Based on the assumption that cloud providers can be trusted (to a certain extent) we define a trust, security and privacy preserving infrastructure that relies on trusted cloud providers to operate properly. Working in tandem with legal agreements, our open source software supports: trust and reputation management, sticky policies with fine grained access controls, privacy preserving delegation of authority, federated identity management, different levels of assurance and configurable audit trails. Armed with these tools, cloud service providers are then able to offer a reliable privacy preserving infrastructure-as-a-service to their clients.
|Title of host publication||Proceedings of the 4th IEEE International Conference on Cloud Computing (CLOUD 2011, Washington DC, USA, July 4-9, 2011)|
|Publisher||IEEE Computer Society|
|Publication status||Published - 2011|