Privacy in Cloud
Computing
A S T U D Y A B O U T P R I VA C Y P R O T E C T I O N I S S U E S I N C LO U D C O M P U T I N G
BY
AHMED NOUR
K H A L E D H AWA S
Outline
• What is Cloud?
• What is Privacy protection?
• Why Privacy protection is an issue in Cloud computing?

• How to protect the privacy?
• Conclusion
What is Cloud Computing
• NIST define the Cloud Computing as
“It is a model for enabling ubiquitous , convenient , on-demand
network access to a shared pool of configurable computing
resources (e.g. network , computing , storage) that can be rapidly
provisioned and release with minimal management effort or service
provided interaction”.
• There is factors that lead to the of cloud computing boosting ,
Globalization , Outsourcing model , Virtualization Technology .
Cloud Computing key players
Cloud
Consumer

Cloud
Provider

Cloud
Carrier

Cloud
Broker

Cloud
Auditor
Difference in scope and control among cloud
service models
Cloud Consumer

Application
Platform Architecture
S
a
a
S

Virtualization
P
a
a
S

Cloud Provider

I
a
a
S

Hardware
Facility

I
a
a
S

P
a
a
s

S
a
a
s
What Is Privacy Protection ?
I T I S A HU MAN R IG HT.

Privacy Protection is a human right stated
in the UN Universal Declaration Of
Human Rights - Article 12
Simply to protecting any Personal Information ,
which is any information could be tracked to
specific person such as name, ID, Medical record,
IP address and also include this person Opinions,
Communications etc.
How to Protect Private Data
Data
Generation
• To know what
and why data
collected
• Stop the
collection and use

Transfer
• Confidentiality
• Integrity

Share
• Users must give
the permission to
share this data
• What to share
what to hide

Store

Use

Archival

Destruction

• Confidentiality
• Integrity
• Used in the
appropriate way.

• Confidentiality
• Integrity
• Availability (offsite )

• Complete and in
the way that suite
the storage
medium

• Confidentiality
• Integrity
• Availability
Issues of Privacy Protection in Cloud
Computing
Lack of physical Control
Data processed , Stored , Archived in a machine you don’ t own or
controll .

•You don’t know what else run in the same physical
machine.
•You don’t know who access your information and
when .
•You don’t know if is your data used in the same
purpose that its collected for .
Issues of Privacy in Cloud Computing
Protection of data copies
Due to the nature of cloud your data replicated as much as
possible to achieve availability .

• It’s hard to keep track of all these
copies and how it’s protected .
•Destroying these copies also very tough
job .
Issues of Privacy in Cloud Computing
Legal Problems due to Privacy law’s
all over the world
•Each Country (Region ) have it’s own law
and protection levels .
•It’s Hard to prevent Your Data from transfer
to a certain country or region due to the
nature of the cloud , simply you data could
be disclosed based upon the laws of this
country and you don’t have the right to hide
it to specific Authorities .
Privacy Protection Methods

FHE
• Fully Homomorphic
Encryption
• Computation on
encrypted data.
• Inefficient in practice

Usage of Security
Protocol

Privacy Manager

• Need additional H/W
(cryptographic
coprocessor)

• Software.
• This technique relies
on obfuscation.
Privacy Manager

Reduces the risk to the
cloud computing user
of their private data
being stolen or misused
using a privacy
manager software

We call it obfuscation
rather than encryption
because some of the
information present in
the original form and
other in encrypted form

key which is chosen
by the user and
known by the privacy
manager
Privacy Manager
Privacy Manager Features

preferences
Allows users to set their
preferences about the handling of
personal data that is stored in an
un-obfuscated form in the cloud

Personae
Helps users to communicate to
service providers their wishes for
the use of this personal data
Online Photo
Scenario

Cloud Photo
Application
by Vincent
Online Photo Scenario
• Vincent is a social man and likes to share photos with family members and
members of photographic forums that he subscribes.
• recently bought a new professional digital camera with a built-in(GPS)
module, which can extract the positional information, location that the
picture was taken. This feature helps him track and organize pictures
geographically.
• Vincent uses a commercial digital imaging web site to share his pictures
online, But he realizes that the positional information contained in the
pictures shot by his new camera may reveal the location of his house and his
travel patterns as such GPS information.
• the company owning the web site rolls out a new privacy manager assisting
people to obfuscate certain metadata attributes which may reveal their
private information.
Online Photo Scenario
• The end user selects the pictures that will be
shared through certain cloud services.
• Specific personae, e.g. family, business,
anonymous etc. will be applied to obfuscate
certain attributes associated with the
photos. The user can also customize the
personae.
• only the owner has the control to the
attributes and the underlying obfuscation
methods.
Conclusion
We have discuss cloud , privacy ,the privacy issues in the cloud and one
solution for some of these issues in the cloud , but there is many
concerns still available in the cloud , we think that without the
eliminating these issues the cloud computing will remain a
theoretical approach and never have the motivation to grow to be a
real fact in the world of IT . The legal concerns privacy in cloud
computing are more complex than the technical ones , it require new
Legislation, laws and audit tools to be developed around the world.
References
•Z. Xiao and Y. Xiao, “Security and Privacy in Cloud Computing,” IEEE Communications Surveys Tutorials,
vol. 15, no. 2, pp. 843–859, 2013.
•S. Pearson, Y. Shen, and M. Mowbray, “A privacy manager for cloud
•computing,” Cloud Computing, 2009, pp. 90-106.
•S. Pearson and G. Yee (eds.), Privacy and Security for Cloud Computing, Computer Communications and
Networks, DOI 10.1007/978-1-4471-4189-1_1,Springer-Verlag London 2013
•Mell, P., Grance, T.: A NIST de fi nition of cloud computing. National Institute of Standards and
Technology. NIST SP 800–145. http://www.nist.gov/itl/cloud/upload/cloud-def-v15.pdf.
•R. B. Bohn, J. Messina, F. Liu, J. Tong, and J. Mao, “NIST Cloud Computing Reference Architecture,” in
2011 IEEE World Congress on Services (SERVICES), 2011, pp. 594–596.
•D. Chen and H. Zhao, “Data Security and Privacy Protection Issues in Cloud Computing,” in 2012
International Conference on Computer Science and Electronics Engineering (ICCSEE), 2012, vol. 1, pp. 647–
651.

Privacy in cloud computing

  • 1.
    Privacy in Cloud Computing AS T U D Y A B O U T P R I VA C Y P R O T E C T I O N I S S U E S I N C LO U D C O M P U T I N G BY AHMED NOUR K H A L E D H AWA S
  • 2.
    Outline • What isCloud? • What is Privacy protection? • Why Privacy protection is an issue in Cloud computing? • How to protect the privacy? • Conclusion
  • 3.
    What is CloudComputing • NIST define the Cloud Computing as “It is a model for enabling ubiquitous , convenient , on-demand network access to a shared pool of configurable computing resources (e.g. network , computing , storage) that can be rapidly provisioned and release with minimal management effort or service provided interaction”. • There is factors that lead to the of cloud computing boosting , Globalization , Outsourcing model , Virtualization Technology .
  • 4.
    Cloud Computing keyplayers Cloud Consumer Cloud Provider Cloud Carrier Cloud Broker Cloud Auditor
  • 5.
    Difference in scopeand control among cloud service models Cloud Consumer Application Platform Architecture S a a S Virtualization P a a S Cloud Provider I a a S Hardware Facility I a a S P a a s S a a s
  • 6.
    What Is PrivacyProtection ? I T I S A HU MAN R IG HT. Privacy Protection is a human right stated in the UN Universal Declaration Of Human Rights - Article 12 Simply to protecting any Personal Information , which is any information could be tracked to specific person such as name, ID, Medical record, IP address and also include this person Opinions, Communications etc.
  • 7.
    How to ProtectPrivate Data Data Generation • To know what and why data collected • Stop the collection and use Transfer • Confidentiality • Integrity Share • Users must give the permission to share this data • What to share what to hide Store Use Archival Destruction • Confidentiality • Integrity • Used in the appropriate way. • Confidentiality • Integrity • Availability (offsite ) • Complete and in the way that suite the storage medium • Confidentiality • Integrity • Availability
  • 8.
    Issues of PrivacyProtection in Cloud Computing Lack of physical Control Data processed , Stored , Archived in a machine you don’ t own or controll . •You don’t know what else run in the same physical machine. •You don’t know who access your information and when . •You don’t know if is your data used in the same purpose that its collected for .
  • 9.
    Issues of Privacyin Cloud Computing Protection of data copies Due to the nature of cloud your data replicated as much as possible to achieve availability . • It’s hard to keep track of all these copies and how it’s protected . •Destroying these copies also very tough job .
  • 10.
    Issues of Privacyin Cloud Computing Legal Problems due to Privacy law’s all over the world •Each Country (Region ) have it’s own law and protection levels . •It’s Hard to prevent Your Data from transfer to a certain country or region due to the nature of the cloud , simply you data could be disclosed based upon the laws of this country and you don’t have the right to hide it to specific Authorities .
  • 11.
    Privacy Protection Methods FHE •Fully Homomorphic Encryption • Computation on encrypted data. • Inefficient in practice Usage of Security Protocol Privacy Manager • Need additional H/W (cryptographic coprocessor) • Software. • This technique relies on obfuscation.
  • 12.
    Privacy Manager Reduces therisk to the cloud computing user of their private data being stolen or misused using a privacy manager software We call it obfuscation rather than encryption because some of the information present in the original form and other in encrypted form key which is chosen by the user and known by the privacy manager
  • 13.
    Privacy Manager Privacy ManagerFeatures preferences Allows users to set their preferences about the handling of personal data that is stored in an un-obfuscated form in the cloud Personae Helps users to communicate to service providers their wishes for the use of this personal data
  • 14.
  • 15.
    Online Photo Scenario •Vincent is a social man and likes to share photos with family members and members of photographic forums that he subscribes. • recently bought a new professional digital camera with a built-in(GPS) module, which can extract the positional information, location that the picture was taken. This feature helps him track and organize pictures geographically. • Vincent uses a commercial digital imaging web site to share his pictures online, But he realizes that the positional information contained in the pictures shot by his new camera may reveal the location of his house and his travel patterns as such GPS information. • the company owning the web site rolls out a new privacy manager assisting people to obfuscate certain metadata attributes which may reveal their private information.
  • 16.
    Online Photo Scenario •The end user selects the pictures that will be shared through certain cloud services. • Specific personae, e.g. family, business, anonymous etc. will be applied to obfuscate certain attributes associated with the photos. The user can also customize the personae. • only the owner has the control to the attributes and the underlying obfuscation methods.
  • 17.
    Conclusion We have discusscloud , privacy ,the privacy issues in the cloud and one solution for some of these issues in the cloud , but there is many concerns still available in the cloud , we think that without the eliminating these issues the cloud computing will remain a theoretical approach and never have the motivation to grow to be a real fact in the world of IT . The legal concerns privacy in cloud computing are more complex than the technical ones , it require new Legislation, laws and audit tools to be developed around the world.
  • 18.
    References •Z. Xiao andY. Xiao, “Security and Privacy in Cloud Computing,” IEEE Communications Surveys Tutorials, vol. 15, no. 2, pp. 843–859, 2013. •S. Pearson, Y. Shen, and M. Mowbray, “A privacy manager for cloud •computing,” Cloud Computing, 2009, pp. 90-106. •S. Pearson and G. Yee (eds.), Privacy and Security for Cloud Computing, Computer Communications and Networks, DOI 10.1007/978-1-4471-4189-1_1,Springer-Verlag London 2013 •Mell, P., Grance, T.: A NIST de fi nition of cloud computing. National Institute of Standards and Technology. NIST SP 800–145. http://www.nist.gov/itl/cloud/upload/cloud-def-v15.pdf. •R. B. Bohn, J. Messina, F. Liu, J. Tong, and J. Mao, “NIST Cloud Computing Reference Architecture,” in 2011 IEEE World Congress on Services (SERVICES), 2011, pp. 594–596. •D. Chen and H. Zhao, “Data Security and Privacy Protection Issues in Cloud Computing,” in 2012 International Conference on Computer Science and Electronics Engineering (ICCSEE), 2012, vol. 1, pp. 647– 651.