Academia.edu no longer supports Internet Explorer.
To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to upgrade your browser.
Cloud computing is considered a new generation of technology that has offered many benefits such as flexibility, efficiency, reduction in IT cost and so on. However, the dependence on the cloud provider to process and manage the personal data leads to many privacy and confidentiality risks.. In this paper, we propose a framework that aims to evaluate if the cloud provider meets the privacy related issues. Moreover, this proposed framework helps the cloud provider to enhance the privacy provision level to increase the trust of customers on cloud provider services.
Cloud computing is the delivery of computing as a service rather than a product. It provides shared resources, software, and information to computers and other devices over a network. The increasing network bandwidth and reliable yet flexible network connections make it even possible that users can now subscribe high quality services from data and software that reside solely on remote data centres. We can store and retrieve the data as we like using cloud computing. The cloud computing paradigm changes the way in which information is managed, especially where personal data processing is concerned. End-users can access cloud services without the need for any expert knowledge of the underlying technology. This is a key characteristic of cloud computing, which offers the advantage of reducing cost through the sharing of computing and storage resources, combined with an on-demand provisioning mechanism based on a pay-per-use business model. These new features have a direct impact on the IT budget and cost of ownership, but also bring up issues of traditional security, trust and privacy mechanisms.Privacy, in this Article, refers to the right to self-determination, that is, the right of individuals to 'know what is known about them', be aware of stored information about them, control how that information is communicated and prevent its abuse. In other words, it refers to more than just confidentiality of information. Protection of personal information (or data protection) derives from the right to privacy via the associated right to self-determination. Every individual has the right to control his or her own data, whether private, public or professional. Privacy issues are increasingly important in the online world. It is generally accepted that due consideration of privacy issues promotes user confidence and economic development. However, the secure release, management and control of personal information into the cloud represent a huge challenge for all stakeholders, involving pressures both legal and commercial. This study analyses the challenges posed by cloud computing and the standardization work being done by various standards development organizations (SDOs) to mitigate privacy risks in the cloud, including the role of privacy-enhancing technologies (PETs).
Cloud computing is a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction. This cloud model promotes availability and is composed of five essential characteristics, three delivery models, and four deployment models. economic utility model with existing computing technologies including the distributed services, applications and information infrastructure. However, without appropriate security and privacy solutions designed for clouds, this potentially revolutionizing computing paradigm could become a huge failure, as in this field cloud computing include activities such as the use of social networking sites and other forms of personal computing. And that's why, the privacy issues and concerns are arising among it.so cloud must ensure that customers continue to have the same level of security and privacy control over their applications and services.
The evolution of Cloud Computing as a viable business solution for providing hardware and software has created many security concerns. Among these security concerns, privacy is often overlooked. If Cloud Computing is to continue its growth, this privacy concern will need to be addressed. In this work we discuss the current growth of Cloud Computing and the impact the public sector and privacy can have in furthering this growth. To begin to provide privacy protection for Cloud Computing, we introduce privacy constraints that outline privacy preferences. We propose the expansion of Cloud Service Level Agreements (SLAs) to include these privacy constraints as Quality of Service (QoS) levels. This privacy QoS must be agreed upon along with the rest of the QoS terms within the SLA by the Cloud consumer and provider. Finally, we introduce Privacy as a Service (PraaS) to monitor the agreement and provide enforcement if necessary.
Cloud Computing is a new model in the IT's world. The privacy protection is one of the key challenges that the cloud computing faces. The customers, in the cloud computing, depend on the cloud provider to manage their data. In addition, the cloud computing resources are sharing with multi customers and these resources are located in different regions that subject to different jurisdictions. All of these matters lead to many privacy risks. In this paper, we try to develop an initial quantitative evaluating system that aims to help the customers to know what the privacy's weaknesses on the cloud providers by evaluating whether the cloud provider meets the privacy related issues or not.; this will help them to make the decision.
Various cloud computing models are used to increase the profit of an organization. Cloud provides a convenient environment and more advantages to business organizations to run their business. But, it has some issues related to the privacy of data. User's data are stored and maintained out of user's premises. The failure of data protection causes many issues like data theft which affects the individual organization. The cloud users may be satisfied, if their data are protected properly from unauthorized access. This paper presents a survey on different privacy issues involved in the cloud service. It also provides some suggestions to the cloud users to select their suitable cloud services by knowing their privacy policies.
This paper focuses on analyzing security and privacy problems facing cloud computing. The major issue discussed in the research that of losing control of data by both the cloud service providers (CSPs) and cloud service users (CSOs). Cloud computing offers organizations an innovative business model to adopt IT services without having to incur massive investment costs. A general analysis of the cloud is provided including its various forms. The growth and development of cloud computing technology are hampered by the fears of losing control of sensitive data by corporations and individuals. Solutions regarding this problem are discussed, and an intensive elucidation of the optimal one is included.
Journal of International Technology and Information Management, 2013
Privacy and security issues are frequently presented as major inhibitors of cloud adoption. Some of these are operational issues and others relate to regulatory and compliance requirements that vary by industry and location. There is a growing body of guidance that seeks to clarify the implications of these concerns for various parts of the cloud supply chain. This paper provides a review of the business and legal risks associated with cloud computing and critically reviews the guidance available. It pays particular attention to the implications of the PRISM revelations for the development of a cloud marketplace that aims to keep data private and secure. A number of responses to cloud risks are available, including technological fixes and business responses. Each response has its own costs and requirements in terms of organisational capability and the paper evaluates the various responses that potential cloud adopters can use to manage the risks associated with cloud computing.
Southern African Institute For Industrial Engineering 2014, 2014
(IaaS).An example is the accessing of services from remote databases through the use of Internet. This means users cannot physically or directly access data from the cloud server, without a client's knowledge. Therefore, there is no need for users to know the exact location of the server; but there is a need for securing the data and information especially in public cloud computing. The aim of this study was to investigate the security challenges or vulnerabilities of cloud computing and propose a conceptual solution. In this regard, a systematic literature search was conducted. Descriptive statistics was used to analyse the data. The researcher found that there are a lot of research issues within the area of security in cloud computing. Furthermore, through this overview study the researcher found that most policies of cloud computing providers allow them to modify or delete data which is not used or that occupy a chunk of the storage space without consulting the clients. This is another security vulnerability issue which creates a research platform.
Abstract. Cloud computing technology is used as inexpensive systems to gather and utilize computational capability. This technology improves applications services by arranging machines and distributed resources in a single huge computational entity. Clouds consist of data centers which are owned by the same institute. The homogeneity within each data centre in the infrastructure is the main feature for the cloud computing but any conflict between heterogeneous data centers and/or different administration domains can become a serious issue for cloud interoperability and privacy. This paper suggests a new framework to solve the interoperability problem.
SSRG International Journal of Computer Science and Engineering (SSRG-IJCSE) , 2019
The use of technology has become an intrinsic part of our lives and most of the economic activities now takes place electronically. Emerging at a fast pace, new technologies allow businesses to be more innovative and competitive. Many of these new technologies foster collaboration, not without creating conflicting needs. Companies must ensure that they use technology safely while engaging more stakeholders to be more competitive. As the Cloud computing gaining popularity, it is also carrying some concerns to the implementors. This paper focuses on the topics such as issues in Cloud Computing, risks related to the privacy and how we can ensure the confidentiality of data
2014
This paper is the survey and concept of Cloud Computing Establishment and security issues. Cloud Computing is considered as one of the emerging arenas of computer science in recent times. It is providing excellent facilities to business entrepreneurs by flexible infrastructure. Although, cloud computing is facilitating the Information Technology industry, the research and development in this arena is yet to be satisfactory. Our contribution in this paper is an advanced survey focusing on cloud computing concept and most Security issues.
cloud computing; privacy; security; trust Cloud computing refers to the underlying infrastructure for an emerging model of service provision that has the advantage of reducing cost by sharing computing and storage resources, combined with an on-demand provisioning mechanism relying on a pay-per-use business model. These new features have a direct impact on information technology (IT) budgeting but also affect traditional security, trust and privacy mechan-isms. The advantages of cloud computing -its ability to scale rapidly, store data remotely, and share services in a dynamic environment -can become disadvantages in maintaining a level of assurance sufficient to sus-tain confidence in potential customers. Some core traditional mechanisms for addressing privacy (such as model contracts) are no longer flexible or dynamic enough, so new approaches need to be developed to fit this new paradigm. In this chapter we assess how security, trust and privacy issues occur in the context of cloud computing and discuss ways in which they may be addressed.
2015
Cloud computing has now emerged as popular computing paradigm for data storage and computation for enterprises and individuals. Its major characteristics include the pay-per-use pricing model, where users pay only for the resources they consume with no upfront cost for hardware/software infrastructures, and the capability of providing scalable and unlimited storage and computation resources to meet changing business needs of enterprises with minimal management overhead [1]. The cloud, however, presents a major limitation to enterprises and individuals who move to public clouds: they lose control over the systems that manage their data and applications, leading to increased security and privacy concerns [2,3,4].
Computers, Privacy and Data Protection: an Element of Choice, 2011
2014
Cloud is a very hot topic currently being discussed in the new era of technology. Organizations step back from adapting cloud technology mainly because of the security and privacy concerns. Processing or sharing privacy-sensitive data sets on cloud probably engenders severe privacy concerns because of multi-tenancy. Lack of transparency attack where the flow of client’s data is not known and disclosure attack where identity of the client is disclosed, are two major concerns of privacy preservation. This paper proposes a methodology of privacy preservation in cloud against the lack of transparency and disclosure through GSM module.
International Journal of Scientific Research in Computer Science, Engineering and Information Technology, 2023
Cloud computing is one of the beneficial approaches for businesses as by including cloud computing and its technique the flexibility required for the infrastructure can be determined. Cloud computing is beneficial for customers but also includes several risks that are essential to be reduced. For this, proper security steps should be considered that benefit in reducing the data breach risk. The report explains the techniques that are essential in reducing risk parameters and focuses on communication such that the interaction process among customers and employees enhances. Using this approach, the relationship between third parties increases, and flexibility for businesses can be achieved.
Book Chapter in Architectures and Protocols for Secure Information Technology, Ruiz-Martinez, Pereniguez-Garcia, and Marin-Lopez (Eds.), IGI-Global, USA. (Accepted for Publication). Expected to be Published in October 2013, 2013
Cloud computing transforms the way information technology (IT) is consumed and managed, promising improved cost efficiencies, accelerated innovation, faster time-to-market, and the ability to scale applications on demand (Leighton, 2009). According to Gartner, while the hype grew exponentially during 2008 and continued since, it is clear that there is a major shift towards the cloud computing model and that the benefits may be substantial (Gartner Hype-Cycle, 2012). However, as the shape of the cloud computing is emerging and developing rapidly both conceptually and in reality, the legal/contractual, economic, service quality, interoperability, security and privacy issues still pose significant challenges. In this chapter, we describe various service and deployment models of cloud computing and identify major challenges. In particular, we discuss three critical challenges: regulatory, security and privacy issues in cloud computing. Some solutions to mitigate these challenges are also proposed along with a brief presentation on the future trends in cloud computing deployment.
Cloud Computing creates a dynamic resource sharing platform. Using cloud technologies such as virtualization, data can be provided to the active users who are at high need to utilize the resources provided within the cloud. As this data (or service) is stored (or offered) outside the data owner's boundaries, they are skeptical for utilizing cloud technology in order to store or utilize their data or service. There are many issues for these active clients (companies or individuals) to be petrified at the thought of using cloud computing paradigm. Some of the main issues that make the clients not to choose cloud computing may be determined because of three important security aspects such as confidentiality, integrity, and availability. This research focused on the security models that relate confidentiality issues. A literature Review is performed for analyzing the existing confidentiality frameworks and security models in the area of grid computing, cluster computing and virtualization. A new theoretical framework is then designed to overcome confidentiality issues thereby improving the client " sgeneric understanding of cloud computing services. The resulting framework when implemented in real world would motivate clients to transform their businesses on to cloud.
International Journal of Scientific Research in Science, Engineering and Technology, 2020
Cloud Computing is the most advanced technical platform for next generation. Cloud Computing provide us a large range of data storage space in web source. Cloud Computing work automatically as per the need of user we don’t need to do extra work on it. High level applications and game is run by Cloud Computing. It simply states that cloud computing means storing and accessing the data and programs over the internet rather than the computer’s hard disk. Cloud Computing cover the wide range of areas. It provides its service through online net connection. The data can be anything such as music, files, images, documents, and more. The user can access the data from anywhere just with the help of an internet connection. To use cloud computing, the user should register and provide with ID and password for security reasons. The speed of transfer depends on various factors such as the capacity of the server, internet speed, and many more. In this paper, we explore the understanding the determinates of security and privacy in cloud computing, Cloud Computing architecture and we also address the characteristics and applications of several popular cloud computing platforms. We identified several challenges from the cloud computing adoption perspective and we also highlighted the cloud interoperability issue that deserves substantial further research and development. However, security and privacy issues present a strong barrier for users to adapt into cloud computing systems.
Loading Preview
Sorry, preview is currently unavailable. You can download the paper by clicking the button above.