Protecting personal information in cloud computing

Miranda Mowbray*, Siani Pearson

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

3 Citations (Scopus)

Abstract

This paper gives an overview of issues in privacy protection of personal information in the cloud, and describes a variety of approaches that may be used to address these issues. Some of these approaches are available for use now; others are relatively immature, but look promising. The most appropriate approach varies according to the type of data to be processed or application to be run in the cloud.

Original languageEnglish
Title of host publicationOn the Move to Meaningful Internet Systems, OTM 2012 - Confederated International Conferences
Subtitle of host publicationCoopIS, DOA-SVI, and ODBASE 2012, Proceedings
Pages475-491
Number of pages17
Volume7566 LNCS
EditionPART 2
DOIs
Publication statusPublished - 2012
EventConfederated International Conferences on On the Move to Meaningful Internet Systems, OTM 2012: CoopIS, DOA-SVI, and ODBASE 2012 - Rome, Italy
Duration: 10 Sep 201214 Sep 2012

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
NumberPART 2
Volume7566 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

ConferenceConfederated International Conferences on On the Move to Meaningful Internet Systems, OTM 2012: CoopIS, DOA-SVI, and ODBASE 2012
CountryItaly
CityRome
Period10/09/1214/09/12

Keywords

  • cloud computing
  • encryption
  • hybrid cloud
  • privacy
  • security
  • technology
  • trusted computing
  • virtual private cloud

Fingerprint Dive into the research topics of 'Protecting personal information in cloud computing'. Together they form a unique fingerprint.

Cite this