A possible solution for privacy-preserving cloud data storage

Research output: Chapter in Book/Report/Conference proceedingConference contribution

7 Scopus citations

Abstract

Despite the economic advantages of cloud data storage, many corporations have not yet migrated to this technology. While corporations in the financial sector cite data security as a reason, corporations in other sectors cite privacy concerns for this reluctance. In this paper, we propose a possible solution for this problem inspired by the HIPAA safe harbor methodology for data anonymization. The proposed technique involves using a hash function that uniquely identifies the data and then splitting data across multiple cloud providers. We propose that such a "Good Enough" approach to privacy-preserving cloud data storage is both technologically feasible and financially advantageous. Following this approach addresses concerns about privacy harms resulting from accidental or deliberate data spills from cloud providers. The "Good Enough" method will enable firms to move their data into the cloud without incurring privacy risks, enabling them to realize the economic advantages provided by the payper-use model of cloud data storage.

Original languageEnglish (US)
Title of host publicationProceedings - 2015 IEEE International Conference on Cloud Engineering, IC2E 2015
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages397-403
Number of pages7
ISBN (Electronic)9781479982189
DOIs
StatePublished - 2015
Event2015 IEEE International Conference on Cloud Engineering, IC2E 2015 - Tempe, United States
Duration: Mar 9 2015Mar 12 2015

Publication series

NameProceedings - 2015 IEEE International Conference on Cloud Engineering, IC2E 2015

Other

Other2015 IEEE International Conference on Cloud Engineering, IC2E 2015
Country/TerritoryUnited States
CityTempe
Period3/9/153/12/15

Keywords

  • Cloud
  • Data privacy
  • Obfuscation

ASJC Scopus subject areas

  • Software
  • Control and Systems Engineering
  • Computer Networks and Communications
  • Hardware and Architecture

Fingerprint

Dive into the research topics of 'A possible solution for privacy-preserving cloud data storage'. Together they form a unique fingerprint.

Cite this