Weitere Kapitel dieses Buchs durch Wischen aufrufen
Gathering personal information of individuals’, in return to provide different personalized services, continues to grow. The adaptability and flexibility of cloud that allows mobility of data access and multiple ownerships provide a favorable platform for users and service providers to adapt Cloud services for storing and accessing personal data. However data flow from one level to another service level of cloud may cause data loss or leakage and put the privacy of individuals at risk without them being aware of it. Ensuring privacy of information on Cloud, presents a major challenge to be tackled by future researchers. This paper aims at providing an overall picture of cloud privacy and security at its different level of architecture and discusses the proposed solutions. It will further provide detailed analyses of the various adopted techniques. We will also discuss Security-SLA as a security protection mechanism for cloud users. Further we will try to highlight the areas which can be further researched and make cloud a more secure place to store data.
Bitte loggen Sie sich ein, um Zugang zu diesem Inhalt zu erhalten
Sie möchten Zugang zu diesem Inhalt erhalten? Dann informieren Sie sich jetzt über unsere Produkte:
Y. Jadeja and K. Modi, “Cloud computing - concepts, architecture and challenges,” in 2012 International Conference on Computing, Electronics and Electrical Technologies (ICCEET), 2012, pp. 877–880.
G. Zhang, Y. Yang, X. Zhang, C. Liu, and J. Chen, “Key Research Issues for Privacy Protection and Preservation in Cloud Computing,” in 2012 Second International Conference on Cloud and Green Computing, 2012, pp. 47–54.
S. Hamouda, “Security and privacy in cloud computing,” 2012 Int. Conf. Cloud Comput. Technol. Appl. Manag., pp. 241–245, Dec. 2012.
S. Surianarayanan and T. Santhanam, “Security issues and control mechanisms in Cloud,” 2012 Int. Conf. Cloud Comput. Technol. Appl. Manag., pp. 74–76, Dec. 2012.
H. Takabi, J. B. D. Joshi, and G.-J. Ahn, “Security and Privacy Challenges in Cloud Computing Environments,” IEEE Secur. Priv. Mag., vol. 8, no. 6, pp. 24–31, Nov. 2010.
Q. Zhang, L. Cheng, and R. Boutaba, “Cloud computing: state-of-the-art and research challenges,” J. Internet Serv. Appl., vol. 1, no. 1, pp. 7–18, Apr. 2010.
C. Modi, D. Patel, B. Borisaniya, A. Patel, and M. Rajarajan, “A survey on security issues and solutions at different layers of Cloud computing,” J. Supercomput., vol. 63, no. 2, pp. 561–592, Oct. 2012.
S. M. Rahaman and M. Farhatullah, “PccP: A model for Preserving cloud computing Privacy,” 2012 Int. Conf. Data Sci. Eng., pp. 166–170, Jul. 2012.
S. De Capitani Di Vimercati, S. Foresti, and P. Samarati, “Managing and accessing data in the cloud: Privacy risks and approaches,” 7th Int. Conf. Risks Secur. Internet Syst. Cris. 2012, 2012.
K. Surya, M. Nivedithaa, S. Uma, and C. Valliyammai, “Security issues and challenges in cloud,” 2013 Int. Conf. Green Comput. Commun. Conserv. Energy, pp. 889–893, 2013.
D. Zissis and D. Lekkas, “Addressing cloud computing security issues,” Futur. Gener. Comput. Syst., vol. 28, no. 3, pp. 583–592, 2012.
P. Yadav and S. Sujata, “Security Issues in Cloud Computing Solution of DDOS and Introducing Two-Tier CAPTCHA,” Int. J. Cloud Comput. Serv. Archit., vol. 3, no. 3, pp. 25–40, 2013.
I. Roy, S. T. V. S. T. V Setty, A. Kilzer, V. Shmatikov, and E. Witchel, “Airavat: Security and privacy for MapReduce,” Proc. 7th USENIX Conf. Networked Syst. Des. Implement., pp. 20–20, 2010.
D. Chen and H. Zhao, “Data Security and Privacy Protection Issues in Cloud Computing,” 2012 Int. Conf. Comput. Sci. Electron. Eng., vol. 1, no. 973, pp. 647–651, 2012.
M. P. K. Shelke, M. S. Sontakke, and a D. Gawande, “Intrusion Detection System for Cloud Computing,” Int. J. Sci. Technol. Res., vol. 1, no. 4, pp. 67–71, 2012.
H. Mohamed, L. Adil, T. Saida, and M. Hicham, “A collaborative intrusion detection and Prevention System in Cloud Computing,” in 2013 Africon, 2013, pp. 1–5.
C. N. Modi, D. R. Patel, A. Patel, and M. Rajarajan, “Integrating Signature Apriori based Network Intrusion Detection System (NIDS) in Cloud Computing,” Procedia Technol., vol. 6, pp. 905–912, 2012.
L. Chen and D. B. Hoang, “Novel Data Protection Model in Healthcare Cloud,” in 2011 IEEE International Conference on High Performance Computing and Communications, 2011, pp. 550–555.
H. Tianfield, “Security issues in cloud computing,” 2012 IEEE Int. Conf. Syst. Man, Cybern., pp. 1082–1089, Oct. 2012.
M. Hoehl, “Proposal for standard Cloud Computing Security SLAs - Key Metrics for Safeguarding Confidential Data in the Cloud.”.
R. Schmidt, “Conceptualisation and Lifecycle of Cloud Based Information Systems,” 2012 IEEE 16th Int. Enterp. Distrib. Object Comput. Conf. Work., pp. 104–113, 2012.
K. Bernsmed, M. G. Jaatun, P. H. Meland, and A. Undheim, “Security SLAs for Federated Cloud Services,” in 2011 Sixth International Conference on Availability, Reliability and Security, 2011, pp. 202–209.
M. Jaatun, K. Bernsmed, and A. Undheim, “Security SLAs–An Idea Whose Time Has Come?,” Multidiscip. Res. Pract. Inf. Syst., pp. 123–130, 2012.
S. A. de Chaves, C. B. Westphall, and F. R. Lamin, “SLA Perspective in Security Management for Cloud Computing,” in 2010 Sixth International Conference on Networking and Services, 2010, pp. 212–217.
M. Rak, N. Suri, J. Luna, D. Petcu, V. Casola, and U. Villano, “Security as a Service Using an SLA-Based Approach via SPECS,” Requir. Eng. Cloud Comput. (RECC - CloudCom), vol. 2, pp. 1–6, 2013.
- Progressing the Security Landscape of Cloud by Incorporating Security Service Level Agreement (Sec-SLA)
- Springer Singapore
Neuer Inhalt/© ITandMEDIA