User Privacy and Security in Cloud Computing

被引:5
|
作者
Waleed, AL-Museelem [1 ]
Li Chunlin [1 ]
机构
[1] Wuhan Univ Technol, Sch Comp Sci, Wuhan 430070, Peoples R China
关键词
Cloud computing; Ubuntu Enterprise Cloud; Data Encryption; Data Decryption;
D O I
10.14257/ijsia.2016.10.2.30
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Many clients worry about their susceptibility to attack if their businesses' crucial IT resources and information are outside the firewall. The extremely scalable nature of Cloud Computing allows its users to access huge amounts of data and use distributed computational resources via different interfaces. Cloud entities such as cloud service providers, users and business associates share the offered resources at diverse levels of technological operations. This research paper focuses on the user privacy and security in cloud computing and the solutions to improve privacy and security of cloud computing. The study employs UEC (Ubuntu Enterprise Cloud) Eucalyptus for simulation, which is the accepted open source cloud computing software as a solution. The paper assesses how security and privacy issues transpire in the context of cloud computing and examines ways in which they might be addressed. This paper aims to solve privacy and security issues in cloud computing using UEC (Ubuntu Enterprise Cloud). The methodology used involves encrypting and decrypting data to ensure privacy and security in the cloud.
引用
收藏
页码:341 / 352
页数:12
相关论文
共 50 条
  • [1] Security and Privacy in Cloud Computing
    Tari, Zahir
    [J]. IEEE CLOUD COMPUTING, 2014, 1 (01): : 54 - 57
  • [2] Security and Privacy in Cloud Computing
    Hamouda, Sara
    [J]. 2012 INTERNATIONAL CONFERENCE ON CLOUD COMPUTING TECHNOLOGIES, APPLICATIONS AND MANAGEMENT (ICCCTAM), 2012, : 241 - 245
  • [3] Security and Privacy in Cloud Computing
    Xiao, Zhifeng
    Xiao, Yang
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2013, 15 (02): : 843 - 859
  • [4] Security and Privacy in Cloud Computing
    Soni, Rajat
    Ambalkar, Smrutee
    Bansal, Pratosh
    [J]. 2016 SYMPOSIUM ON COLOSSAL DATA ANALYSIS AND NETWORKING (CDAN), 2016,
  • [5] Security and privacy issues in cloud computing
    Haider Abbas
    Olaf Maennel
    Saïd Assar
    [J]. Annals of Telecommunications, 2017, 72 : 233 - 235
  • [6] Cloud Computing: Security, Privacy and Practice
    Xiang, Yang
    Di Martino, Beniamino
    Wang, Guilin
    Li, Jin
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF GRID COMPUTING AND ESCIENCE, 2015, 52 : 59 - 60
  • [7] Security and Privacy in Cloud Computing: A Survey
    Shankarwar, Mahesh U.
    Pawar, Ambika V.
    [J]. PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON FRONTIERS OF INTELLIGENT COMPUTING: THEORY AND APPLICATIONS (FICTA) 2014, VOL 2, 2015, 328 : 1 - 11
  • [8] Security and Privacy Challenges in Cloud Computing
    Abdullah, Salasiah
    Abu Bakar, Khairul Azmi
    [J]. PROCEEDINGS OF THE 2018 CYBER RESILIENCE CONFERENCE (CRC), 2018,
  • [9] Security and Privacy Issues in Cloud Computing
    Shaikh, Asma A.
    Iyer, Kamatchi
    [J]. INTERNATIONAL CONFERENCE ON INTELLIGENT DATA COMMUNICATION TECHNOLOGIES AND INTERNET OF THINGS, ICICI 2018, 2019, 26 : 1299 - 1306
  • [10] Security and Privacy in Mobile Cloud Computing
    Suo, Hui
    Liu, Zhuohua
    Wan, Jiafu
    Zhou, Keliang
    [J]. 2013 9TH INTERNATIONAL WIRELESS COMMUNICATIONS AND MOBILE COMPUTING CONFERENCE (IWCMC), 2013, : 655 - 659