Remote Data Auditing and How it May Affect the Chain of Custody in a
Cloud Environment
- URL: http://arxiv.org/abs/2208.12759v1
- Date: Fri, 26 Aug 2022 16:10:34 GMT
- Title: Remote Data Auditing and How it May Affect the Chain of Custody in a
Cloud Environment
- Authors: Rodolfo Machuca and Fatoumata Sankare
- Abstract summary: More and more organizations are relying on outsourcing their data to cloud-based environments.
Law enforcement agencies from the national level down to large city police departments are also using the cloud environment to store data.
This data solution presents in own set of problems in that the outsourced data can become untrustworthy due to the lack of control of the data owners.
- Score: 0.0
- License: http://creativecommons.org/licenses/by-nc-nd/4.0/
- Abstract: As big data collection continues to grow, more and more organizations are
relying on outsourcing their data to cloud-based environments. This includes
the federal government and several agencies that depend on maintaining our
citizens' secure data. Law enforcement agencies from the national level down to
large city police departments are also using the cloud environment to store
data. These agencies see this as a method of securing data while saving money
by not maintaining the large data centers required to house this information.
This data solution presents in own set of problems in that the outsourced data
can become untrustworthy due to the lack of control of the data owners. Cloud
computing is facing many difficulties, with security being the primary issue.
This is because the cloud computing service provider is a separate entity; any
data stored in the cloud can be interpreted as giving up control of the data by
the primary data owner. [1] Remote data auditing (RDA) is increasingly
important when managing data in a cloud environment, especially when
organizations have to store their data in a multi-cloud environment. The
challenging security threats posed by attempting to maintain the integrity of
the data for proper auditing is a trial that was never addressed in the past.
Related papers
- K-Nearest Neighbor Classification over Semantically Secure Encrypted Relational Data [0.0]
In public cloud environments while data is encrypted, the cloud service provider typically controls the encryption keys.
This situation makes traditional privacy-preserving classification systems inadequate.
We propose a secure k nearest neighbor classification algorithm for encrypted, outsourced data.
arXiv Detail & Related papers (2024-07-05T19:44:17Z) - Mitigating Data Sharing in Public Cloud using Blockchain [0.0]
We propose a secure data ecosystem in the cloud with the key aspects being Data Rights, Data Sharing, and Data Validation.
This will ensure that existing public cloud-based systems can easily deploy blockchain enhancing trustworthiness and non-repudiation of cloud data.
arXiv Detail & Related papers (2024-04-21T13:12:44Z) - Protecting Sensitive Tabular Data in Hybrid Clouds [0.0]
Regulated industries, such as Healthcare and Finance, are starting to move parts of their data and workloads to the public cloud.
We address the security and performance challenges of big data analytics using a hybrid cloud in a real-life use case from a hospital.
arXiv Detail & Related papers (2023-12-03T11:20:24Z) - A Privacy-Preserving Outsourced Data Model in Cloud Environment [8.176020822058586]
Data security and privacy problems are among the critical hindrances to using machine learning tools.
A privacy-preserving model is proposed, which protects the privacy of the data without compromising machine learning efficiency.
Fog nodes collect the noise-added data from the data owners, then shift it to the cloud platform for storage, computation, and performing the classification tasks.
arXiv Detail & Related papers (2022-11-24T11:27:30Z) - Certified Data Removal in Sum-Product Networks [78.27542864367821]
Deleting the collected data is often insufficient to guarantee data privacy.
UnlearnSPN is an algorithm that removes the influence of single data points from a trained sum-product network.
arXiv Detail & Related papers (2022-10-04T08:22:37Z) - BigBird: Big Data Storage and Analytics at Scale in Hybrid Cloud [0.0]
This paper showcases our approach in designing a scalable big data storage and analytics management framework using BigQuery in Google Cloud Platform.
Although the paper discusses the framework implementation in Google Cloud Platform, it can easily be applied to all major cloud providers.
arXiv Detail & Related papers (2022-03-22T05:42:46Z) - Unsupervised Point Cloud Representation Learning with Deep Neural
Networks: A Survey [104.71816962689296]
Unsupervised point cloud representation learning has attracted increasing attention due to the constraint in large-scale point cloud labelling.
This paper provides a comprehensive review of unsupervised point cloud representation learning using deep neural networks.
arXiv Detail & Related papers (2022-02-28T07:46:05Z) - Preventing Unauthorized Use of Proprietary Data: Poisoning for Secure
Dataset Release [52.504589728136615]
We develop a data poisoning method by which publicly released data can be minimally modified to prevent others from train-ing models on it.
We demonstrate the success of our approach onImageNet classification and on facial recognition.
arXiv Detail & Related papers (2021-02-16T19:12:34Z) - Second layer data governance for permissioned blockchains: the privacy
management challenge [58.720142291102135]
In pandemic situations, such as the COVID-19 and Ebola outbreak, the action related to sharing health data is crucial to avoid the massive infection and decrease the number of deaths.
In this sense, permissioned blockchain technology emerges to empower users to get their rights providing data ownership, transparency, and security through an immutable, unified, and distributed database ruled by smart contracts.
arXiv Detail & Related papers (2020-10-22T13:19:38Z) - Data Mining with Big Data in Intrusion Detection Systems: A Systematic
Literature Review [68.15472610671748]
Cloud computing has become a powerful and indispensable technology for complex, high performance and scalable computation.
The rapid rate and volume of data creation has begun to pose significant challenges for data management and security.
The design and deployment of intrusion detection systems (IDS) in the big data setting has, therefore, become a topic of importance.
arXiv Detail & Related papers (2020-05-23T20:57:12Z) - A vision for global privacy bridges: Technical and legal measures for
international data markets [77.34726150561087]
Despite data protection laws and an acknowledged right to privacy, trading personal information has become a business equated with "trading oil"
An open conflict is arising between business demands for data and a desire for privacy.
We propose and test a vision of a personal information market with privacy.
arXiv Detail & Related papers (2020-05-13T13:55:50Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.