We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 November 2024
Reseach Article

A Review of Data Privacy Issues in Cloud Computing

by Mashael Al-zibali, Heba Algethmy, Fatima Bashammakh, Khadijah Jalal, Hemalatha M.
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 167 - Number 8
Year of Publication: 2017
Authors: Mashael Al-zibali, Heba Algethmy, Fatima Bashammakh, Khadijah Jalal, Hemalatha M.
10.5120/ijca2017914321

Mashael Al-zibali, Heba Algethmy, Fatima Bashammakh, Khadijah Jalal, Hemalatha M. . A Review of Data Privacy Issues in Cloud Computing. International Journal of Computer Applications. 167, 8 ( Jun 2017), 5-7. DOI=10.5120/ijca2017914321

@article{ 10.5120/ijca2017914321,
author = { Mashael Al-zibali, Heba Algethmy, Fatima Bashammakh, Khadijah Jalal, Hemalatha M. },
title = { A Review of Data Privacy Issues in Cloud Computing },
journal = { International Journal of Computer Applications },
issue_date = { Jun 2017 },
volume = { 167 },
number = { 8 },
month = { Jun },
year = { 2017 },
issn = { 0975-8887 },
pages = { 5-7 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume167/number8/27789-2017914321/ },
doi = { 10.5120/ijca2017914321 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:14:15.832588+05:30
%A Mashael Al-zibali
%A Heba Algethmy
%A Fatima Bashammakh
%A Khadijah Jalal
%A Hemalatha M.
%T A Review of Data Privacy Issues in Cloud Computing
%J International Journal of Computer Applications
%@ 0975-8887
%V 167
%N 8
%P 5-7
%D 2017
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Cloud computing has gained substantial research interest and with development, data security issues become more important. The term security has multiple facets such as confidentiality, availability and integrity. A perfect security solution must ensure all the security parameters effectively. With the growing adoption of cloud computing as a viable business proposition to reduce both infrastructure and operational costs, an essential requirement is to provide guidance on how to manage information security risks in the cloud. In this paper, most important security risk to cloud computing is discussed, privacy issue. Finally, a cloud computing framework and information asset classification model are proposed to assist cloud users when choosing cloud delivery services and deployment models based on cost, security and capability requirements. This paper focuses on the security of data, where the objectives of these various security and privacy related issues and the possible solutions in literature.

References
  1. Sood, S. (2012). A combined approach to ensure data security in cloud computing. Journal of Network and Computer Applications, 35(6), pp.1831-1838.
  2. Kshetri, N. (2013). Privacy and security issues in cloud computing: The role of institutions and institutional evolution. Telecommunications Policy, 37(4-5), pp.372-386.
  3. P. Mell & T. Grance, (2011), "The NIST Definition of Cloud Computing. National Institute of Standards and Technology.", US: National Institute of Standards and Technology.
  4. Hosted Cloud Computing, http://www.alchemysys.net/solutions/hosted-cloudcomputing/, 2013. (Access date: 24.08.2013).
  5. "The benefits and challenges of cloud computing", http://www.moorestephens.com/cloud computing_benefits ch allenges.aspxl, 2013. (Access date: 21.08.2013).
  6. Dean, J. and Ghemawat, S. 2008. MapReduce: simplified data processing on large clusters. Communication of ACM 51, 1 (Jan. 2008), 107-113.
  7. E. Stefanov, M. van Dijk, E. Shi et al., “Path oram: an extremely simple oblivious ram protocol,” in Proceedings of the ACM SIGSAC Conference on Computer & Communications Security, pp. 299–310, ACM, 2013.
  8. C. Cachin and M. Schunter, “A cloud you can trust,” IEEE Spectrum, vol. 48, no. 12, pp. 28–51, 2011.
  9. R. Ranchal, B. Bhargava, L. B. Othmane et al., “Protection of identity information in cloud computing without trusted third party,” in Proceedings of the 29th IEEE Symposium on Reliable Distributed Systems (SRDS ’10), pp. 368–372, November 2010.
  10. K. Hwang and D. Li, “Trusted cloud computing with secure resources and data coloring,” IEEE Internet Computing, vol. 14, no. 5, pp. 14–22, 2010.
  11. Cloud privacy: an empirical study of 20 cloud providers’terms and privacy policies—Part I
  12. S. Hussain, "Multilevel classification of security concerns in cloud computing", Applied Computing and Informatics, vol. 13, no. 1, pp. 57-65, 2017.
  13. Pfleeger SL (May/June 2009) Useful cybersecurity metrics. IEE IT Pro J 11(3):38–45
  14. S. Chaudhry, "An Overview On Current Trends, Technologies And Future Scope Of cloud computing", International Journal of Scientific & Engineering Research, vol. 4, no. 8, p. 1888, 2013.
Index Terms

Computer Science
Information Sciences

Keywords

Data Security Cloud Computing ORAM Data Framework.