Probst, Christian W.4; Sasse, M. Angela5; Pieters, Wolter6; Dimkov, Trajce6; Luysterborg, Erik7; Arnaud, Michel8
1 Department of Informatics and Mathematical Modeling, Technical University of Denmark2 Computer Science and Engineering, Department of Informatics and Mathematical Modeling, Technical University of Denmark3 Language-Based Technology, Department of Informatics and Mathematical Modeling, Technical University of Denmark4 Department of Applied Mathematics and Computer Science, Technical University of Denmark5 University College London6 University of Twente7 Deloitte8 Université Paris Ouest Nanterre La Défense
In the age of cloud computing, IT infrastructure becomes virtualised and takes the form of services. This virtualisation results in an increasing de-perimeterisation, where the location of data and computation is irrelevant from a user’s point of view. This irrelevance means that private and institutional users no longer have a concept of where their data is stored, and whether they can trust in cloud providers to protect their data. In this chapter, we investigate methods for increasing customers’ trust into cloud providers, and suggest a public penetration-testing agency as an essential component in a trustworthy cloud infrastructure.
European Data Protection: in Good Health?, 2012, p. 251-265