{"id":1310,"date":"2016-09-08T08:18:09","date_gmt":"2016-09-08T08:18:09","guid":{"rendered":"https:\/\/prismacloud.eu\/?p=1310"},"modified":"2017-08-02T08:34:56","modified_gmt":"2017-08-02T08:34:56","slug":"selected-cloud-security-patterns-to-improve-end-user-security-and-privacy-in-public-clouds","status":"publish","type":"post","link":"https:\/\/prismacloud.eu\/selected-cloud-security-patterns-to-improve-end-user-security-and-privacy-in-public-clouds\/","title":{"rendered":"Selected Cloud Security Patterns to Improve End User Security and Privacy in Public Clouds"},"content":{"rendered":"<p><strong>Title<\/strong><\/p>\n<p>Selected Cloud Security Patterns to Improve End User Security and Privacy in Public Clouds<\/p>\n<p><strong>Authors<\/strong><\/p>\n<p>Thomas L\u00e4nger (University of Lausanne),\u00a0Henrich C. P\u00f6hls (Institute of IT-Security and Security Law, University of Passau), Solange\u00a0Ghernaouti\u00a0(University of Lausanne)<\/p>\n<p><strong>Abstract<\/strong><\/p>\n<p style=\"text-align: justify;\">Cloud computing has the potential to dramatically reduce the cost and complexity of provisioning information technology resources for end users. However, to make it secure and privacy-preserving for end users, additional technical safeguards must be added\u2014the application of strong cryptography is such a safeguard. The Horizon 2020 project PRISMACLOUD surveys and advances several cryptographic protocols and primitives usable to cryptographically address common cloud security and privacy issues. The cryptographic functionality will entirely be encapsulated in five configurable tools, from which cloud services providing end-to-end security can be constructed. This approach relieves cloud service designers from dealing with the complex and error prone correct application of cryptographic functionality and shall spark the emergence of a multitude of privacy and security preserving cloud applications for the benefit of the end-users\u2014who will no longer have to rely on contractual and legal instruments for ensuring, that privacy and security is enforced by cloud providers on their behalf. In order to support the privacy-by-design development of the tools, we developed several cloud security patterns for common critical situations in the cloud\u2014in the three fields of data storage in the cloud, user privacy protection and data minimisation, and authentication of stored and processed data.<\/p>\n<p><strong>Venue<\/strong><\/p>\n<p>4th Annual Privacy Forum APF 2016<\/p>\n<p><strong>Place and Date<\/strong><\/p>\n<p>Frankfurt, Germany, September 7-8, 2016<\/p>\n<p><strong>Publication Reference<\/strong><\/p>\n<p>L\u00e4nger, T., P\u00f6hls, H. C., Ghernaouti, S: \"Selected Cloud Security Patterns to Improve End User Security and Privacy in Public Clouds\"; in:\u00a0Privacy Technologies and Policy, Proceedings of the 4th Annual Privacy Forum APF 2016, Springer LNCS, ISBN 978-3-319-44759-9<\/p>\n<p>[<a href=\"http:\/\/henrich.poehls.com\/papers\/2016_LaengerPoehlsGhernaouti_SecurityPatternsForClouds_ENISA-APF.pdf\">Download<\/a>]<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>L\u00e4nger, T., P\u00f6hls, H. C., Ghernaouti, S: \"Selected Cloud Security Patterns to Improve End User Security and Privacy in Public Clouds\"; in: Privacy Technologies and Policy, Proceedings of the 4th Annual Privacy Forum APF 2016, Springer LNCS, ISBN 978-3-319-44759-9<\/p>\n","protected":false},"author":2,"featured_media":326,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[7,8],"tags":[],"_links":{"self":[{"href":"https:\/\/prismacloud.eu\/wp-json\/wp\/v2\/posts\/1310"}],"collection":[{"href":"https:\/\/prismacloud.eu\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/prismacloud.eu\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/prismacloud.eu\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/prismacloud.eu\/wp-json\/wp\/v2\/comments?post=1310"}],"version-history":[{"count":6,"href":"https:\/\/prismacloud.eu\/wp-json\/wp\/v2\/posts\/1310\/revisions"}],"predecessor-version":[{"id":1996,"href":"https:\/\/prismacloud.eu\/wp-json\/wp\/v2\/posts\/1310\/revisions\/1996"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/prismacloud.eu\/wp-json\/wp\/v2\/media\/326"}],"wp:attachment":[{"href":"https:\/\/prismacloud.eu\/wp-json\/wp\/v2\/media?parent=1310"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/prismacloud.eu\/wp-json\/wp\/v2\/categories?post=1310"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/prismacloud.eu\/wp-json\/wp\/v2\/tags?post=1310"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}