Towards a Risk-Based Approach to Achieving Data Confidentiality in Cloud Computing

Author(s):  
Sharad Mehrotra
2018 ◽  
Vol 7 (2.21) ◽  
pp. 355
Author(s):  
P Sheela Gowr ◽  
N Kumar

Cloud computing was a hasting expertise which has innovated to a collection of new explores. A sub-ordinate device for Information services, it has an ability towards encourage development by feeding convenient environments for a choice of forms of development is different sequence. Clouds usually consider being eco-friendly, however keep it has open to the diversity of some security issues to can change together the feeder as well as users of these cloud services. In this issue are principally associated to the protection of the information flow throughout also being store in the cloud, with simple problems along with data ease of use, data right to use and data confidentiality. Data encryption and service authentication scheme has been initiated by the industries to deal with them. In this paper analyse and examine different issues on security beside with the different procedure worn by the industries to solve these effects. 


2012 ◽  
Vol 9 (3) ◽  
pp. 67-83 ◽  
Author(s):  
Stephen S. Yau ◽  
Ho G. An ◽  
Arun Balaji Buduru

In current cloud computing systems, because users’ data is stored and processed by computing systems managed and operated by various service providers, users are concerned with the risks of unauthorized usage of their sensitive data by various entities, including service providers. The current cloud computing systems protect users’ data confidentiality from all entities, except service providers. In this paper, an approach is presented for improving the protection of users’ data confidentiality in cloud computing systems from all entities, including service providers. The authors’ approach has the following features: (1) separation of cloud application providers, data processing service providers and data storage providers, (2) anonymization of users’ identities, (3) grouping cloud application components and distributing their execution to distinct cloud infrastructures of data processing service providers, and (4) use of data obfuscation and cryptography for protecting the sensitive data from unauthorized access by all entities, including service providers. The proposed approach ensures that users’ sensitive data can be protected from their service providers even if the users do not have full cooperation from their service providers.


2018 ◽  
Vol 134 ◽  
pp. 83-90 ◽  
Author(s):  
Khalid El Makkaoui ◽  
Abdellah Ezzati ◽  
Abderrahim Beni-Hssane ◽  
Slimane Ouhmad

2014 ◽  
Vol 1 (2) ◽  
pp. 13-19
Author(s):  
Dileep Kumar Reddy P ◽  
◽  
R. Praveen Sam ◽  
Shoba Bindu C ◽  
◽  
...  

2019 ◽  
Vol 8 (4) ◽  
pp. 3440-3443

Cloud computing is attaining a pace for resolving complex computing problems. It is basically an abstracted layer of technology which has three service models: Infrastructure as a Service (IaaS), (Software as a Service) SaaS and (Platform as a Service) PaaS, which provide infrastructure, software and a platform to end-user. On the contrary, there are lots of issues which include energy efficiency, cloud integrity, data recovery, backup, etc. Security and privacy issues like data confidentiality and integrity are the most critical ones. This paper highlights the security issues related to data stored and data access from back end (service provider). It collates each and every application related to cloud and available techniques to resolve some issues. Very less research work has been done on applications and security issues of cloud computing together. This article is an analysis of cloud computing applications and security issues as it is used to a great extent. In future this paper will help research community to grab information regarding applications and techniques to resolve the issues related to Cloud computing.


Author(s):  
Mariam Kiran

Recent technological advances have led to a knowledge-driven economy, where we expect and need information accessible from anywhere. Connected Government (c-government) enables governments to communicate through technology with their citizens and other governments. The use of ICT and emerging technologies has made this relationship much more effective. Although, most research is focused towards infrastructures and flexible services provision, form, there is a need for a layer of legal regulations to be followed. Legal issues can further aid in the provision of transparency, data confidentiality and encryption techniques. This is where Cloud Computing infrastructures can play an important role. This chapter looks into the Cloud infrastructure and discusses how Clouds are being used for connected government services, while further extending the discussion by looking at the legal issues surrounding the use of Clouds, particularly focusing on the UK G-Cloud as a case study.


Author(s):  
Aleksandar Hudic ◽  
Shareeful Islam ◽  
Peter Kieseberg ◽  
Sylvi Rennert ◽  
Edgar R. Weippl

Sign in / Sign up

Export Citation Format

Share Document