Security and Privacy in Cloud Computing: Technical Review

2021 ◽  
Vol 14 (1) ◽  
pp. 11
Author(s):  
Yunusa Simpa Abdulsalam ◽  
Mustapha Hedabou

Advances in the usage of information and communication technologies (ICT) has given rise to the popularity and success of cloud computing. Cloud computing offers advantages and opportunities for business users to migrate and leverage the scalability of the pay-as-you-go price model. However, outsourcing information and business applications to the cloud or a third party raises security and privacy concerns, which have become critical in adopting cloud implementation and services. Researchers and affected organisations have proposed different security approaches in the literature to tackle the present security flaws. The literature also provides an extensive review of security and privacy issues in cloud computing. Unfortunately, the works provided in the literature lack the flexibility in mitigating multiple threats without conflicting with cloud security objectives. The literature has further focused on only highlighting security and privacy issues without providing adequate technical approaches to mitigate such security and privacy threats. Conversely, studies that offer technical solutions to security threats have failed to explain how such security threats exist. This paper aims to introduce security and privacy issues that demand an adaptive solution approach without conflicting with existing or future cloud security. This paper reviews different works in the literature, taking into account its adaptiveness in mitigating against future reoccurring threats and showing how cloud security conflicts have invalidated their proposed models. The article further presents the security threats surrounding cloud computing from a user perspective using the STRIDE approach. Additionally, it provides an analysis of different inefficient solutions in the literature and offers recommendations in terms of implementing a secure, adaptive cloud environment.

Author(s):  
Shaveta Bhatia

 The epoch of the big data presents many opportunities for the development in the range of data science, biomedical research cyber security, and cloud computing. Nowadays the big data gained popularity.  It also invites many provocations and upshot in the security and privacy of the big data. There are various type of threats, attacks such as leakage of data, the third party tries to access, viruses and vulnerability that stand against the security of the big data. This paper will discuss about the security threats and their approximate method in the field of biomedical research, cyber security and cloud computing.


2021 ◽  
Author(s):  
Ramla Humayun

Review on Cloud-Computing and the security and privacy issues related with it.


Author(s):  
Ruhanita Maelah ◽  
Mohammed Fadhil Farhan Al Lami ◽  
Gheyath Ghassan

Small-to-medium enterprises (SMEs) stand to benefit and become competitive by utilizing information and communication technologies. Despite constraints faced by SMEs in adopting management accounting practices, it is imperative that management accounting information (MAI) be utilized to attain effective and efficient business operations. SMEs can benefit from cloud computing through the reduction of operating costs related to new technology adoption. In acknowledging the significance of cloud computing and MAI, this study examined the extent of MAI usefulness and qualities of cloud computing among Malaysian SMEs. Through self-administered questionnaires, a total of 105 respondents’ feedback was analyzed. The usefulness of MAI is a result of the availability and importance of each dimension’s items (timeliness, aggregation, scope, and integration). The findings also showed that the qualities of cloud computing (agility, assurance, accountability, financial, security and privacy, performance, and usability) can be considered as important; thus indicating the extent of technology utilization among SMEs.     Keywords: Management accounting information, cloud computing, small-to-medium enterprises.


2016 ◽  
Vol 14 (1) ◽  
pp. 34-44 ◽  
Author(s):  
Michael B. Spring

The history of modern standards development provides support for the argument that the process of standardization has evolved in response to crises and opportunities. In the information and communication technologies (ICT) sector, many new groups have become involved in standards setting. In a period of rapid change, standards development in these areas has focused primarily on the provision of functionality. That is, there are few overarching roadmaps for development and issues such as security and interoperability are of less concern for many of the new standards developers. In addition, new oversight structures have emerged that appear to be more responsive to the particular needs of developers in the ICT arena. It may be important for nation states to consider assisting in roadmap development in the ICT arena to insure security and privacy issues are addressed such that these increasingly essential systems are less vulnerable.


Author(s):  
Ionica Oncioiu ◽  
Anca Gabriela Petrescu

Along with the incontestable benefits for the modern society, the information and communication technology developments induce new vulnerabilities. Mobile computing devices, cloud computing, and privacy issues are just a few elements that should be taken into account when shaping the modern information security that is essential to our modern way of life. Since information security risks are rapidly evolving and taking new forms, the real benefits of information and communication technologies may be exploited only if trust is built on every layer of responsibility. This study explores of the present main information security threats faced by Romanian organizations, as well as of the attitude of Romanian organizations towards information security, as resulted from a research and detailed survey questionnaire performed by the authors. Following the results of this research, the authors propose a way to improve the security posture of Romanian organizations, as well as knowledge, capabilities, and decision making of business managers.


Author(s):  
Nabeel Khan ◽  
Adil Al-Yasiri

Cloud Computing allows firms to outsource their entire information technology (IT) process, allowing them to concentrate more on their core business to enhance their productivity and innovation in offering services to customers. It allows businesses to cut down heavy cost incurred over IT infrastructure without losing focus on customer needs. However, to a certain limit adopting Cloud computing has struggled to grow among many established and growing organizations due to several security and privacy related issues. Throughout the course of this study several interviews were conducted, with cloud developers and security experts, and the literature was reviewed. This study enabled us to understand, current and future, security and privacy challenges with cloud computing by providing suitable solutions to identified challenges. The outcome of this study led to identification of total 18, current and future, security issues affecting several attributes of cloud computing. In this process of identification, the author also found mitigation techniques to avert these security issues. A security guide is formulated which enables organizations to be aware of security challenges, vulnerabilities and techniques to evade them.


2021 ◽  
Author(s):  
Ramla Humayun

Review on Cloud-Computing and the security and privacy issues related with it.


2018 ◽  
pp. 268-285 ◽  
Author(s):  
Nabeel Khan ◽  
Adil Al-Yasiri

Cloud Computing allows firms to outsource their entire information technology (IT) process, allowing them to concentrate more on their core business to enhance their productivity and innovation in offering services to customers. It allows businesses to cut down heavy cost incurred over IT infrastructure without losing focus on customer needs. However, to a certain limit adopting Cloud computing has struggled to grow among many established and growing organizations due to several security and privacy related issues. Throughout the course of this study several interviews were conducted, with cloud developers and security experts, and the literature was reviewed. This study enabled us to understand, current and future, security and privacy challenges with cloud computing by providing suitable solutions to identified challenges. The outcome of this study led to identification of total 18, current and future, security issues affecting several attributes of cloud computing. In this process of identification, the author also found mitigation techniques to avert these security issues. A security guide is formulated which enables organizations to be aware of security challenges, vulnerabilities and techniques to evade them.


2018 ◽  
Vol 10 (10) ◽  
pp. 3513 ◽  
Author(s):  
Maja Steen Møller ◽  
Anton Stahl Olafsson

In the unfolding reality of advanced internet-based communication tools, the possibilities and implications for citizens’ e-engagement is revealing. The paper introduces different examples of e-tools used in participatory urban green infrastructure governance. E-tools here includes various location-based service apps, and volunteered geographic information stemming from social media activities, as well as public participation geographic information system approaches. Through an analytical framework describing five categories, we discuss the different scopes and possibilities, as well as general barriers and problems to participatory e-tools. We suggest some basic premises for the application of e-tools in urban green infrastructure governance and discussed future development of this field. E-tools can allow interaction between citizens, public authorities, and other stakeholders; however, research on the implications of such location-based governance is needed to make full use of the rapid on-going development of such information and communication technologies, and to avoid possible pitfalls. We suggest that future research into this area of environmental–social–technical solutions should test, discuss, and develop frameworks and standards, for the use of different e-tools in combination with offline approaches.


Author(s):  
S. R. Mani Sekhar ◽  
Sharmitha S. Bysani ◽  
Vasireddy Prabha Kiranmai

Security and privacy issues are the challenging areas in the field of internet of things (IoT) and fog computing. IoT and fog has become an involving technology allowing major changes in the field of information systems and communication systems. This chapter provides the introduction of IoT and fog technology with a brief explanation of how fog is overcoming the challenges of cloud computing. Thereafter, the authors discuss the different security and privacy issues and its related solutions. Furthermore, they present six different case studies which will help the reader to understand the platform of IoT in fog.


Sign in / Sign up

Export Citation Format

Share Document