scholarly journals Security and Privacy of Sensitive Data in Cloud Computing : A Survey of Recent Developments

Author(s):  
Ali Gholami ◽  
Erwin Laure
2019 ◽  
Vol 2019 ◽  
pp. 1-15 ◽  
Author(s):  
Yazan Al-Issa ◽  
Mohammad Ashraf Ottom ◽  
Ahmed Tamrawi

Cloud computing is a promising technology that is expected to transform the healthcare industry. Cloud computing has many benefits like flexibility, cost and energy savings, resource sharing, and fast deployment. In this paper, we study the use of cloud computing in the healthcare industry and different cloud security and privacy challenges. The centralization of data on the cloud raises many security and privacy concerns for individuals and healthcare providers. This centralization of data (1) provides attackers with one-stop honey-pot to steal data and intercept data in-motion and (2) moves data ownership to the cloud service providers; therefore, the individuals and healthcare providers lose control over sensitive data. As a result, security, privacy, efficiency, and scalability concerns are hindering the wide adoption of the cloud technology. In this work, we found that the state-of-the art solutions address only a subset of those concerns. Thus, there is an immediate need for a holistic solution that balances all the contradicting requirements.


2018 ◽  
Vol 7 (4.6) ◽  
pp. 241
Author(s):  
Dayaker P ◽  
Chandrasekhara Reddy T ◽  
Honey Diana P ◽  
A. Mallikarjun Reddy

Cloud Computing (CC) is reforming many biological communities by furnishing associations with registering assets including simple organization, network, design, Romanization, and adaptability. This change in perspective raises an expansive scope of security and protection issues that must be thought about. Multi-tenure, loss of control, and trust are entering challenges in cloud processing conditions. This paper surveys the current advancements and a wide show of both earlier and frontier extends on cloud security and protection. We classify the current look into as per the cloud reference engineering coordination, asset control, physical asset, and cloud benefit administration layers, in spite of inspecting the current improvements in security safeguarding touchy information approaches in CC, such as, security risk demonstrating and protection upgrading conventions and arrangements. 


Author(s):  
Jens Kohler ◽  
Kiril Simov ◽  
Thomas Specht

Cloud Computing becomes interesting for enterprises across all branches. Renting computing capabilities from external providers avoids initial investments, as only those resources have to be paid that were used eventually. Especially in the context of “Big Data” this pay-as-you-go accounting model is particularly important. The dynamically scalable resources from the Cloud enable enterprises to store or analyze these huge amounts of unstructured data without using their own hardware infrastructure. However, Cloud Computing is currently facing severe data security and protection issues. These challenges require new ways to store and analyze data, especially when huge data volumes with sensitive data are stored at external locations. The presented approach separates data on database table level into independent chunks and distributes them across several clouds. Hence, this work is a contribution to a more secure and resilient cloud architecture as multiple public and private cloud providers can be used independently to store data without losing data security and privacy constraints.


Author(s):  
Haifaa Jassim Muhasin ◽  
Rodziah Atan ◽  
Marzanah A. Jabar ◽  
Salfarina Abdullah

Cloud computing represents the most important shift in computing and information technology (IT). However, security and privacy remain the main obstacles to its widespread adoption. In this research we will review the security and privacy challenges that affect critical data in cloud computing and identify solutions that are used to address these challenges. Some questions that need answers are: (a) User access management, (b) Protect privacy of sensitive data, (c) Identity anonymity to protect the Identity of user and data file. To answer these questions, a systematic literature review was conducted and structured interview with several security experts working on cloud computing security to investigate the main objectives of proposed framework, a pilot study by using a structured questionnaire was conducted. Framework using multilevel to enhance management information system on sensitive data in cloud environment.


2013 ◽  
Vol 6 (2) ◽  
pp. 752-756
Author(s):  
Shyamlal Kumawat ◽  
Prof. Deepak Tomar

Cloud computing is a new paradigm in which dynamically scalable virtualized computing resources, services and information are provided as a service among the people and organizations across the globe over the Internet. The recent developments in cloud computing technology placed numerous challenges in the field of Cloud Computing, including data replication, consistency, reliability, availability and scalability of cloud resources, portability, trust, security, and privacy. Still most of the organizations are not adapting cloud computing due to lack of trust on service provider. This paper gives an overview of cloud computing, and discusses trust and related security challenges. The important elements of cloud environment, which shapes the users trust and provides a way of evaluating each elements importance, are emphasized. Although there are many technological approaches that can develop trust in cloud provider and improve cloud security, there are currently no one-size-fits-all solutions, and future work has to tackle challenges such as trust model for security, as well as suitable mechanisms for ensuring accountability in the cloud. As trust based schemes have been widely discussed and applied in a lot of cloud computing scenarios, becoming subject of scientific researches, this paper also presents a survey of few trust models.


2015 ◽  
pp. 1548-1560
Author(s):  
Hero Modares ◽  
Jaime Lloret ◽  
Amirhossein Moravejosharieh ◽  
Rosli Salleh

Cloud computing is a new and promising technology that is transforming the paradigm of traditional Internet computing and probably the whole IT industry. Cloud computing is predicted to expand in the mobile environment leveraging on the rapid advances in wireless access technologies. These mobile applications are built around mobile cloud computing techniques and models. In the Mobile Cloud environment, users can remotely store their data as well as enjoy high quality on-demand cloud applications without the limitations of having to purchase and maintain their own local hardware and software. However, data security is still a major concern and is the main obstacle preventing cloud computing from being more widely adopted. This concern originates from the fact that sensitive data stored in the public clouds is managed by commercial service providers who might not be totally trustworthy. As such, there are several security and privacy issues that need to be addressed. This chapter gives an overview on the cloud computing concept followed by a description on mobile cloud computing and the different security issues pertinent to the mobile cloud computing environment.


Author(s):  
Subarna Shakya

Cloud computing is advantageous in several applications. Data migration is constantly carried out to hybrid or public cloud. Certain large enterprises will not move their business-critical data and applications to the cloud. This is due to the concerns regarding data security and privacy protection. In this paper, we provide a data security analysis and solution for privacy protection framework during data migration. A Secure Socket Layer (SSL) is established and migration tickets with minimum privilege is introduced. Further, data encryption is done using Prediction Based Encryption (PBE). This system will be of use for healthcare systems and e-commerce systems that can store data regarding credit card details. We provide a strict separation between sensitive and non-sensitive data and provide encryption for the sensitive data.


2020 ◽  
Vol 10 (51) ◽  
pp. 212-222
Author(s):  
Boubakeur Annane ◽  
Adel Alti ◽  
Osman Ghazali

Recently, mobile computing is known as a fast-growing utilization of people's daily life. However, the main is the limited mobile devices’ resources such as processing capability, storage space and battery life. With the development of cloud computing, mobile devices’ resources are improved with the help of cloud services, which resulted an emerged technology named Mobile Cloud Computing (MCC). Although the MCC has several advantages for mobile users, it is also challenged by many critical issues like security and privacy of the mobile user's data that offloaded on the cloud’ servers and processed on the virtual machines (VMs). In virtualization, various investigations showed that malicious users are able to break down the cloud security methods by spreading their VMs in order to alter or violate the user sensitive data that executed on cloud’ VMs. This paper deeply analyzes the recent MCC based virtualization approaches and methods by criticizing them. We found out that no approach protects the data from being stolen while distributed VMs that deployed on different cloud servers exchanging data. Hence, the paper provides practical gaps related to virtualization in MCC and future perspectives.


Author(s):  
Hero Modares ◽  
Jaime Lloret ◽  
Amirhossein Moravejosharieh ◽  
Rosli Salleh

Cloud computing is a new and promising technology that is transforming the paradigm of traditional Internet computing and probably the whole IT industry. Cloud computing is predicted to expand in the mobile environment leveraging on the rapid advances in wireless access technologies. These mobile applications are built around mobile cloud computing techniques and models. In the Mobile Cloud environment, users can remotely store their data as well as enjoy high quality on-demand cloud applications without the limitations of having to purchase and maintain their own local hardware and software. However, data security is still a major concern and is the main obstacle preventing cloud computing from being more widely adopted. This concern originates from the fact that sensitive data stored in the public clouds is managed by commercial service providers who might not be totally trustworthy. As such, there are several security and privacy issues that need to be addressed. This chapter gives an overview on the cloud computing concept followed by a description on mobile cloud computing and the different security issues pertinent to the mobile cloud computing environment.


Sign in / Sign up

Export Citation Format

Share Document