To see the other types of publications on this topic, follow the link: Privacy in Cloud computing.

Journal articles on the topic 'Privacy in Cloud computing'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Privacy in Cloud computing.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

C, Yashaswini. "Privacy Regulations for Cloud Computing." International Journal of Research Publication and Reviews 5, no. 11 (2024): 4045–47. https://doi.org/10.55248/gengpi.5.1124.3312.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Al-Museelem, Waleed, and Chun Lin Li. "Data Security and Data Privacy in Cloud Computing." Advanced Materials Research 905 (April 2014): 687–92. http://dx.doi.org/10.4028/www.scientific.net/amr.905.687.

Full text
Abstract:
Cloud computing has led to the development of IT to more sophisticated levels by improving the capacity and flexibility of data storage and by providing a scalable computation and processing power which matches the dynamic data requirements. Cloud computing has many benefits which has led to the transfer of many enterprise applications and data to public and hybrid clouds. However, many organizations refer to the protection of privacy and the security of data as the major issues which prevent them from adopting cloud computing. The only way successful implementation of clouds can be achieved i
APA, Harvard, Vancouver, ISO, and other styles
3

Chen, Chih-Yung, and Jih-Fu Tu. "A Novel Cloud Computing Algorithm of Security and Privacy." Mathematical Problems in Engineering 2013 (2013): 1–6. http://dx.doi.org/10.1155/2013/871430.

Full text
Abstract:
The emergence of cloud computing has simplified the flow of large-scale deployment distributed system of software suppliers; when issuing respective application programs in a sharing clouds service to different user, the management of material becomes more complex. Therefore, in multitype clouds service of trust environment, when enterprises face cloud computing, what most worries is the issue of security, but individual users are worried whether the privacy material will have an outflow risk. This research has mainly analyzed several different construction patterns of cloud computing, and qui
APA, Harvard, Vancouver, ISO, and other styles
4

Srivastava, Aryan, and Pawan Singh. "Security Issues in Cloud Computing." Journal of Management and Service Science (JMSS) 2, no. 1 (2022): 1–11. http://dx.doi.org/10.54060/jmss/002.01.003.

Full text
Abstract:
Cloud computing has aided the evolution of IT by improving the ability and flexibility of data storage, as well as providing scalable computation and processing capabilities that match the dynamic data sets. Many corporate application programs have been transferred to public and hybrid clouds due to the multiple benefits of cloud computing. On the other hand, many businesses identify privacy and data security as major concerns that prevent them from adopting cloud computing. The only way to achieve successful cloud implementation is to improve and manage data security and privacy in the cloud.
APA, Harvard, Vancouver, ISO, and other styles
5

Ashwini, Jilla, and C. Sreedhar K. "Fog Based Three-Layer Architecture for Privacy Preserving." International Journal of Engineering and Advanced Technology (IJEAT) 9, no. 5 (2020): 1082–85. https://doi.org/10.35940/ijeat.E1010.069520.

Full text
Abstract:
Fog computing is one of the most latest technology used by the cloud providers to safe guard the user data and service provider’s data servers. Fog computing acts as mediator between hardware and remote servers or cloud servers. Cloud computing still has the lot of vulnerabilities. Privacy to the users data is main issue in the present cloud computing. Whenever users uploads data into cloud server then user will lose their right on their own data because users don’t know about, what cloud providers do with users data, they can sell the users data for their own profit without knowin
APA, Harvard, Vancouver, ISO, and other styles
6

Bhansali, Aayushi. "Cloud Security and Privacy." International Journal for Research in Applied Science and Engineering Technology 11, no. 8 (2023): 1539–42. http://dx.doi.org/10.22214/ijraset.2023.55416.

Full text
Abstract:
Abstract: Over the last decade, cloud computing has grown and evolved significantly. It provides cost-effective solutions as well as a wide range of adaptable services. Many businesses are using cloud services. Users mostly use cloud services to save data in a virtual environment. Users have no knowledge of or influence over what happens in the cloud, and nothing in the cloud is visible to them, which raises security and privacy problems. Malicious administrators can mess with the integrity, privacy, virtual machines, and volatile confidentiality of cloud services. Clouds are vulnerable to hac
APA, Harvard, Vancouver, ISO, and other styles
7

Javaid, Muhammad Adeel. "Cloud Computing Security and Privacy." Computer Science and Information Technology 2, no. 5 (2014): 219–31. http://dx.doi.org/10.13189/csit.2014.020501.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Govinda, K., and E. Sathiyamoorthy. "Privacy Preservation of a Group and Secure Data Storage in Cloud Environment." Cybernetics and Information Technologies 15, no. 1 (2015): 46–54. http://dx.doi.org/10.1515/cait-2015-0005.

Full text
Abstract:
Abstract Cloud computing has become a victorious archetype for data storage, as well as for computation purposes. Greater than ever it concerns user’s privacy, so that data security in a cloud is increasing day by day. Ensuring security and privacy for data organization and query dispensation in the cloud is important for superior and extended uses of cloud based technologies. Cloud users can barely have the full benefits of cloud computing if we can ensure the real user’s privacy and his data security concerns this approach along with storing thin-skinned personal information in databases and
APA, Harvard, Vancouver, ISO, and other styles
9

Gulshan, Kumar* Dr.Vijay Laxmi. "A REVIEW ON SECURITY AND PRIVACY ISSUES IN CLOUD COMPUTING." INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY 6, no. 4 (2017): 192–96. https://doi.org/10.5281/zenodo.546305.

Full text
Abstract:
Cloud computing is an upcoming paradigm that offers tremendous advantages in economical aspects, such as reduced time to market, flexible computing capabilities, and limitless computing power. To use the full potential of cloud computing, data is transferred, processed and stored by external cloud providers. However, data owners are very skeptical to place their data outside their own control sphere. Cloud computing is a new development of grid, parallel, and distributed computing with visualization techniques. It is changing the IT industry in a prominent way. Cloud computing has grown due to
APA, Harvard, Vancouver, ISO, and other styles
10

Deepak, Kumar Malviya, and Kumar Lilhore Umesh. "Survey on Security Threats in Cloud Computing." International Journal of Trend in Scientific Research and Development 3, no. 1 (2018): 1222–26. https://doi.org/10.31142/ijtsrd19172.

Full text
Abstract:
Cloud computing is a new and innovative technology, which serves resources as a service to cloud user. Cloud computing technology provides optimum utilization of computing resources in less cost, which attract organization to be part of cloud customer market. Day by day cloud users are getting increases. Cloud serves IaaS, PaaS, SaaS and DaaS as a service on various private public, community and hybrid cloud levels. On cloud data is stores over the network and this network is shared and access by various cloud users, so data security and privacy are key concerns. Due to shared architecture of
APA, Harvard, Vancouver, ISO, and other styles
11

Seema, G. Bavachkar, S. Shewale Ajinkya, Patil Ashish, and Shiradwade Shridhar. "Mobile Cloud Computing and its Privacy." Recent Trends in Cloud Computing and Web Engineering 1, no. 3 (2019): 1–3. https://doi.org/10.5281/zenodo.3571842.

Full text
Abstract:
<em>This paper is generally based on the mobile cloud computing. Need for mobile cloud computing as an aspect of the app industry deals with the mobile cloud apps. Where you can store your data on the cloud. What you can do in future with it. There are many security problems which are dangerous to our data anyone can steal our data. So in this paper you can know how secure your information.</em>
APA, Harvard, Vancouver, ISO, and other styles
12

Maheswari, J. Uma, S. Vijayalakshmi, Rajiv Gandhi N, Laith H. Alzubaidi, Khonimkulov Anvar, and R. Elangovan. "Data Privacy and Security in Cloud Computing Environments." E3S Web of Conferences 399 (2023): 04040. http://dx.doi.org/10.1051/e3sconf/202339904040.

Full text
Abstract:
The globe has adopted the cloud computing environment, which organizes data and manages space for data storage, processing, and access. This technical development has brought up questions regarding data security and privacy in cloud computing environments, though. The purpose of this abstract is to offer a thorough review of the issues, solutions, and future developments related to data privacy and security in cloud computing. Keeping data private and secure while it is being processed and stored in outside data centres is the main difficulty in cloud computing systems. The abstract discusses
APA, Harvard, Vancouver, ISO, and other styles
13

Coss, David Lewis, and Gurpreet Dhillon. "Cloud privacy objectives a value based approach." Information & Computer Security 27, no. 2 (2019): 189–220. http://dx.doi.org/10.1108/ics-05-2017-0034.

Full text
Abstract:
Purpose To effectively develop privacy policies and practices for cloud computing, organizations need to define a set of guiding privacy objectives that can be applied across their organization. It is argued that it is important to understand individuals’ privacy values with respect to cloud computing to define cloud privacy objectives. Design/methodology/approach For the purpose of this study, the authors adopted Keeney’s (1994) value-focused thinking approach to identify privacy objectives with respect to cloud computing. Findings The results of this study identified the following six fundam
APA, Harvard, Vancouver, ISO, and other styles
14

., Mageto Stephen N., and Dr N. V. Balaji . "Enhanced Data Security in Cloud Computing: Survey." International Journal of Engineering Technology and Management Sciences 6, no. 1 (2022): 1–6. http://dx.doi.org/10.46647/ijetms.2022.v06i01.001.

Full text
Abstract:
-The next era in the advent of the internet is internet based computing also known as cloud computing. It has been the emphasis in recent years, but security concerns are one among the most important impediments to the rise of cloud computing.. It essentially sends user data and application programs to massive data centers, i.e. a distant cloud, where consumers have little control and data management may be insecure. However, numerous security issues raised by the cloud's unique nature must be addressed and fully acknowledged.. Amongst the most critical concerns which must be tackled is the se
APA, Harvard, Vancouver, ISO, and other styles
15

Zeel, B. Dabhi, and Kulkarni Akanksha. "Data Security in Cloud Computing." International Journal of Innovative Science and Research Technology 7, no. 12 (2023): 982–86. https://doi.org/10.5281/zenodo.7505036.

Full text
Abstract:
The importance of data security has been a significant problem in information technology. Because the data is spread out all over the place in the field of technology, it becomes extremely problematic. Users&#39; primary worries regarding cloud computing are related to data security and privacy security. Despite the fact that numerous approaches to the issue of cloud computing have been studied in academic research and clinical trials, data security and privacy protection are becoming increasingly crucial for the future use of cloud computing technology in business, industry, and government. I
APA, Harvard, Vancouver, ISO, and other styles
16

R, Kamatchi, Kimaya Ambekar, and Yash Parikh. "Security Mapping of a Usage Based Cloud System." Network Protocols and Algorithms 8, no. 4 (2017): 56. http://dx.doi.org/10.5296/npa.v8i4.10240.

Full text
Abstract:
The popularity of cloud computing technology is increasing tremendously. There is no disagreement about the effectiveness of the data storage and the data transition techniques of clouds. Earlier it used distributed computing just for sharing resources. However, with technology advancement, cloud computing has become more and more powerful as well as more adaptive in various business sectors. However, with the increase in number of users, there is also an increase in the security threats affecting the users’ privacy, personal data, identity and confidentiality. In this paper, we have aimed at
APA, Harvard, Vancouver, ISO, and other styles
17

Yin, Myo Kay Khine Thaw, and Myat Nwe Win Khin. "Understanding the Determinants of Security and Privacy in Cloud Computing Architecture." International Journal of Trend in Scientific Research and Development 3, no. 5 (2019): 881–84. https://doi.org/10.5281/zenodo.3589827.

Full text
Abstract:
Cloud computing is an emerging model of business computing. Cloud computing is a service, which offers customers to work over the internet. It simply states that cloud computing means storing and accessing the data and programs over the internet rather than the computer&#39;s hard disk. The data can be anything such as music, files, images, documents, and many more. The user can access the data from anywhere just with the help of an internet connection. To access cloud computing, the user should register and provide with ID and password for security reasons. The speed of transfer depends on va
APA, Harvard, Vancouver, ISO, and other styles
18

Xie, Hui Juan, Wei She, and Chang Hao Han. "Shamir's Threshold Scheme to Ensure Security in Cloud Computing Services." Applied Mechanics and Materials 543-547 (March 2014): 3632–35. http://dx.doi.org/10.4028/www.scientific.net/amm.543-547.3632.

Full text
Abstract:
Cloud computing system preserves the security and privacy of a user's data by replicating data among several clouds and by using the secret sharing approach. It uses the database management system DBMS (data source) to manage and control the operations between the clients and them ulti-clouds inside a cloud service provider [1]. Generally speaking, The Shamir's threshold scheme is suitable for the shares in the cloud computing. The Shamir's threshold scheme as a secret sharing scheme will attract more attention in the cloud computing in future.
APA, Harvard, Vancouver, ISO, and other styles
19

Wang, Jian, and Xiao Yu Qi. "Novel Private Matching Protocol Suitable for Cloud Computing." Applied Mechanics and Materials 373-375 (August 2013): 1678–81. http://dx.doi.org/10.4028/www.scientific.net/amm.373-375.1678.

Full text
Abstract:
In cloud computing users always hope their identity can’t be disclosed while they access the cloud service. Although there are many research focus on the security issue in cloud, none work has been carefully addressed about the proposed problem. To allay users' concerns of disclosure of their identity, we proposed a novel approach based on private matching protocol to protect users’ sensitive information in cloud computing. Besides, this paper also states the new problem of privacy indexing in the internet and proves that our proposed protocol can avoid privacy indexing in the cloud.
APA, Harvard, Vancouver, ISO, and other styles
20

Yadav, Paras Kumar, Harshit Pandey, and Mrs Himani Tyagi. "Security and Privacy Challenges in Mobile Cloud Computing." International Scientific Journal of Engineering and Management 03, no. 12 (2024): 1–6. https://doi.org/10.55041/isjem02183.

Full text
Abstract:
Abstract-Mobile cloud computing combines mobile devices, cloud computing, and wireless technology. It is an important technology today but faces challenges like storage, security, privacy, and connectivity issues. This technology helps solve these problems, especially in education, business, and healthcare. Security is a major concern in mobile cloud computing due to risks in different sectors. Ensuring data protection and privacy is essential for its success. Connectivity issues can also affect performance. More research is needed to find solutions to these challenges. The future of mobile cl
APA, Harvard, Vancouver, ISO, and other styles
21

Patil, Ketaki, Saisrijan Gupta, Anjali Nair, and Vitthal Gutte. "Cloud, Fog and Edge Computing: Security and Privacy Concerns." International Journal for Research in Applied Science and Engineering Technology 10, no. 5 (2022): 286–91. http://dx.doi.org/10.22214/ijraset.2022.41862.

Full text
Abstract:
Abstract: The use of different cloud computing technologies increased with the rise of 5G technology and IoT. Cloud computing also enabled intense data processing and warehousing. Data storage in the cloud comes with several issues and security concerns. Moreover, when the volume of data created by every device increases, the conventional cloud computing architecture fails to address concerns such as excessive latency, bandwidth limits, and resource constraints. As a result, new computational paradigms such as edge and fog computing have been proposed to address the former's issues. Both of th
APA, Harvard, Vancouver, ISO, and other styles
22

Muhammad Suleiman, Muhammad, Surajo Sa’id, and Rahama Babale Shu'aibu. "PRIVACY AND SECURITY CONCERNS IN THE ADOPTION OF CLOUD COMPUTING TECHNOLOGY." Journal of Applied Science, Information and Computing 2, no. 1 (2021): 33–42. http://dx.doi.org/10.59568/jasic-2021-2-1-05.

Full text
Abstract:
In the field of computing, data security has always been a serious concern. It becomes considerably more severe in the cloud-computing technology environment because data is stored in several locations around the world. Users' biggest concerns about cloud technology are data privacy protection. Privacy and security protection are becoming more crucial for the future growth of cloud computing technology in government, industry, and business, even though numerous techniques on cloud computing themes have been researched in both academics and industries. In the cloud architecture, data security a
APA, Harvard, Vancouver, ISO, and other styles
23

Vumo, Ambrosio Patricio. "A Study into Privacy and Legal Issues in Cloud Computing: The Mozambican Context." International Conference on Cyber Warfare and Security 19, no. 1 (2024): 511–17. http://dx.doi.org/10.34190/iccws.19.1.2095.

Full text
Abstract:
During the last 10 years, Cloud computing has become an evolving technology providing several benefits such as cost reduction and high flexibility. However, one of the main challenges related to cloud computing is related to data security and privacy. Despite this, worldwide many countries, specially developed countries have adopted cloud computing technology. In Africa, specifically in the Southern African Development Community (SADC), Mozambique is one the countries who has recently adopted cloud computing technology. However, on the contrary to countries such as Mauritius and South Africa,
APA, Harvard, Vancouver, ISO, and other styles
24

Gao, Lei, and Alisa G. Brink. "A Content Analysis of the Privacy Policies of Cloud Computing Services." Journal of Information Systems 33, no. 3 (2018): 93–115. http://dx.doi.org/10.2308/isys-52188.

Full text
Abstract:
ABSTRACT Cloud computing is increasingly popular across all sectors and offers users unparalleled scalability, elasticity, and flexibility. However, the rapid transition toward cloud computing has raised privacy and confidentiality concerns. Cloud service providers can access users' data, and private information may be accidentally or deliberately disclosed or used for unauthorized purposes. Privacy policies are intended to provide users with information about privacy practices and their privacy options. This study performs content analysis of the privacy policies of 47 cloud service providers
APA, Harvard, Vancouver, ISO, and other styles
25

Nadia Tabassum, Humaria Naeem, and Asma Batool. "The Data Security and multi-cloud Privacy concerns." International Journal for Electronic Crime Investigation 7, no. 1 (2023): 49–58. http://dx.doi.org/10.54692/ijeci.2023.0701128.

Full text
Abstract:
The security, privacy, and challenges of establishing trust in cloud computing are examined in this paper. It discusses the issues that must be resolved to guarantee the security, privacy, and reliability of data processed, stored, and shared in cloud architecture. Cloud computing is a rapidly growing field, with more and more individuals and organizations adopting it as their preferred data storage and processing method. However, with this growth comes the need for increased attention to privacy, security, and trust in cloud computing. In this paper, we review the current state of privacy, se
APA, Harvard, Vancouver, ISO, and other styles
26

Saja, J. Mohammed, and B. Taha Dujan. "From cloud computing security towards homomorphic encryption: A comprehensive review." TELKOMNIKA (Telecommunication, Computing, Electronics and Control) 19, no. 4 (2021): 1152–61. https://doi.org/10.12928/telkomnika.v19i4.16875.

Full text
Abstract:
&ldquo;Cloud computing&rdquo; is a new technology that revolutionized the world of communications and information technologies. It collects a large number of possibilities, facilities, and developments, and uses the combining of various earlier inventions into something new and compelling. Despite all features of cloud computing, it faces big challenges in preserving data confidentiality and privacy. It has been subjected to numerous attacks and security breaches that have prompted people to hesitate to adopt it. This article provided comprehensive literature on the cloud computing concepts wi
APA, Harvard, Vancouver, ISO, and other styles
27

Yashasvi, Sharma, and Sharma Yashraj. "SECURITY ISSUES AND ENVIRONMENTS IN CLOUD COMPUTING." International Journal of Research - Granthaalayah 7, no. 7 (2019): 398–404. https://doi.org/10.5281/zenodo.3365361.

Full text
Abstract:
This paper will explore the service models and background and also presents the existing research issues implicating in cloud computing such as security, privacy, reliability, and so on. Cloud Computing, Architecture and Characteristics of Cloud Computing and also different Services and Deployment models provided in Cloud Computing. This paper provides a better understanding of the cloud computing and identifies important research issues in this rapidly growing area of computer science.
APA, Harvard, Vancouver, ISO, and other styles
28

Mahajan, Rini, and Dr Dheerendra Singh. "Cloud Computing Issues." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 4, no. 2 (2005): 626–30. http://dx.doi.org/10.24297/ijct.v4i2c2.4185.

Full text
Abstract:
Abstract- Cloud computing is Internet-based computing, whereby shared resources, software and information, are provided to computers and devices on-demand, like the electricity grid. It aims to construct a perfect system with powerful computing capability through a large number of relatively low-cost computing entity, and using the advanced business models like SaaS (Software as a Service), PaaS (Platform as a Service), IaaS (Infrastructure as a Service) to distribute the powerful computing capacity to end users’ hands. Cloud Computing represents a new computing model that poses many demandi
APA, Harvard, Vancouver, ISO, and other styles
29

Amandeep, Kaur, and Nagpal Pooja. "A SURVEY ON LOAD BALANCING IN CLOUD COMPUTING USING ARTIFICIAL INTELLIGENCE TECHNIQUES." International Journal of Multidisciplinary Research and Modern Education 2, no. 2 (2016): 418–23. https://doi.org/10.5281/zenodo.192681.

Full text
Abstract:
<em>Since its inception, the cloud computing paradigm has gained the widespread popularity in the industry and academia. The economical, scalable, expedient, ubiquitous, and on-demand access to shared resources are some of the characteristics of the cloud that have resulted in shifting the business processes to the cloud.</em><em> The cloud computing attracts the attention of research community due to its potential to provide tremendous benefits to the industry and the community. But with the increasing demand of the cloud computing, there are some challenges also. The main cloud computing cha
APA, Harvard, Vancouver, ISO, and other styles
30

Dai, Xue Bing, Zhao Jing Wang, and Yan Zhang. "Data Security and Privacy Protection of Cloud Computing." Advanced Materials Research 846-847 (November 2013): 1570–73. http://dx.doi.org/10.4028/www.scientific.net/amr.846-847.1570.

Full text
Abstract:
Data security and privacy protection of cloud computing as a new IT application mode are the most valued and concerned issues of the cloud user,and thus of utmost significance to the security of cloud computing. This paper describes and analyzes in detail the risks of data security and privacy showup brought by cloud computing,discusses the protective approaches of data security and privacy in cloud computing environment. Furthermore, this paper based on the newly developed fully homomorphism encryption then proposed a data security scheme which can operate encrypted data directly on cloud ser
APA, Harvard, Vancouver, ISO, and other styles
31

Deepak, Jain*1 &. Nidhi Singh2. "PROVIDING SECURITY USING ENCRYPTION AND SPLITTING TECHNIQUE OVER CLOUD STORAGE." INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY 7, no. 6 (2018): 255–63. https://doi.org/10.5281/zenodo.1284187.

Full text
Abstract:
Data security has consistently been a major issue in information technology. In the cloud computing environment, it becomes particularly serious because the data is located in different places even in all the globe. Data security and privacy protection are the two main factors of user&rsquo;s concerns about the cloud technology. Though many techniques on the topics in cloud computing have been investigated in both academics and industries, data security and privacy protection are becoming more important for the future development of cloud computing technology in government, industry, and busin
APA, Harvard, Vancouver, ISO, and other styles
32

Anshu, Sharma*1 Mrs. Chitvan Gupta2 &. Mr. Mayank Deep Khare3. "ENHANCING DATA SECURITY ON CLOUD USING SPLIT TECHNIQUE." INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY 7, no. 6 (2018): 564–72. https://doi.org/10.5281/zenodo.1299131.

Full text
Abstract:
Data security has consistently been a major issue in information technology. In the cloud computing environment, it becomes particularly serious because the data is located in different places even in all the globe. Data security and privacy protection are the two main factors of user&rsquo;s concerns about the cloud technology. Though many techniques on the topics in cloud computing have been investigated in both academics and industries, data security and privacy protection are becoming more important for the future development of cloud computing technology in government, industry, and busin
APA, Harvard, Vancouver, ISO, and other styles
33

Rishabh, Mudgal*1 &. Mrs. Kirti Bhatia2. "A SURVEY ON ENHANCING DATA SECURITY ON CLOUD STORAGE USING SPLIT TECHNIQUE." INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY 7, no. 8 (2018): 430–39. https://doi.org/10.5281/zenodo.1345682.

Full text
Abstract:
Data security has consistently been a major issue in information technology. In the cloud computing environment, it becomes particularly serious because the data is located in different places even in all the globe. Data security and privacy protection are the two main factors of user&rsquo;s concerns about the cloud technology. Though many techniques on the topics in cloud computing have been investigated in both academics and industries, data security and privacy protection are becoming more important for the future development of cloud computing technology in government, industry, and busin
APA, Harvard, Vancouver, ISO, and other styles
34

Bhandayker, Yeshwanth Rao. "An Overview of Service Models and Cloud Computing Evolution in IT." International Journal of Research and Applications 5, no. 20 (2018): 1000–1004. https://doi.org/10.5281/zenodo.13348024.

Full text
Abstract:
<strong>A</strong><strong>BSTRACT</strong>Cloud computing is an arising model of business computing. Cloud computing is a swiftly establishing&nbsp;and also outstanding encouraging innovation. It has actually excited the worry of the computer system&nbsp;culture of the universe. In this paper, we discover the idea of cloud-style and also contrasts cloud&nbsp;computing with a grid computer. We additionally attend to the attributes and also applications of a&nbsp;number of prominent cloud computing systems. In this paper, we intend to determine the difficulties aswell as concerns of cloud comput
APA, Harvard, Vancouver, ISO, and other styles
35

Razaque, Abdul, Mohamed Ben Haj Frej, Bandar Alotaibi, and Munif Alotaibi. "Privacy Preservation Models for Third-Party Auditor over Cloud Computing: A Survey." Electronics 10, no. 21 (2021): 2721. http://dx.doi.org/10.3390/electronics10212721.

Full text
Abstract:
Cloud computing has become a prominent technology due to its important utility service; this service concentrates on outsourcing data to organizations and individual consumers. Cloud computing has considerably changed the manner in which individuals or organizations store, retrieve, and organize their personal information. Despite the manifest development in cloud computing, there are still some concerns regarding the level of security and issues related to adopting cloud computing that prevent users from fully trusting this useful technology. Hence, for the sake of reinforcing the trust betwe
APA, Harvard, Vancouver, ISO, and other styles
36

Xu, Tongtong, and Lei Shi. "Research on Big data Security privacy Protection based on cloud Computing." Journal of Physics: Conference Series 2083, no. 4 (2021): 042077. http://dx.doi.org/10.1088/1742-6596/2083/4/042077.

Full text
Abstract:
Abstract Cloud computing is a new way of computing and storage. Users do not need to master professional skills, but can enjoy convenient network services as long as they pay according to their own needs. When we use cloud services, we need to upload data to cloud servers. As the cloud is an open environment, it is easy for attackers to use cloud computing to conduct excessive computational analysis on big data, which is bound to infringe on others’ privacy. In this process, we inevitably face the challenge of data security. How to ensure data privacy security in the cloud environment has beco
APA, Harvard, Vancouver, ISO, and other styles
37

MARTIN OTIENO. "Techniques and protocols for enhancing data privacy in cloud computing: A review." World Journal of Advanced Engineering Technology and Sciences 8, no. 1 (2023): 391–404. http://dx.doi.org/10.30574/wjaets.2023.8.1.0064.

Full text
Abstract:
The emergence of cloud computing has enabled millions of devices across the globe to communicate and exchange massive amounts of data that is classified as private with each other. Given that these devices and platforms are scattered in different geographical areas, communicating with IoTs all the time, the issue of data security, in particular, assurance of data privacy has arisen. Several attempts in mitigating this issue has been by both academic and industry researchers in terms of technology, practices and protocols but it still remains a serious challenge even as cloud computing forges i
APA, Harvard, Vancouver, ISO, and other styles
38

Gururaj, H. L. "A comprehensive analysis of security challenges in mobile cloud computing." i-manager’s Journal on Cloud Computing 10, no. 2 (2023): 35. http://dx.doi.org/10.26634/jcc.10.2.20419.

Full text
Abstract:
The computing capability of mobile systems is enhanced by cloud computing. Mobile devices can rely on cloud computing to perform computationally intensive operations such as data mining and searching. Mobile cloud computing refers to the availability of cloud computing services in a mobile environment. It is a combination of mobile networks and cloud computing, providing optimal services for mobile users. The use of mobile cloud computing overcomes performance-related obstacles, such as bandwidth, storage capacity, and battery life, as well as environment-related issues like availability, scal
APA, Harvard, Vancouver, ISO, and other styles
39

AlZain, Mohammed A., Alice S. Li, Ben Soh, and Eric Pardede. "Multi-Cloud Data Management using Shamir's Secret Sharing and Quantum Byzantine Agreement Schemes." International Journal of Cloud Applications and Computing 5, no. 3 (2015): 35–52. http://dx.doi.org/10.4018/ijcac.2015070103.

Full text
Abstract:
Cloud computing is a phenomenal distributed computing paradigm that provides flexible, low-cost on-demand data management to businesses. However, this so-called outsourcing of computing resources causes business data security and privacy concerns. Although various methods have been proposed to deal with these concerns, none of these relates to multi-clouds. This paper presents a practical data management model in a public and private multi-cloud environment. The proposed model BFT-MCDB incorporates Shamir's Secret Sharing approach and Quantum Byzantine Agreement protocol to improve trustworthi
APA, Harvard, Vancouver, ISO, and other styles
40

Ghudayyer, Mohammad Bin, Yasir Javed, and Mamdouh Alenezi. "A Security Perspective on Adoption and Migration to Mobile Cloud Technology." JOIV : International Journal on Informatics Visualization 1, no. 4 (2017): 143. http://dx.doi.org/10.30630/joiv.1.4.54.

Full text
Abstract:
Security is one of the main concerns of those who want to adopt and migrate to cloud computing technology. Security issues raised by cloud technology reveals that mobile cloud computing is raising the privacy and security issues such as identification and authentication issue, as sometimes the identity and the authentication of the owner of the device or the owner of the data contained in the cloud was not strictly remote. These are some examples that could be considered as major setbacks to the mobile cloud computing adaptation and the reason why some entities are still reluctant of embracing
APA, Harvard, Vancouver, ISO, and other styles
41

Youngho Park, Chul Sur, and Kyung-Hyune Rhee. "A Privacy Preserving V2I Service Access Management System for Vehicular Clouds." Research Briefs on Information and Communication Technology Evolution 1 (January 15, 2015): 51–61. http://dx.doi.org/10.56801/rebicte.v1i.7.

Full text
Abstract:
Vehicular cloud computing is a technological paradigm shifting which takes advantage of cloud computingto provide vehicles with useful computing resources and services. With the rapid advancementof intelligent vehicles and Intelligent Transportation System infrastructures, some researches on theliteratures have put forth a vision of the combination of vehicular network with could computing inrecent. However, little efforts have concentrated on security features for vehicular cloud services. Inparticular, privacy is one of the critical security issues in vehicular cloud as well as vehicular com
APA, Harvard, Vancouver, ISO, and other styles
42

Suchit, Kumar Vyas, and Satish Kumar Dr. "Study of mobile cloud computing security and its challenges." International Journal of Advance Research in Multidisciplinary 1, no. 1 (2023): 511–16. https://doi.org/10.5281/zenodo.13950280.

Full text
Abstract:
The rise of cloud computing has significantly impacted software organizations and the design of software architecture. As cloud computing and mobile internet continue to evolve, mobile cloud computing is emerging as a new application model. This model combines three key technologies: mobile computing, cloud computing, and wireless technology. Mobile cloud computing has become a crucial and advanced technology today, yet mobile devices still face several challenges. These include issues related to storage, security, privacy, and connectivity. Mobile cloud computing offers resources and services
APA, Harvard, Vancouver, ISO, and other styles
43

Charu Jain. "Survey of Cloud Computing Security and Privacy Issues." Darpan International Research Analysis 12, no. 3 (2024): 160–71. http://dx.doi.org/10.36676/dira.v12.i3.63.

Full text
Abstract:
The world of computing and data management has completely changed as a result of cloud computing, which offers both consumers and enterprises scalable resources, on-demand services, and considerable cost savings. The demand for more adaptable and effective computer resources has prompted this paradigm change, and cloud computing provides it by enabling users to access and utilize computing resources over the internet. But using cloud computing also raises a number of security and privacy issues that must be properly handled. In order to assess the present status of cloud computing security and
APA, Harvard, Vancouver, ISO, and other styles
44

Tari, Zahir. "Security and Privacy in Cloud Computing." IEEE Cloud Computing 1, no. 1 (2014): 54–57. http://dx.doi.org/10.1109/mcc.2014.20.

Full text
APA, Harvard, Vancouver, ISO, and other styles
45

Xiang, Yang, Beniamino Di Martino, Guilin Wang, and Jin Li. "Cloud Computing: Security, Privacy and Practice." Future Generation Computer Systems 52 (November 2015): 59–60. http://dx.doi.org/10.1016/j.future.2015.06.007.

Full text
APA, Harvard, Vancouver, ISO, and other styles
46

Wakrime, Abderrahim Ait. "Satisfiability-Based Privacy-Aware Cloud Computing." Computer Journal 60, no. 12 (2017): 1760–69. http://dx.doi.org/10.1093/comjnl/bxx039.

Full text
APA, Harvard, Vancouver, ISO, and other styles
47

Xiao, Zhifeng, and Yang Xiao. "Security and Privacy in Cloud Computing." IEEE Communications Surveys & Tutorials 15, no. 2 (2013): 843–59. http://dx.doi.org/10.1109/surv.2012.060912.00182.

Full text
APA, Harvard, Vancouver, ISO, and other styles
48

Aljwari, Fatimah Khalil. "Challenges of Privacy in Cloud Computing." Journal of Computer and Communications 10, no. 12 (2022): 51–61. http://dx.doi.org/10.4236/jcc.2022.1012004.

Full text
APA, Harvard, Vancouver, ISO, and other styles
49

Zou, Deqing, Yang Xiang, and Geyong Min. "Privacy preserving in cloud computing environment." Security and Communication Networks 9, no. 15 (2016): 2752–53. http://dx.doi.org/10.1002/sec.1498.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

Saini, Himani, and Gopal Singh. "Privacy Preservation Techniques in Cloud Computing." ESP Journal of Engineering & Technology Advancements 2, no. 4 (2023): 15–21. http://dx.doi.org/10.56472/25832646/jeta-v3i1p103.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!