need to be verified with a comprehensive standard to
ensure its effectiveness and accuracy.
7 FUTURE WORK
In conclusion, this study points out the need for
addressing privacy challenges in cloud environments,
and builds initial step towards developing a
comprehensive set of privacy controls which can be
used for assessing and comparing these four
certifications and their shortcomings. Results will
also benefit governments and industry when
comparing different certifications for their privacy
protections and selecting the appropriate one based on
specific needs.
For future studies, it is necessary to develop a
consistent and comprehensive framework for cloud
computing privacy protections in order to evaluate
and verify the certification performance in a more
accurate and effective way. We will continue to work
on analysing the content of cloud certifications with a
more inclusive selection of sources and continue
updating the results based on the latest version of the
certifications as they become available.
ACKNOWLEDGEMENTS
This work has been supported by Cisco Inc. We want
to acknowledge and thank all of those who have
contributed to this work.
REFERENCES
Leymann, F., & Fritsch, D. (2009). Cloud computing: The
next revolution in IT. Proceedings of the 52th
Photogrammetric Week, 3-12.
Perera, C., Ranjan, R., Wang, L., Khan, S., & Zomaya, A.
(2015). Privacy of big data in the internet of things era.
IEEE IT Special Issue Internet of Anything, 6.
Gahi, Y., Guennoun, M., & Mouftah, H. T. (2016, June).
Big data analytics: Security and privacy challenges. In
2016 IEEE Symposium on Computers and
Communication (ISCC) (pp. 952-957). IEEE.
Guilloteau, S., & Venkatesen, M. (2013). Privacy in Cloud
Computing-ITU-T Technology Watch Report March
2012.013
Gai, K., Qiu, M., Zhao, H., & Xiong, J. (2016, June).
Privacy-aware adaptive data encryption strategy of big
data in cloud computing. In 2016 IEEE 3rd
International Conference on Cyber Security and Cloud
Computing (CSCloud) (pp. 273-278). IEEE.
Di Giulio, C., Sprabery, R., Kamhoua, C., Kwiat, K.,
Campbell, R. H., & Bashir, M. N. (2017, March). Cloud
security certifications: a comparison to improve cloud
service provider security. In Proceedings of the Second
International Conference on Internet of Things, Data
and Cloud Computing (pp. 1-12).
Lar, S. U., Liao, X., & Abbas, S. A. (2011, August). Cloud
computing privacy & security global issues, challenges,
& mechanisms. In 2011 6th International ICST
Conference on Communications and Networking in
China (CHINACOM) (pp. 1240-1245). IEEE.
Kumar, S. N., & Vajpayee, A. (2016). A survey on secure
cloud: security and privacy in cloud computing.
American Journal of Systems and Software, 4(1), 14-
26.
Sun, Y., Zhang, J., Xiong, Y., & Zhu, G. (2014). Data
security and privacy in cloud computing. International
Journal of Distributed Sensor Networks, 10(7), 190903.
Kang, M., & Kwon, H. Y. (2019, January). A study on the
needs for enhancement of personal information
protection in cloud computing security certification
system. In 2019 International Conference on Platform
Technology and Service (PlatCon) (pp. 1-5). IEEE.
Anisetti, M., Ardagna, C. A., Damiani, E., El Ioini, N., &
Gaudenzi, F. (2018). Modeling time, probability, and
configuration constraints for continuous cloud service
certification. Computers & Security, 72, 234-254.
Karkouda, K., Nabli, A., & Gargouri, F. (2018, October).
Privacy and availability in cloud data warehouse. In
Proceedings of the 10th International Conference on
Education Technology and Computers (pp. 388-391).
Teigeler, H., Lins, S., & Sunyaev, A. (2018, January).
Drivers vs. inhibitors-what clinches continuous service
certification adoption by cloud service providers?. In
Proceedings of the 51st Hawaii international
conference on system sciences.
Lansing, J., Schneider, S., & Sunyaev, A. (2013). Cloud
service certifications: Measuring consumers'
preferences for assurances.
Ion, I., Sachdeva, N., Kumaraguru, P., & Čapkun, S. (2011,
July). Home is safer than the cloud! Privacy concerns
for consumer cloud storage. In Proceedings of the
Seventh Symposium on Usable Privacy and Security
(pp. 1-20).
Lins, S., Grochol, P., Schneider, S., & Sunyaev, A. (2016).
Dynamic certification of cloud services: Trust, but
verify!. IEEE Security & Privacy, 14(2), 66-71.
Cate, F. H. (2006). The failure of fair information practice
principles. Consumer protection in the age of the
information economy.
Solove, D. & Citron, D. (2018). Risk and Anxiety: A
Theory of Data-Breach Harms. Texas Law Review
96(4), 737-786
Sharma, T., Wang, T., Di Giulio, C., & Bashir, M. (2020,
October). Towards Inclusive Privacy Protections in the
Cloud. In International Conference on Applied
Cryptography and Network Security (pp. 337-359).
Springer, Cham.
ICISSP 2022 - 8th International Conference on Information Systems Security and Privacy