000000034 method 0 abstract description 40
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6254—Protecting personal data, e.g. for financial or medical purposes by anonymising data, e.g. decorrelating personal data from the owner's identification
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Gonzalez et al. | A quantitative analysis of current security concerns and solutions for cloud computing | |
Jouini et al. | A security framework for secure cloud computing environments | |
Jansen et al. | Guidelines on security and privacy in public cloud computing | |
Pearson | Privacy, security and trust in cloud computing | |
Pearson et al. | Privacy, security and trust issues arising from cloud computing | |
Khan et al. | Security risks and their management in cloud computing | |
Jansen et al. | Sp 800-144. guidelines on security and privacy in public cloud computing | |
Shakir et al. | Literature review of security issues in saas for public cloud computing: a meta-analysis | |
Soares et al. | Cloud security: state of the art | |
Jouini et al. | Surveying and analyzing security problems in cloud computing environments | |
Lou et al. | Cybersecurity threats, vulnerability and analysis in safety critical industrial control system (ICS) | |
Weil | Taking compliance to the cloud—Using ISO standards (tools and techniques) | |
Malomo et al. | A survey on recent advances in cloud computing security | |
Alouane et al. | Security, privacy and trust in cloud computing: A comparative study | |
Alani | Security threats in cloud computing | |
Shibli et al. | Access control as a service in cloud: challenges, impact and strategies | |
Hayat et al. | Securing the Cloud Infrastructure: Investigating Multi-tenancy Challenges, Modern Solutions and Future Research Opportunities | |
Centonze | Cloud auditing and compliance | |
Binu et al. | A survey of traditional and cloud specific security issues | |
Chaturvedi et al. | Zero Trust Security Architecture for Digital Privacy in Healthcare | |
Sailakshmi | Analysis of Cloud Security Controls in AWS, Azure, and Google Cloud | |
Yadav et al. | A Comprehensive Survey of IoT-Based Cloud Computing Cyber Security | |
Kavakli et al. | Privacy as an integral part of the implementation of cloud solutions | |
Salehi et al. | Cloud computing security challenges and its potential solution | |
Rübsamen et al. | Security and privacy preservation of evidence in cloud accountability audits |