Security and Privacy in Cloud Computing


Received: 17 Jun 2022
Revised: 21 Jul 2022
Accepted: 23 Aug 2022

Z. Lashkaripour

  Download Full Text

 

https://dx.doi.org/10.22034/JPMIS.2022.23052203

  XML Files


Abstract

Various reasons such as maintaining security or even financial and technological resource limitations might be the objective of organizations or individuals to shift to the cloud computing environment. After that the main burden of preserving the security of the data and privacy of the consumer is on the service provider. Due to the variety of technologies used in a cloud environment a broad range of challenges exist that are threats for the security and privacy of the whole environment. For this reason, after presenting the features of a cloud computing environment we have introduced the security and privacy challenges and their possible solutions. Therefore, this paper could be a very good starting point since each side-consumer and provider-would be aware of their rights and responsibilities.

Keywords: Cloud computing, security, privacy, policy.


  Download Full Text

 

References

[1] Zissis, D. and Lekkas, D., 2012. “Addressing cloud computing security issues”. Future Generation computer systems, 28(3), pp.583-592.

[2] Dillon, T., Wu, C. and Chang, E., 2010, April. “Cloud computing: issues and challenges”. In 2010 24th IEEE international conference on advanced information networking and applications pp. 27-33. Ieee.

[3] Mell, P. and Grance, T., 2011. “The NIST definition of cloud computing”.

[4] Grobauer, B., Walloschek, T. and Stocker, E., 2011. “Understanding cloud computing vulnerabilities”. IEEE Security & Privacy, 9(2), pp.50-57.

[5] Wang, L., Von Laszewski, G., Younge, A., He, X., Kunze, M., Tao, J. and Fu, C., 2010. “Cloud computing: a perspective study. New Generation Computing”, 28(2), pp.137-146.

[6] Youseff, L., Butrico, M. and Da Silva, D., 2008. “Toward a unified ontology of cloud computing”. In 2008 Grid Computing Environments Workshop pp. 1-10. IEEE.

[7] James, BD., 2010. “Security and privacy challenges in cloud computing environments”.

[8] Armbrust, M., Fox, A., Griffith, R., Joseph, A.D., Katz, R., Konwinski, A., Lee, G., Patterson, D., Rabkin, A., Stoica, I. and Zaharia, M., 2010. “A view of cloud computing”. Communications of the ACM, 53(4), pp.50-58.

 

 

 


636
Related Content

Rosepub - Journal management system