Privacy penetration testing: how to establish trust in your cloud provider

Christian W. Probst, A. Angela Sasse, Wolter Pieters, Trajce Dimkov, Erik Luysterborg, Michel Arnaud

    Research output: Chapter in Book/Report/Conference proceedingChapterAcademicpeer-review

    11 Citations (Scopus)

    Abstract

    In the age of cloud computing, IT infrastructure becomes virtualised and takes the form of services. This virtualisation results in an increasing de-perimeterisation, where the location of data and computation is irrelevant from a user’s point of view. This irrelevance means that private and institutional users no longer have a concept of where their data is stored, and whether they can trust in cloud providers to protect their data. In this chapter we investigate methods for increasing customers’ trust into cloud providers, and suggest a public penetration- testing agency as an essential component in a trustworthy cloud infrastructure.
    Original languageEnglish
    Title of host publicationEuropean Data Protection: In Good Health?
    EditorsSerge Gutwirth, Ronald Leens, Paul De Hert, Yves Poullet
    Place of PublicationLondon
    PublisherSpringer
    Pages251-266
    Number of pages17
    ISBN (Electronic)978-94-007-2903-2
    ISBN (Print)978-94-007-2902-5
    DOIs
    Publication statusPublished - 2012

    Publication series

    NameInternational, Foreign and Comparative Law
    PublisherSpringer
    VolumeXVIII

    Keywords

    • Cloud computing
    • Trust
    • Socio-technical system modelling
    • Privacy
    • Penetration Testing
    • SCS-Cybersecurity

    Fingerprint Dive into the research topics of 'Privacy penetration testing: how to establish trust in your cloud provider'. Together they form a unique fingerprint.

    Cite this