Call for Paper - September 2020 Edition
IJCA solicits original research papers for the September 2020 Edition. Last date of manuscript submission is August 20, 2020. Read More

A Review of Data Privacy Issues in Cloud Computing

Print
PDF
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Year of Publication: 2017
Authors:
Mashael Al-zibali, Heba Algethmy, Fatima Bashammakh, Khadijah Jalal, Hemalatha M.
10.5120/ijca2017914321

Mashael Al-zibali, Heba Algethmy, Fatima Bashammakh, Khadijah Jalal and Hemalatha M.. A Review of Data Privacy Issues in Cloud Computing. International Journal of Computer Applications 167(8):5-7, June 2017. BibTeX

@article{10.5120/ijca2017914321,
	author = {Mashael Al-zibali and Heba Algethmy and Fatima Bashammakh and Khadijah Jalal and Hemalatha M.},
	title = {A Review of Data Privacy Issues in Cloud Computing},
	journal = {International Journal of Computer Applications},
	issue_date = {June 2017},
	volume = {167},
	number = {8},
	month = {Jun},
	year = {2017},
	issn = {0975-8887},
	pages = {5-7},
	numpages = {3},
	url = {http://www.ijcaonline.org/archives/volume167/number8/27789-2017914321},
	doi = {10.5120/ijca2017914321},
	publisher = {Foundation of Computer Science (FCS), NY, USA},
	address = {New York, USA}
}

Abstract

Cloud computing has gained substantial research interest and with development, data security issues become more important. The term security has multiple facets such as confidentiality, availability and integrity. A perfect security solution must ensure all the security parameters effectively. With the growing adoption of cloud computing as a viable business proposition to reduce both infrastructure and operational costs, an essential requirement is to provide guidance on how to manage information security risks in the cloud. In this paper, most important security risk to cloud computing is discussed, privacy issue. Finally, a cloud computing framework and information asset classification model are proposed to assist cloud users when choosing cloud delivery services and deployment models based on cost, security and capability requirements.

This paper focuses on the security of data, where the objectives of these various security and privacy related issues and the possible solutions in literature.

References

  1. Sood, S. (2012). A combined approach to ensure data security in cloud computing. Journal of Network and Computer Applications, 35(6), pp.1831-1838.
  2. Kshetri, N. (2013). Privacy and security issues in cloud computing: The role of institutions and institutional evolution. Telecommunications Policy, 37(4-5), pp.372-386.
  3. P. Mell & T. Grance, (2011), "The NIST Definition of Cloud Computing. National Institute of Standards and Technology.", US: National Institute of Standards and Technology.
  4. Hosted Cloud Computing, http://www.alchemysys.net/solutions/hosted-cloudcomputing/, 2013. (Access date: 24.08.2013).
  5. "The benefits and challenges of cloud computing", http://www.moorestephens.com/cloud computing_benefits ch allenges.aspxl, 2013. (Access date: 21.08.2013).
  6. Dean, J. and Ghemawat, S. 2008. MapReduce: simplified data processing on large clusters. Communication of ACM 51, 1 (Jan. 2008), 107-113.
  7. E. Stefanov, M. van Dijk, E. Shi et al., “Path oram: an extremely simple oblivious ram protocol,” in Proceedings of the ACM SIGSAC Conference on Computer & Communications Security, pp. 299–310, ACM, 2013.
  8. C. Cachin and M. Schunter, “A cloud you can trust,” IEEE Spectrum, vol. 48, no. 12, pp. 28–51, 2011.
  9. R. Ranchal, B. Bhargava, L. B. Othmane et al., “Protection of identity information in cloud computing without trusted third party,” in Proceedings of the 29th IEEE Symposium on Reliable Distributed Systems (SRDS ’10), pp. 368–372, November 2010.
  10. K. Hwang and D. Li, “Trusted cloud computing with secure resources and data coloring,” IEEE Internet Computing, vol. 14, no. 5, pp. 14–22, 2010.
  11. Cloud privacy: an empirical study of 20 cloud providers’terms and privacy policies—Part I
  12. S. Hussain, "Multilevel classification of security concerns in cloud computing", Applied Computing and Informatics, vol. 13, no. 1, pp. 57-65, 2017.
  13. Pfleeger SL (May/June 2009) Useful cybersecurity metrics. IEE IT Pro J 11(3):38–45
  14. S. Chaudhry, "An Overview On Current Trends, Technologies And Future Scope Of cloud computing", International Journal of Scientific & Engineering Research, vol. 4, no. 8, p. 1888, 2013.

Keywords

Data Security, Cloud Computing, ORAM, Data Framework.