{"title":"CloudMonitor:数据流过滤即服务","authors":"F. Alqahtani, Frederick T. Sheldon","doi":"10.1109/CSCI49370.2019.00271","DOIUrl":null,"url":null,"abstract":"The primary concern of cloud service consuming organizations is the kind of control that they may have over their data. Companies are legally required to monitor a subset of the data that is crucial both to their business and customers. Conversely, the cloud service providers are not showing commitment towards securely handling enterprise data, and this may put sensitive data at risk. Hence, consumers are expected to maintain control over their sensitive data both at their local infrastructure and in the cloud. To achieve this, companies are practicing methods that would typically block access to cloud service that stores sensitive data at the network level. However, such restrictions may limit employee performance, and at the same time may not combat the malicious activities of bad employees. In this paper, we propose a model that allows consumers and providers the ability to transparently track the data in the cloud environment. The model allows consumers to have control over their data and conduct an audit to the treatment of their data by third-party services, while employees are allowed to use the cloud service.","PeriodicalId":103662,"journal":{"name":"2019 International Conference on Computational Science and Computational Intelligence (CSCI)","volume":"100 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"CloudMonitor: Data Flow Filtering as a Service\",\"authors\":\"F. Alqahtani, Frederick T. Sheldon\",\"doi\":\"10.1109/CSCI49370.2019.00271\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The primary concern of cloud service consuming organizations is the kind of control that they may have over their data. Companies are legally required to monitor a subset of the data that is crucial both to their business and customers. Conversely, the cloud service providers are not showing commitment towards securely handling enterprise data, and this may put sensitive data at risk. Hence, consumers are expected to maintain control over their sensitive data both at their local infrastructure and in the cloud. To achieve this, companies are practicing methods that would typically block access to cloud service that stores sensitive data at the network level. However, such restrictions may limit employee performance, and at the same time may not combat the malicious activities of bad employees. In this paper, we propose a model that allows consumers and providers the ability to transparently track the data in the cloud environment. The model allows consumers to have control over their data and conduct an audit to the treatment of their data by third-party services, while employees are allowed to use the cloud service.\",\"PeriodicalId\":103662,\"journal\":{\"name\":\"2019 International Conference on Computational Science and Computational Intelligence (CSCI)\",\"volume\":\"100 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2019-12-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2019 International Conference on Computational Science and Computational Intelligence (CSCI)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CSCI49370.2019.00271\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 International Conference on Computational Science and Computational Intelligence (CSCI)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CSCI49370.2019.00271","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
The primary concern of cloud service consuming organizations is the kind of control that they may have over their data. Companies are legally required to monitor a subset of the data that is crucial both to their business and customers. Conversely, the cloud service providers are not showing commitment towards securely handling enterprise data, and this may put sensitive data at risk. Hence, consumers are expected to maintain control over their sensitive data both at their local infrastructure and in the cloud. To achieve this, companies are practicing methods that would typically block access to cloud service that stores sensitive data at the network level. However, such restrictions may limit employee performance, and at the same time may not combat the malicious activities of bad employees. In this paper, we propose a model that allows consumers and providers the ability to transparently track the data in the cloud environment. The model allows consumers to have control over their data and conduct an audit to the treatment of their data by third-party services, while employees are allowed to use the cloud service.