@PHDTHESIS{ 2017:328891947, title = {Full-stack confidentiality cost modeling for cloud computing}, year = {2017}, url = "http://tede2.pucrs.br/tede2/handle/tede/8387", abstract = "Institutes, companies, and governments have increased the adoption of security principles when using cloud computing environments. From protocols and authentication methods to cryptography algorithms, confidentiality has gained attention from both cloud users and cloud providers for, on one hand, preventing data leakage, but, on the other hand, demanding extra computational resources. Due to the nature of the on-demand billing process applied by public cloud providers, considering the pay-as-yougo model, adding security mechanisms may impact the rented resources, increasing the overall costs and minimizing the feasibility for some applications. To better understand the adoption of confidentiality in a cloud environment, users and providers have to consider applying cryptography algorithms in its three main axes: (a) communication on public networks; (b) data storage on third-party services; and (c) data processing in shared virtual environment. A full-stack confidentiality solution, considering these three axes, allows users to have the benefits of cloud computing even if they have strict confidentiality concerns. However, the costs of adding such privacy for assets in a cloud environment should be estimated, giving support to the manager making decisions about the application?s availability and performance. This Ph.D. research presents (i) an architecture of full-stack confidentiality for cloud computing; and (ii) a model to estimate cryptography costs for communicating, storing, and processing in cloud computing environments. The axes can be combined to estimate users? overheads according to their security needs. The predicted values can be used for resizing cloud resources or even recalculating rental costs of cloud services. The model?s evaluation presented an accuracy close to 95%. In the evaluation, we used a database-based benchmark in a cloud environment including standard cryptography algorithms, such as AES, and Querying over Encrypted Databases.", publisher = {Pontif?cia Universidade Cat?lica do Rio Grande do Sul}, scholl = {Programa de P?s-Gradua??o em Ci?ncia da Computa??o}, note = {Escola Polit?cnica} }