Security and Privacy Issues in Cloud Computing

2015 ◽  
pp. 1370-1414
Author(s):  
Jaydip Sen

Cloud computing transforms the way Information Technology (IT) is consumed and managed, promising improved cost efficiencies, accelerated innovation, faster time-to-market, and the ability to scale applications on demand (Leighton, 2009). According to Gartner, while the hype grew exponentially during 2008 and continued since, it is clear that there is a major shift towards the cloud computing model and that the benefits may be substantial (Gartner Hype-Cycle, 2012). However, as the shape of cloud computing is emerging and developing rapidly both conceptually and in reality, the legal/contractual, economic, service quality, interoperability, security, and privacy issues still pose significant challenges. In this chapter, the authors describe various service and deployment models of cloud computing and identify major challenges. In particular, they discuss three critical challenges: regulatory, security, and privacy issues in cloud computing. Some solutions to mitigate these challenges are also proposed along with a brief presentation on the future trends in cloud computing deployment.

2015 ◽  
pp. 1585-1630 ◽  
Author(s):  
Jaydip Sen

Cloud computing transforms the way Information Technology (IT) is consumed and managed, promising improved cost efficiencies, accelerated innovation, faster time-to-market, and the ability to scale applications on demand (Leighton, 2009). According to Gartner, while the hype grew exponentially during 2008 and continued since, it is clear that there is a major shift towards the cloud computing model and that the benefits may be substantial (Gartner Hype-Cycle, 2012). However, as the shape of cloud computing is emerging and developing rapidly both conceptually and in reality, the legal/contractual, economic, service quality, interoperability, security, and privacy issues still pose significant challenges. In this chapter, the authors describe various service and deployment models of cloud computing and identify major challenges. In particular, they discuss three critical challenges: regulatory, security, and privacy issues in cloud computing. Some solutions to mitigate these challenges are also proposed along with a brief presentation on the future trends in cloud computing deployment.


Author(s):  
Jaydip Sen

Cloud computing transforms the way Information Technology (IT) is consumed and managed, promising improved cost efficiencies, accelerated innovation, faster time-to-market, and the ability to scale applications on demand (Leighton, 2009). According to Gartner, while the hype grew exponentially during 2008 and continued since, it is clear that there is a major shift towards the cloud computing model and that the benefits may be substantial (Gartner Hype-Cycle, 2012). However, as the shape of cloud computing is emerging and developing rapidly both conceptually and in reality, the legal/contractual, economic, service quality, interoperability, security, and privacy issues still pose significant challenges. In this chapter, the authors describe various service and deployment models of cloud computing and identify major challenges. In particular, they discuss three critical challenges: regulatory, security, and privacy issues in cloud computing. Some solutions to mitigate these challenges are also proposed along with a brief presentation on the future trends in cloud computing deployment.


2021 ◽  
Author(s):  
Ramla Humayun

Review on Cloud-Computing and the security and privacy issues related with it.


Author(s):  
Hicham Amellal ◽  
Abdelmajid Meslouhi ◽  
Abderahim El Allati ◽  
Annas El Haddadi

With the advancement of communication and information technology, the internet has become used as a platform for computing and not only a way of communications networks. Accordingly, the large spread of cloud computing led to the emergence of different privacy implications and data security complexities. In order to enhance data security in the cloud, the authors propose in this chapter the use of an encryption box, which includes different cryptosystems. In fact, this step gives the user the opportunities to encrypt data with an unknown algorithm and makes a private key before the storage of data in the host company servers. Moreover, to manage the encryption database, the authors propose a quantum approach in search based on Grover's algorithm.


Author(s):  
S. R. Mani Sekhar ◽  
Sharmitha S. Bysani ◽  
Vasireddy Prabha Kiranmai

Security and privacy issues are the challenging areas in the field of internet of things (IoT) and fog computing. IoT and fog has become an involving technology allowing major changes in the field of information systems and communication systems. This chapter provides the introduction of IoT and fog technology with a brief explanation of how fog is overcoming the challenges of cloud computing. Thereafter, the authors discuss the different security and privacy issues and its related solutions. Furthermore, they present six different case studies which will help the reader to understand the platform of IoT in fog.


Author(s):  
Nida Kauser Khanum ◽  
Pankaj Lathar ◽  
G. M. Siddesh

Fog computing is an extension of cloud computing, and it is one of the most important architypes in the current world. Fog computing is like cloud computing as it provides data storage, computation, processing, and application services to end-users. In this chapter, the authors discuss the security and privacy issues concerned with fog computing. The issues present in cloud are also inherited by fog computing, but the same methods available for cloud computing are not applicable to fog computing due to its decentralized nature. The authors also discuss a few real-time applications like healthcare systems, intelligent food traceability, surveillance video stream processing, collection, and pre-processing of speech data. Finally, the concept of decoy technique and intrusion detection and prevention technique is covered.


Author(s):  
Amavey Tamunobarafiri ◽  
Shaun Aghili ◽  
Sergey Butakov

Cloud computing has been massively adopted in healthcare, where it attracts economic, operational, and functional advantages beneficial to insurance providers. However, according to Identity Theft Resource Centre, over twenty-five percent of data breaches in the US targeted healthcare. The HIPAA Journal reported an increase in healthcare data breaches in the US in 2016, exposing over 16 million health records. The growing incidents of cyberattacks in healthcare are compelling insurance providers to implement mitigating controls. Addressing data security and privacy issues before cloud adoption protects from monetary and reputation losses. This article provides an assessment tool for health insurance providers when adopting cloud vendor solutions. The final deliverable is a proposed framework derived from prominent cloud computing and governance sources, such as the Cloud Security Alliance, Cloud Control Matrix (CSA, CCM) v 3.0.1 and COBIT 5 Cloud Assurance.


2018 ◽  
Vol 7 (1.9) ◽  
pp. 238
Author(s):  
S. Iniyan ◽  
M. Senthilraja ◽  
R. Srinivasan ◽  
A. Palaniraj

Cell phones are turning into a basic piece of our day by day life because of most proficient and powerful specialized devices without time and space boundation. Everybody has a portable, tablet, tablet with calling office i.e. Fablet. Distributed computing (DC) has been broadly perceived as the cutting edge's registering foundation with the fast development of portable applications and the support of Cloud Computing for an assortment of administrations, the Mobile Cloud Computing (MCC) is presented as an incorporation of Cloud Computing into the Mobile Environment. Portable Cloud Computing is picking up stream. MCC is alluded to as the framework where both the information stockpiling and the information handling occur outside the cell phone. In MCC condition, Cloud Computing, Mobile Computing and Application confront a few difficulties like Mobile Computation Offloading, Seamless Connectivity, Vendor/Data Lock-in, Long WAN Latency, Live VM (Virtual Machine) relocation issues, Low Bandwidth, Energy-Efficient Transmissions and Trust-Security and Privacy Issues. In this paper, I have talked about around a few difficulties and issues identified with the Mobile Cloud Computing. This paper gives data about Mobile Cloud Computing Application, Security and Issues.


CCIT Journal ◽  
2012 ◽  
Vol 5 (2) ◽  
pp. 145-167
Author(s):  
Sudaryono Sudaryono ◽  
Diah Aryani ◽  
Ira Tyas Ningrum

Cloud computing is a technology that utilizes the internet services using a central server with the goal of maintaining a virtual nature of data and applications. The presence of cloud computing will obviously lead to changes in the workings of information technologysystems within an organization. This is because the concepts of cloud computing through virtualization, standardization and other fundamental features can reduce information technology costs, simplify the management of information technology services, andaccelerating service delivery. In general, cloud computing architecture consists of: (1) Infrastructure as a Service (IaaS), (2) Platform as a Service (PaaS), and (3) Software as a Service (SaaS). Characteristics of cloud computing are: (1) self-service (on demand self service), (2) broadband access (broadband access network), (3) clustered resource (resource pooling), (4) elastic (rapid elasticity), and (5) measured service (measuredservice). While the advantages of cloud computing is: (1) without any initial investment, (2) convert CAPEX into OPEX, (3) flexible and easily developed, (4) focus on the business, rather than information technology, and (5) of control and responsibility of service. Withcloud computing consumers free themselves from the responsibility for managing the stack of computing resources. Levels ranging from SaaS when it is completely free, PaaS while still must make an application, and IaaS are still busy with the operating system. Thiscontrasts with On-Premise to take care of all your own.


Sign in / Sign up

Export Citation Format

Share Document