Skip to main content
Top

2011 | OriginalPaper | Chapter

19. Privacy and Security Requirements of Data Intensive Computing in Clouds

Authors : Arash Nourian, Muthucumaru Maheswaran

Published in: Handbook of Data Intensive Computing

Publisher: Springer New York

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

The scale and cost efficiencies provided by clouds make them ideal platforms for handling data intensive applications in variety of different sectors including e-health, e-commerce, and surveillance applications. This chapter investigates the privacy and security issues of large data sets that are stored and processed in cloud computing systems. If the experience gained from web-based transaction management systems is any indication, the safety of data held by cloud computing systems is not impregnable. There are various factors contributing to the data insecurity including the data handling policies adopted by the cloud operators, best practices adopted by the cloud provider in recycling used storage elements, and characteristics of the data handled by the clouds.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
2.
go back to reference M. Armbrust, A. Fox, R. Griffith, A. D. Joseph, R. Katz, A. Konwinski, G. Lee, D. Patterson, A. Rabkin, I. Stoica, and M. Zaharia, “Above the Clouds: A Berkeley View of Cloud Computing,” University of California at Berkeley, Tech. Rep., Feb. 2009. M. Armbrust, A. Fox, R. Griffith, A. D. Joseph, R. Katz, A. Konwinski, G. Lee, D. Patterson, A. Rabkin, I. Stoica, and M. Zaharia, “Above the Clouds: A Berkeley View of Cloud Computing,” University of California at Berkeley, Tech. Rep., Feb. 2009.
4.
go back to reference D. Abramson, R. Buyya, and J. Giddy, “A computational economy for grid computing and its implementation in the nimrod-g resource broker,” in Future Generation Computer Systems (FGCS) Journal, vol. 18, no. 8, 2002, pp. 1061–1074. D. Abramson, R. Buyya, and J. Giddy, “A computational economy for grid computing and its implementation in the nimrod-g resource broker,” in Future Generation Computer Systems (FGCS) Journal, vol. 18, no. 8, 2002, pp. 1061–1074.
5.
go back to reference R. T. Kouzes, G. A. Anderson, S. T. Elbert, I. Gorton, and D. K. Gracio, “The changing paradigm of data-intensive computing,” Computer, vol. 42, pp. 26–34, 2009.CrossRef R. T. Kouzes, G. A. Anderson, S. T. Elbert, I. Gorton, and D. K. Gracio, “The changing paradigm of data-intensive computing,” Computer, vol. 42, pp. 26–34, 2009.CrossRef
6.
go back to reference P. Mell and T. Grace, “The nist definition of cloud computing, national institute of standards and technology,” 2009. P. Mell and T. Grace, “The nist definition of cloud computing, national institute of standards and technology,” 2009.
7.
go back to reference C. Wang, Q. Wang, K. Ren, and W. Lou, “Ensuring data storage security in cloud computing,” Cryptology ePrint Archive, Report 2009/081, 2009. C. Wang, Q. Wang, K. Ren, and W. Lou, “Ensuring data storage security in cloud computing,” Cryptology ePrint Archive, Report 2009/081, 2009.
9.
go back to reference R. L. Grossman and Y. Gu, “On the varieties of clouds for data intensive computing,” Mar. 2009. R. L. Grossman and Y. Gu, “On the varieties of clouds for data intensive computing,” Mar. 2009.
10.
go back to reference T. Wood, G. Tarasuk-levin, P. Shenoy, P. Desnoyers, E. Cecchet, and M. D. Corner, “Memory buddies: Exploiting page sharing for smart colocation,” in 5th ACM International Conference on Virtual Execution Environments, 2009. T. Wood, G. Tarasuk-levin, P. Shenoy, P. Desnoyers, E. Cecchet, and M. D. Corner, “Memory buddies: Exploiting page sharing for smart colocation,” in 5th ACM International Conference on Virtual Execution Environments, 2009.
11.
go back to reference D. S. Linthicum, Cloud Computing and SOA Convergence in Your Enterprise: A Step-by-Step Guide, 1st ed. Addison-Wesley Professional, 2009. D. S. Linthicum, Cloud Computing and SOA Convergence in Your Enterprise: A Step-by-Step Guide, 1st ed. Addison-Wesley Professional, 2009.
13.
go back to reference C. A. Yfoulis and A. Gounaris, “Tc3 health case study: Amazon web services,” 2009. C. A. Yfoulis and A. Gounaris, “Tc3 health case study: Amazon web services,” 2009.
14.
go back to reference R. Gellman, “Privacy in the clouds: Risks to privacy and confidentiality from cloud computing,” Tech. Rep., Feb. 2009. R. Gellman, “Privacy in the clouds: Risks to privacy and confidentiality from cloud computing,” Tech. Rep., Feb. 2009.
15.
go back to reference D. Nurmi, R. Wolski, C. Grzegorczyk, G. Obertelli, S. Soman, L. Youseff, and D. Zagorodnov, “Eucalyptus: A technical report on an elastic utility computing architecture linking your programs to useful systems,” 2008. D. Nurmi, R. Wolski, C. Grzegorczyk, G. Obertelli, S. Soman, L. Youseff, and D. Zagorodnov, “Eucalyptus: A technical report on an elastic utility computing architecture linking your programs to useful systems,” 2008.
17.
go back to reference J. Dean and S. Ghemawat, “Mapreduce: simplified data processing on large clusters,” Commununications of the ACM, vol. 51, January 2008. J. Dean and S. Ghemawat, “Mapreduce: simplified data processing on large clusters,” Commununications of the ACM, vol. 51, January 2008.
18.
go back to reference D. Borthakur, The Hadoop Distributed File System: Architecture and Design, The Apache Software Foundation, 2007. D. Borthakur, The Hadoop Distributed File System: Architecture and Design, The Apache Software Foundation, 2007.
Metadata
Title
Privacy and Security Requirements of Data Intensive Computing in Clouds
Authors
Arash Nourian
Muthucumaru Maheswaran
Copyright Year
2011
Publisher
Springer New York
DOI
https://doi.org/10.1007/978-1-4614-1415-5_19

Premium Partner