{"title":"Privacy-by-design cloud computing through decentralization and real life trust","authors":"Leucio Antonio Cutillo, A. Lioy","doi":"10.1109/P2P.2013.6688726","DOIUrl":null,"url":null,"abstract":"Existing Cloud services suffer from several weaknesses regarding privacy and security [1]. A preliminary analysis shows that they are subject to a number of vulnerabilities ranging from insecure interfaces to insecure Hypervisors [2]. Starting from these vulnerabilities as the first step of a broader research activity, we came up with a new approach that is very promising in re-visiting security and privacy problems in Cloud based systems.","PeriodicalId":116854,"journal":{"name":"IEEE P2P 2013 Proceedings","volume":"30 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2013-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE P2P 2013 Proceedings","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/P2P.2013.6688726","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
Existing Cloud services suffer from several weaknesses regarding privacy and security [1]. A preliminary analysis shows that they are subject to a number of vulnerabilities ranging from insecure interfaces to insecure Hypervisors [2]. Starting from these vulnerabilities as the first step of a broader research activity, we came up with a new approach that is very promising in re-visiting security and privacy problems in Cloud based systems.