Skip to main content

2015 | OriginalPaper | Buchkapitel

7. Cloud Computing and Security in the Future

verfasst von : Nigel McKelvey, Kevin Curran, Benny Gordon, Edward Devlin, Kenneth Johnston

Erschienen in: Guide to Security Assurance for Cloud Computing

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

We are starting to depend more and more on ‘cloud’ technology, in business and in our own personal lives. With so much personal data being stored in our personal clouds, questions are being asked about where the responsibility lies for the protection of data. For instance, is it with the consumer or with the provider? People have a right to know where their files are being stored and what is protecting them. The same goes for the consumer. They are obligated to ensure that their passwords are of a good strength and that they are safe while browsing the web, especially on public networks. The personal cloud industry is on the rise, and if the experts are correct in their predictions, the business world will be a better place for it, better in terms of portability and flexibility. The power to set your office up wherever you happen to be sitting, anywhere in the world, will be what personal cloud providers are offering. This is the future for cloud computing. Security and privacy are now more relevant than ever. This chapter examines the issues around cloud data protection and security and also investigates if the current Data Protection Act defines sufficient guidelines for data controllers on how they should collect and store user information in relation to thin-based clients using online or cloud-based service or if a lack of clarity in the Data Protection Act could cause these services to misuse the user’s data.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
3.
Zurück zum Zitat Behl A, Behl K (2012, Oct. 30 2012–Nov. 2 2012) An analysis of cloud computing security issues. Paper presented at the Information and Communication Technologies (WICT), 2012 World Congress on Behl A, Behl K (2012, Oct. 30 2012–Nov. 2 2012) An analysis of cloud computing security issues. Paper presented at the Information and Communication Technologies (WICT), 2012 World Congress on
7.
Zurück zum Zitat Chen D, Hong Z (2012, 23–25 March 2012) Data security and privacy protection issues in cloud computing. Paper presented at the Computer Science and Electronics Engineering (ICCSEE), 2012 International Conference on, Hangzhou, China Chen D, Hong Z (2012, 23–25 March 2012) Data security and privacy protection issues in cloud computing. Paper presented at the Computer Science and Electronics Engineering (ICCSEE), 2012 International Conference on, Hangzhou, China
11.
Zurück zum Zitat Dinadayalan P, Jegadeeswari S, Gnanambigai D (2014, Feb. 27 2014–March 1 2014) Data security issues in cloud environment and solutions. Paper presented at the Computing and Communication Technologies (WCCCT), 2014 World Congress on, Tiruchirappalli, India Dinadayalan P, Jegadeeswari S, Gnanambigai D (2014, Feb. 27 2014–March 1 2014) Data security issues in cloud environment and solutions. Paper presented at the Computing and Communication Technologies (WCCCT), 2014 World Congress on, Tiruchirappalli, India
12.
Zurück zum Zitat Djemame K, Armstrong D, Guitart J, Macias M (2014) A risk assessment framework for cloud computing. Cloud Computing, IEEE Transactions on, PP(99), 1–1 Djemame K, Armstrong D, Guitart J, Macias M (2014) A risk assessment framework for cloud computing. Cloud Computing, IEEE Transactions on, PP(99), 1–1
14.
Zurück zum Zitat Grance T, Mell P (2011) The NIST definition of cloud computing. National Institute for Standards and Technology, Gaithersburg, Tamil Nadu, India Grance T, Mell P (2011) The NIST definition of cloud computing. National Institute for Standards and Technology, Gaithersburg, Tamil Nadu, India
15.
Zurück zum Zitat Homer T (2014) 2020 vision for cloud services to the enterprise what service should the enterprise expect and demand by 2020?, 1st edn. [ebook] EMEA, Quinta do Lago Homer T (2014) 2020 vision for cloud services to the enterprise what service should the enterprise expect and demand by 2020?, 1st edn. [ebook] EMEA, Quinta do Lago
18.
Zurück zum Zitat Iyler K, Easwar D (2013) Cloud computing and modelling of cash flows. In: International conference on business analytics, Lisbon, Portugal, 18–21 January 2013, pp 34–42 Iyler K, Easwar D (2013) Cloud computing and modelling of cash flows. In: International conference on business analytics, Lisbon, Portugal, 18–21 January 2013, pp 34–42
19.
Zurück zum Zitat Jadeja Y, Modi K (2012, 21–22 March 2012) Cloud computing – concepts, architecture and challenges. Paper presented at the Computing, Electronics and Electrical Technologies (ICCEET), 2012 International Conference on Jadeja Y, Modi K (2012, 21–22 March 2012) Cloud computing – concepts, architecture and challenges. Paper presented at the Computing, Electronics and Electrical Technologies (ICCEET), 2012 International Conference on
21.
Zurück zum Zitat Keshavarzi A, Haghighat AT, Bohlouli M (2013, 12–14 Sept. 2013) Research challenges and prospective business impacts of cloud computing: a survey. Paper presented at the Intelligent Data Acquisition and Advanced Computing Systems (IDAACS), 2013 IEEE 7th International Conference on, Berlin, Germany Keshavarzi A, Haghighat AT, Bohlouli M (2013, 12–14 Sept. 2013) Research challenges and prospective business impacts of cloud computing: a survey. Paper presented at the Intelligent Data Acquisition and Advanced Computing Systems (IDAACS), 2013 IEEE 7th International Conference on, Berlin, Germany
22.
Zurück zum Zitat Kulkarni G, Chavan N, Chandorkar R, Waghmare R, Palwe R (2012) Cloud security challenges. Paper presented at the Telecommunication Systems, Services, and Applications (TSSA), 2012 7th international conference on, New York, 30–31 Oct 2012 Kulkarni G, Chavan N, Chandorkar R, Waghmare R, Palwe R (2012) Cloud security challenges. Paper presented at the Telecommunication Systems, Services, and Applications (TSSA), 2012 7th international conference on, New York, 30–31 Oct 2012
26.
Zurück zum Zitat Rai A, Sharma S (2013) Privacy issues regarding personal data in cloud computing, 1st edn. International Journal of Advanced Research in Computer Science, New York, USA Rai A, Sharma S (2013) Privacy issues regarding personal data in cloud computing, 1st edn. International Journal of Advanced Research in Computer Science, New York, USA
27.
Zurück zum Zitat Robinson N (2011) The cloud, 1st edn. Rand, Santa Monica Robinson N (2011) The cloud, 1st edn. Rand, Santa Monica
29.
Zurück zum Zitat Shetty S (2013) Gartner says cloud computing will become the bulk of new IT spend by 2016. Analysts examine cloud strategies and adoption at gartner symposium Shetty S (2013) Gartner says cloud computing will become the bulk of new IT spend by 2016. Analysts examine cloud strategies and adoption at gartner symposium
30.
Zurück zum Zitat Subashini S, Kavitha V (2011) A survey on security issues in service delivery models of cloud computing. J Netw Comput Appl 34(1):1–11CrossRef Subashini S, Kavitha V (2011) A survey on security issues in service delivery models of cloud computing. J Netw Comput Appl 34(1):1–11CrossRef
31.
Zurück zum Zitat Sugumaran M, Murugan BB, Kamalraj D (2014) An architecture for data security in cloud computing, computing and communication technologies (WCCCT), 2014 World Congress on, Delhi, India, 27 February 2014–1 March 2014, pp 252–255. doi:10.1109/WCCCT.2014.53 Sugumaran M, Murugan BB, Kamalraj D (2014) An architecture for data security in cloud computing, computing and communication technologies (WCCCT), 2014 World Congress on, Delhi, India, 27 February 2014–1 March 2014, pp 252–255. doi:10.​1109/​WCCCT.​2014.​53
32.
Zurück zum Zitat Tomonari K, Yukio E (2010) Achieving a “Personal Cloud” environment, 1st edn. NEC Technical Journal Tomonari K, Yukio E (2010) Achieving a “Personal Cloud” environment, 1st edn. NEC Technical Journal
Metadaten
Titel
Cloud Computing and Security in the Future
verfasst von
Nigel McKelvey
Kevin Curran
Benny Gordon
Edward Devlin
Kenneth Johnston
Copyright-Jahr
2015
DOI
https://doi.org/10.1007/978-3-319-25988-8_7