Reflection of Federal Data Protection Standards on Cloud Governance
- URL: http://arxiv.org/abs/2403.07907v1
- Date: Mon, 26 Feb 2024 17:04:01 GMT
- Title: Reflection of Federal Data Protection Standards on Cloud Governance
- Authors: Olga Dye, Justin Heo, Ebru Celikel Cankaya,
- Abstract summary: This research focuses on cloud governance by harmoniously combining multiple data security measures with legislative authority.
We present legal aspects aimed at the prevention of data breaches, as well as the technical requirements regarding the implementation of data protection mechanisms.
- Score: 0.0
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: As demand for more storage and processing power increases rapidly, cloud services in general are becoming more ubiquitous and popular. This, in turn, is increasing the need for developing highly sophisticated mechanisms and governance to reduce data breach risks in cloud-based infrastructures. Our research focuses on cloud governance by harmoniously combining multiple data security measures with legislative authority. We present legal aspects aimed at the prevention of data breaches, as well as the technical requirements regarding the implementation of data protection mechanisms. Specifically, we discuss primary authority and technical frameworks addressing least privilege in correlation with its application in Amazon Web Services (AWS), one of the major Cloud Service Providers (CSPs) on the market at present.
Related papers
- Mitigating Data Sharing in Public Cloud using Blockchain [0.0]
We propose a secure data ecosystem in the cloud with the key aspects being Data Rights, Data Sharing, and Data Validation.
This will ensure that existing public cloud-based systems can easily deploy blockchain enhancing trustworthiness and non-repudiation of cloud data.
arXiv Detail & Related papers (2024-04-21T13:12:44Z) - A Learning-based Incentive Mechanism for Mobile AIGC Service in Decentralized Internet of Vehicles [49.86094523878003]
We propose a decentralized incentive mechanism for mobile AIGC service allocation.
We employ multi-agent deep reinforcement learning to find the balance between the supply of AIGC services on RSUs and user demand for services within the IoV context.
arXiv Detail & Related papers (2024-03-29T12:46:07Z) - Leveraging AI Planning For Detecting Cloud Security Vulnerabilities [15.503757553097387]
Cloud computing services provide scalable and cost-effective solutions for data storage, processing, and collaboration.
Access control misconfigurations are often the primary driver for cloud attacks.
We develop a PDDL model for detecting security vulnerabilities which can for example lead to widespread attacks such as ransomware.
arXiv Detail & Related papers (2024-02-16T03:28:02Z) - The Security and Privacy of Mobile Edge Computing: An Artificial Intelligence Perspective [64.36680481458868]
Mobile Edge Computing (MEC) is a new computing paradigm that enables cloud computing and information technology (IT) services to be delivered at the network's edge.
This paper provides a survey of security and privacy in MEC from the perspective of Artificial Intelligence (AI)
We focus on new security and privacy issues, as well as potential solutions from the viewpoints of AI.
arXiv Detail & Related papers (2024-01-03T07:47:22Z) - Emergent (In)Security of Multi-Cloud Environments [3.3819025097691537]
A majority of IT organizations have workloads spread across different cloud service providers, growing their multi-cloud environments.
The increase in the number of attack vectors creates a challenge of how to prioritize mitigations and countermeasures.
We conducted an analysis of multi-cloud threat vectors enabling calculation and prioritization for the identified mitigations and countermeasures.
arXiv Detail & Related papers (2023-11-02T14:02:33Z) - Exploring Security Practices in Infrastructure as Code: An Empirical
Study [54.669404064111795]
Cloud computing has become popular thanks to the widespread use of Infrastructure as Code (IaC) tools.
scripting process does not automatically prevent practitioners from introducing misconfigurations, vulnerabilities, or privacy risks.
Ensuring security relies on practitioners understanding and the adoption of explicit policies, guidelines, or best practices.
arXiv Detail & Related papers (2023-08-07T23:43:32Z) - Privacy-Preserving Joint Edge Association and Power Optimization for the
Internet of Vehicles via Federated Multi-Agent Reinforcement Learning [74.53077322713548]
We investigate the privacy-preserving joint edge association and power allocation problem.
The proposed solution strikes a compelling trade-off, while preserving a higher privacy level than the state-of-the-art solutions.
arXiv Detail & Related papers (2023-01-26T10:09:23Z) - Getting Critical: Making Sense of the EU Cybersecurity Framework for
Cloud Providers [0.799536002595393]
We examine whether all cloud services should be treated as critical infrastructure.
We look at the proposed revision of the General Data Protection Regulation and the Network Information Systems Directive.
We conclude that since cloud providers are subject to both divergent and divergent regulatory approaches can lead to unintended outcomes and high compliance costs.
arXiv Detail & Related papers (2022-03-09T16:59:36Z) - Cloud Native Privacy Engineering through DevPrivOps [0.0]
Cloud native information systems engineering enables scalable and resilient service infrastructures for all major online offerings.
We show that cloud native privacy engineering advances the state of the art of privacy by design and by default using latest technologies.
arXiv Detail & Related papers (2021-08-02T14:22:16Z) - Second layer data governance for permissioned blockchains: the privacy
management challenge [58.720142291102135]
In pandemic situations, such as the COVID-19 and Ebola outbreak, the action related to sharing health data is crucial to avoid the massive infection and decrease the number of deaths.
In this sense, permissioned blockchain technology emerges to empower users to get their rights providing data ownership, transparency, and security through an immutable, unified, and distributed database ruled by smart contracts.
arXiv Detail & Related papers (2020-10-22T13:19:38Z) - A Privacy-Preserving Distributed Architecture for
Deep-Learning-as-a-Service [68.84245063902908]
This paper introduces a novel distributed architecture for deep-learning-as-a-service.
It is able to preserve the user sensitive data while providing Cloud-based machine and deep learning services.
arXiv Detail & Related papers (2020-03-30T15:12:03Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.