CFP last date
20 December 2024
Reseach Article

Ensuring Security and Privacy for Cloud-based E-Services

by Khadijah M. Alzhrani, Fahd S. Alotaibi
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 149 - Number 11
Year of Publication: 2016
Authors: Khadijah M. Alzhrani, Fahd S. Alotaibi
10.5120/ijca2016911597

Khadijah M. Alzhrani, Fahd S. Alotaibi . Ensuring Security and Privacy for Cloud-based E-Services. International Journal of Computer Applications. 149, 11 ( Sep 2016), 8-13. DOI=10.5120/ijca2016911597

@article{ 10.5120/ijca2016911597,
author = { Khadijah M. Alzhrani, Fahd S. Alotaibi },
title = { Ensuring Security and Privacy for Cloud-based E-Services },
journal = { International Journal of Computer Applications },
issue_date = { Sep 2016 },
volume = { 149 },
number = { 11 },
month = { Sep },
year = { 2016 },
issn = { 0975-8887 },
pages = { 8-13 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume149/number11/26039-2016911597/ },
doi = { 10.5120/ijca2016911597 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:54:27.809825+05:30
%A Khadijah M. Alzhrani
%A Fahd S. Alotaibi
%T Ensuring Security and Privacy for Cloud-based E-Services
%J International Journal of Computer Applications
%@ 0975-8887
%V 149
%N 11
%P 8-13
%D 2016
%I Foundation of Computer Science (FCS), NY, USA
Abstract

E-services are becoming more and more a cloud-based with the growth of Cloud Computing and E-society. The aim of this paper is to illustrate those applications and the main challenges that face the adaptation of Cloud Computing, which are mainly privacy and security issues, and what can be done to solve them and prevent problems.

References
  1. Alshwaier, M., Youssef, Y., and Emam, A. 2012. A new trend for e-learning in ksa using educational clouds.
  2. Avram, M. G. 2014. Advantages and challenges of adopting cloud computing from an enterprise perspective.
  3. Venugopal, S., Broberg, J., Brandic, I., and Buyya, R. 2009. Cloud computing and emerging it platforms: Vision, hype, and reality for delivering computing as the 5th utility.
  4. Gasiorowski-Denis, E. 2015. Trust and confidence in cloud privacy.
  5. Gens, F. 2009. New IDC IT cloud services survey: Top benefits and challenges.
  6. Jin, H., Zou, D. and Dai, W. 2016. Theory and methodology of research on cloud security.
  7. Information and Privacy Commissioner of Ontario.2016. Thinking about clouds? privacy, security and compliance considerations for Ontario public sector institutions.
  8. Intel. How cloud computing can help solve. healthcare's looming it crisis.
  9. Jirasek, V. 2012. Cloud security and security architecture.
  10. Durairaj, M. and Manimaran, A.2015. A study on security issues in cloud based e-learning.
  11. Moura, M. and Hutchison, D. 6016. Review and analysis of networking challenges in cloud computing. Journal of Network and Computer Applications,60:113_129.
  12. NIST. 2011.The NIST definition of cloud computing.
  13. Kumar, S., Kumar, N. K., and Kumar, A.2014. Cloud computing services and its application.
  14. Executive Office of the President. 2014. Big data: Seizing opportunities, preserving values.
  15. The office of the national coordinator for health information technology. 2015. Guide to privacy and security of electronic health information.
  16. Rahimi, R. M., Ren, J., Harold, L. C., Vasilakos, A. V., and Venkatasubramanian, N. 2014. Mobile cloud computing: A survey, state of art and future directions. Mobile Networks and Applications, 19(2):133_143.
  17. Right Scale. 2016. Cloud computing trends: 2016 state of the cloud survey.
  18. Right Scale. 2016. State of the cloud report.
  19. Rong, C., Nguyen, S., and Jaatun, M. G. 2013. Beyond lightning: A survey on security challenges in cloud computing. Computers & Electrical Engineering, 39(1):47_54.
  20. The office of national coordinator for health information technology. 2015. Guide to privacy and security of electronic health information.
  21. Campo, J. V., Pegueroles, J., Hernández-Serrano, J., and Soriano, M. 2014. Doccloud: A document recommender system on cloud computing with plausible deniability. Information Sciences, 258:387_402.
  22. Wei, L., Zhu, H., Cao, Z., Dong, X., Jia, W., Chen, Y., and Vasilakos, A. V. 2014. Security and privacy for storage and computation in cloud computing. Information Sciences, 258:371_386.
  23. Youssef, A. E. 2012. Exploring cloud computing services and applications. Journal of Emerging Trends in Computing and Information Sciences, 3(6):838_847.
  24. Yu, Y., Niu, L., Yang, G., Mu, Y., and Susilo, W. 2014. On the security of auditing mechanisms for secure cloud storage. Future Generation Computer Systems, 30:127_132.
  25. Zissis, D. and Lekkas, D. 2012. Addressing cloud computing security issues. Future Generation computer systems, 28(3):583_592.
  26. WatsoN, A. 2013.Converged Everything, Converged Infrastructure delivering business value and competitive advantage.
Index Terms

Computer Science
Information Sciences

Keywords

Cloud Computing (CC) Mobile Cloud Computing(MCC) Cloud-based E-services E-health E-government E-learning Privacy Security E-government E-learning Privacy Security.