scholarly journals Understanding and Enhancing Consumer Privacy Perceptions in the Cloud

Author(s):  
Grace Fox

Abstract The recent increase in highly publicised cloud breaches, coupled with issues surrounding transparency and control in the cloud, highlights the importance of understanding and addressing privacy in this context. The extant cloud privacy literature has a tendency to focus on technical solutions to address security and privacy together, but a small emerging body of literature acknowledges the importance of consumers’ privacy perceptions in the context of cloud computing. Given the breadth of cloud applications and the situational nature of privacy, it is imperative to unpack the role of privacy in this complex domain. This chapter leverages the broader privacy literature in the Information Systems field to identify potential measures to enhance consumer privacy in the cloud context and highlights a number of paths for research to further our knowledge of consumer privacy perceptions in the various cloud contexts.

Author(s):  
Abraham Pouliakis ◽  
Stavros Archondakis ◽  
Efrossyni Karakitsou ◽  
Petros Karakitsos

Cloud computing is changing the way enterprises, institutions, and people understand, perceive, and use current software systems. Cloud computing is an innovative concept of creating a computer grid using the Internet facilities aiming at the shared use of resources such as computer software and hardware. Cloud-based system architectures provide many advantages in terms of scalability, maintainability, and massive data processing. By means of cloud computing technology, cytopathologists can efficiently manage imaging units by using the latest software and hardware available without having to pay for it at non-affordable prices. Cloud computing systems used by cytopathology departments can function on public, private, hybrid, or community models. Using cloud applications, infrastructure, storage services, and processing power, cytopathology laboratories can avoid huge spending on maintenance of costly applications and on image storage and sharing. Cloud computing allows imaging flexibility and may be used for creating a virtual mobile office. Security and privacy issues have to be addressed in order to ensure Cloud computing wide implementation in the near future. Nowadays, cloud computing is not widely used for the various tasks related to cytopathology; however, there are numerous fields for which it can be applied. The envisioned advantages for the everyday practice in laboratories' workflow and eventually for the patients are significant. This is explored in this chapter.


Author(s):  
S. R. Mani Sekhar ◽  
Sharmitha S. Bysani ◽  
Vasireddy Prabha Kiranmai

Security and privacy issues are the challenging areas in the field of internet of things (IoT) and fog computing. IoT and fog has become an involving technology allowing major changes in the field of information systems and communication systems. This chapter provides the introduction of IoT and fog technology with a brief explanation of how fog is overcoming the challenges of cloud computing. Thereafter, the authors discuss the different security and privacy issues and its related solutions. Furthermore, they present six different case studies which will help the reader to understand the platform of IoT in fog.


2018 ◽  
pp. 980-1002
Author(s):  
Mohammad Ali Shalan

Mobile Cloud Computing (MCC) is increasingly asserted as the technology with the potential to change the way internet and information systems are being utilized into business enterprises. It is rapidly changing the landscape of technology, and ultimately turning the long-held promise of utility computing into a reality. Nevertheless, utilizing MCC is never a trivial task, thus calling for a special approach to get the benefits, reduce risks and control operations. The main objective of this chapter is to provide some specific guidelines to provide governance directions to align MCC into enterprise strategy and reduce risks resulted from utilizing middle circle providers; In this context, this chapter also promote and discuss some ethics that help client enterprises and MCC providers understand roles and obligations in an ever changing environment.


Author(s):  
Eric Kuada

The discussion of security and trust issues in this book chapter will follow from the discussions on the role of virtualization in cloud computing and hence the impact that the various categories of virtualization such as server virtualization, network virtualization, storage virtualization, and application virtualization have on the security and trust issues in cloud computing. It will be evident from these discussions that virtualization introduces a number of security and risk related challenges in cloud computing based on the three security objectives of confidentiality, integrity, and availability; and the two main other related security objectives of authenticity and accountability of information systems that were adopted for this discussion. It was however also noted that if the necessary recommended best practices of virtualizations are faithfully adhered to, then virtualization can actually lead to improvement or enhancement in the security posture of cloud environments.


Author(s):  
Mohammad Ali Shalan

Mobile Cloud Computing (MCC) is increasingly asserted as the technology with the potential to change the way internet and information systems are being utilized into business enterprises. It is rapidly changing the landscape of technology, and ultimately turning the long-held promise of utility computing into a reality. Nevertheless, utilizing MCC is never a trivial task, thus calling for a special approach to get the benefits, reduce risks and control operations. The main objective of this chapter is to provide some specific guidelines to provide governance directions to align MCC into enterprise strategy and reduce risks resulted from utilizing middle circle providers; In this context, this chapter also promote and discuss some ethics that help client enterprises and MCC providers understand roles and obligations in an ever changing environment.


2019 ◽  
Vol 4 (4) ◽  
pp. 328-335
Author(s):  
Iryna HAVRYLKO

Introduction. The state of the modern economic environment requires the introduction of control in the management of agricultural enterprises. The control is aimed at identifying potential or existing adverse economic situations in the enterprise. The purpose of scientific research is to develop application areas of prognostic tools for monitoring and control in the management of agricultural enterprises. Results. The reason for the emergence and implementation of the control concept in the activities of agricultural enterprises is determined. It is established that the control system is characterized by recording information about past events and focus on the future. The reasons that determine the need for control are described. The role of control in the agricultural enterprise management is substantiated. The essence of control information technology in enterprise management is determined. An expert assessment of the cost structure for the implementation of the automated information system project was conducted. The approach to the choice of the automated information system is substantiated. Features and advantages of the most widespread automated information systems are described. It is proved that control is one of the most modern and effective enterprise management systems. The potential possibility of control to improve the performance of domestic agricultural enterprises has been identified. The role of control in marketing activity of agrarian business subjects in the conditions of market relations is allocated. An overview of the main control tools in the agricultural enterprises management is given. The purpose of control in the context of operational and strategic plans is outlined. Objects of analysis for formation of information base of control are allocated. The main tasks of marketing control in the agricultural enterprises activities are described. Conclusions. The integration of control and monitoring tools is necessary to obtain the desired effect in any management subsystem. Such integration has a positive effect on the economic efficiency of agricultural entities and helps to increase the level of decisions validity. Keywords: monitoring, control, enterprise management, agrarian business entity, automated information systems, marketing activities.


Author(s):  
S. R. Mani Sekhar ◽  
Sharmitha S. Bysani ◽  
Vasireddy Prabha Kiranmai

Security and privacy issues are the challenging areas in the field of internet of things (IoT) and fog computing. IoT and fog has become an involving technology allowing major changes in the field of information systems and communication systems. This chapter provides the introduction of IoT and fog technology with a brief explanation of how fog is overcoming the challenges of cloud computing. Thereafter, the authors discuss the different security and privacy issues and its related solutions. Furthermore, they present six different case studies which will help the reader to understand the platform of IoT in fog.


Sensors ◽  
2019 ◽  
Vol 19 (23) ◽  
pp. 5324 ◽  
Author(s):  
Tian Wang ◽  
Yucheng Lu ◽  
Zhihan Cao ◽  
Lei Shu ◽  
Xi Zheng ◽  
...  

Sensor-clouds are a combination of wireless sensor networks (WSNs) and cloud computing. The emergence of sensor-clouds has greatly enhanced the computing power and storage capacity of traditional WSNs via exploiting the advantages of cloud computing in resource utilization. However, there are still many problems to be solved in sensor-clouds, such as the limitations of WSNs in terms of communication and energy, the high latency, and the security and privacy issues due to applying a cloud platform as the data processing and control center. In recent years, mobile edge computing has received increasing attention from industry and academia. The core of mobile edge computing is to migrate some or all of the computing tasks of the original cloud computing center to the vicinity of the data source, which gives mobile edge computing great potential in solving the shortcomings of sensor-clouds. In this paper, the latest research status of sensor-clouds is briefly analyzed and the characteristics of the existing sensor-clouds are summarized. After that we discuss the issues of sensor-clouds and propose some applications, especially a trust evaluation mechanism and trustworthy data collection which use mobile edge computing to solve the problems in sensor-clouds. Finally, we discuss research challenges and future research directions in leveraging mobile edge computing for sensor-clouds.


2014 ◽  
Vol 543-547 ◽  
pp. 3632-3635
Author(s):  
Hui Juan Xie ◽  
Wei She ◽  
Chang Hao Han

Cloud computing system preserves the security and privacy of a user's data by replicating data among several clouds and by using the secret sharing approach. It uses the database management system DBMS (data source) to manage and control the operations between the clients and them ulti-clouds inside a cloud service provider [1]. Generally speaking, The Shamir's threshold scheme is suitable for the shares in the cloud computing. The Shamir's threshold scheme as a secret sharing scheme will attract more attention in the cloud computing in future.


Sign in / Sign up

Export Citation Format

Share Document