A New Privacy Preserving Approach Used in Cloud Computing

2010 ◽  
Vol 439-440 ◽  
pp. 1318-1323
Author(s):  
Jian Wang ◽  
Yan Zhao ◽  
Jia Jin Le

Cloud computing seems to offer some incredible benefits for communicators: the availability of an incredible array of software applications, access to lightning-quick processing power, unlimited storage, and the ability to easily share and process information. All of this is available through your browser any time you can access the Internet. While this might all appear enticing, there remain issues of reliability, portability, privacy, and security. When our private data are out-sourced in cloud computing, we should guarantee the confidentiality and searchability of the private data. Our paper provides a new approach to avoid the disclosure of the sensitive attributes of users when user ask for service from the Service Provider (SP) in cloud computing.

2010 ◽  
Vol 12 (1) ◽  
Author(s):  
Willem J.J. Thompson ◽  
Jakobus S. Van der Walt

Cloud computing has become an important topic to research because of the value it can provide to the business. In this article, the researcher examined how Business Intelligence (BI) can be offered to the business over the Internet as a solution. BI environments, however, require a large capital layout to implement and support the large volumes of data that needs to be analysed to identify trends. It also requires enormous processing power which places pressure on the business resources. The goal of this article is to show how BI will be offered as a Software as a Service (SaaS) solution to the business. The BI SaaS solution will allow companies to reduce cost of having a BI solution and also having access to the latest software which will give the business an edge on their competition. By making use of a literature review the researcher were able gather and present evidence to support the value that the BI SaaS solution will add to the business and how such a BI SaaS solution will look like. As part of this research paper the researcher will also identify the challenges that the business will face when making us a BI SaaS solution.


Subject IoT ecosystem. Significance The market for the Internet of Things (IoT) or connected devices is expanding rapidly, with no manufacturer currently forecast to dominate the supply chain. This has fragmented the emerging IoT ecosystem, triggering questions about interoperability and cybersecurity of IoT devices. Impacts Firms in manufacturing, transportation and logistics and utilities are expected to see the highest IoT spending in coming years. The pace of IoT adoption is inextricably linked to that of related technologies such as 5G, artificial intelligence and cloud computing. Data privacy and security will be the greatest constraint to IoT adoption.


2020 ◽  
Vol 8 (2) ◽  
pp. 72-78
Author(s):  
C Vijai ◽  
D Joyce

In the current digital world, the Internet is changing our lives in terms of the way we work, learn, and interact. Cloud Computing has a platform for sharing resources that include infrastructures, software, applications; the cloud is the best way to integrate all departments using e-Governance and business. Many Governments facing critical challenges to maintain pending, unattended documents, reported to the authority, document proof of the statement, law, and order unable to solve over the year. Cloud-based e-governance plays a vital role in solve these issues helping to e-governance services. Citizens easily access government services and provide transparent activities with the help of cloud e-governance applications. This paper discusses cloud computing and cloud-based e-governance in India and to adopt cloud computing in e-Governance applications, challenges and also extended to the usage of cloud-based e-governance.


2010 ◽  
Vol 3 (1) ◽  
Author(s):  
Harry Katzan, Jr.

Cloud computing is an architecture for providing computing service via the Internet.  Use of the term “cloud” is a metaphor for the representation of the Internet used in most systems diagrams.  In this case, the Internet is the transport mechanism between a client and a server located somewhere in cyberspace, as compared to having computer applications residing on an “on premises” computer.  Adoption of cloud computing practically eliminates two ongoing problems in IT service provisioning: the upfront costs of acquiring computational resources and the time delay of building and deploying software applications.  This paper gives an ontological view of the subject in order to serve as a point of reference in the discipline and to facilitate ongoing technical development.


Author(s):  
Pappu Sowmya ◽  
R Kumar

Cloud computing is one of the trending technologies that provide boundless virtualized resources to the internet users as an important services through the internet, while providing the privacy and security. By using these cloud services, internet users get many parallel computing resources at low cost. It predicted that till 2016, revenues from the online business management spent $4 billion for data storage. Cloud is an open source platform structure, so it is having more chances to malicious attacks. Privacy, confidentiality, and security of stored data are primary security challenges in cloud computing. In cloud computing, ‘virtualization’ is one of the techniques dividing memory into different blocks. In most of the existing systems there is only single authority in the system to provide the encrypted keys. To fill the few security issues, this paper proposed a novel authenticated trust security model for secure virtualization system to encrypt the files. The proposed security model achieves the following functions: 1) allotting the VSM(VM Security Monitor) model for each virtual machine; 2) providing secret keys to encrypt and decrypt information by symmetric encryption.The contribution is a proposed architecture that provides a workable security that a cloud service provider can offer to its consumers. Detailed analysis and architecture design presented to elaborate security model.


Author(s):  
Manpreet Kaur Walia ◽  
Malka N. Halgamuge ◽  
Nadeesha D. Hettikankanamage ◽  
Craig Bellamy

Numerous organizations are using aspects of the cloud to store data, but as sensitive data is placed on the cloud, privacy and security become difficult to maintain. When users upload data to the cloud, they may become increasingly vulnerable to account hijacking, unauthorized access, and the data may become unavailable because of various technical reasons. Questions remain about the security of sensitive data in the cloud, and in this chapter, the authors perform an analysis of 36 peer reviewed publications describing 30 observations of cloud computing technology (2010-2017). In the articles, applications of cloud computing include, for instance, business (26%) and the internet of things (IoT; 2%), and the result suggests that some issues are unique to a particular domain (such as business, education, health) and some issues cross all domains. The results suggest that data integrity issues have the highest number of solutions whereas data breaches have the lowest number of solutions.


Author(s):  
Kurt Cagle

It usually starts with a coffeemaker. The number and variety of devices now connected to the internet is astonishing: computers and laptops, phones and tablets, of course, but also game consoles and televisions, heating and cooling systems, automobiles, sensors of every variety. Not far behind are watches, eye glasses, shoes, jackets, and fobs of every variety. Beyond simple connectivity, many of these devices carry significant processing power of their own: the ability to recognize faces, extract conversations from noisy rooms, or tell the difference between spoilt milk and stinky cheese in the refrigerator. Looking beyond the obvious concerns about privacy and security, if we want these devices to work for us as well as against us, they will have to be connected in ways that we can leverage. Using semantic technologies and SPARQL could save us from vendor or aggregator lock-in. Maybe.


2016 ◽  
Vol 34 (1) ◽  
pp. 44-63 ◽  
Author(s):  
Seung-Hyun Kim ◽  
Jin Ki Kim

The quantity and popularity of mobile cloud computing services have increased significantly. From the principal-agent perspective, this study proposes a model to determine the adoption of mobile cloud computing services. In the model, three uncertainty antecedents of mobile cloud computing utilization are included: fears of service provider opportunism, perceived information asymmetry, and information privacy and security concerns. Likewise, three motivators are included: trust, convenience, and social presence. Based on 263 observations of mobile cloud computing users, the study identifies that trust and convenience are motivators and perceived uncertainty is a mitigator for adopting mobile cloud computing services.


2019 ◽  
Vol 25 (3) ◽  
pp. 168-173
Author(s):  
Andrei Șandor

Abstract Nowadays, smart devices like computers, tablets, and smartphones allow transmitting the information everywhere, with high speed, over the World Wide Web. However, risks regarding data integrity, privacy and security when using the Internet, increased dramatically, as methods designed to exploit the system’s vulnerabilities are more and more sophisticated. Therefore the need for people working in professional environments to protect their private data when using unsecure connections, by employing advanced tools. There are multiple solutions, but we will focus on the use of virtualization software like VMware or Oracle Virtual Box, together with traditional privacy measures (use of proxies and VPN’s). Today’s smart devices store an important amount of data about their owners and, in most of the cases, people don’t even realize this. Installing and using protection means is often not enough. They have to be properly setup in order to ensure the desired level of security, or anonymity, when using the Internet, and require for the military personnel a good knowledge not only about cyber vulnerabilities and risks, but also technical capabilities and features of the employed security solutions. DISCLAIMER: This paper expresses the views, interpretations, and independent position of the authors. It should not be regarded as an official document, nor expressing formal opinions or policies, of NATO or the HUMINT Centre of Excellence (HCOE).


2013 ◽  
Vol 4 (1) ◽  
pp. 111-113
Author(s):  
Sarvesh Singh ◽  
Anupam Shukla ◽  
Ankit Sharma ◽  
Kalimullah Lone

Now a days cloud computing is best innovative technology in the field of IT. In its broadest usage, the term cloud computing refers to the delivery of IT resources over the internet as opposed to hosting and operating these resources locally, such as a college or university network. These resources can include application and services as well as infrastructure and services over the network. Any organization can purchase these resources on as needed basis and avoid the capital expenditure cost of software and hardware. Security is major problem in cloud computing, thus key distribution is important thing for managing security in cloud computing. In this paper we derived a proposed algorithms for managing keys in the cloud and also discuss uses cases for cloud computing.


Sign in / Sign up

Export Citation Format

Share Document