User Privacy and Security in Cloud Computing

被引:5
|
作者
Waleed, AL-Museelem [1 ]
Li Chunlin [1 ]
机构
[1] Wuhan Univ Technol, Sch Comp Sci, Wuhan 430070, Peoples R China
关键词
Cloud computing; Ubuntu Enterprise Cloud; Data Encryption; Data Decryption;
D O I
10.14257/ijsia.2016.10.2.30
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Many clients worry about their susceptibility to attack if their businesses' crucial IT resources and information are outside the firewall. The extremely scalable nature of Cloud Computing allows its users to access huge amounts of data and use distributed computational resources via different interfaces. Cloud entities such as cloud service providers, users and business associates share the offered resources at diverse levels of technological operations. This research paper focuses on the user privacy and security in cloud computing and the solutions to improve privacy and security of cloud computing. The study employs UEC (Ubuntu Enterprise Cloud) Eucalyptus for simulation, which is the accepted open source cloud computing software as a solution. The paper assesses how security and privacy issues transpire in the context of cloud computing and examines ways in which they might be addressed. This paper aims to solve privacy and security issues in cloud computing using UEC (Ubuntu Enterprise Cloud). The methodology used involves encrypting and decrypting data to ensure privacy and security in the cloud.
引用
收藏
页码:341 / 352
页数:12
相关论文
共 50 条
  • [21] On Current Trends in Security and Privacy of Cloud Computing
    Sahin, Serap
    [J]. 2013 7TH INTERNATIONAL CONFERENCE ON APPLICATION OF INFORMATION AND COMMUNICATION TECHNOLOGIES (AICT), 2013, : 171 - 175
  • [22] Security and privacy for storage and computation in cloud computing
    Wei, Lifei
    Zhu, Haojin
    Cao, Zhenfu
    Dong, Xiaolei
    Jia, Weiwei
    Chen, Yunlu
    Vasilakos, Athanasios V.
    [J]. INFORMATION SCIENCES, 2014, 258 : 371 - 386
  • [23] Cloud computing security and privacy: Standards and regulations
    Yu, Yong
    Miyaji, Atsuko
    Au, Man Ho
    Susilo, Willy
    [J]. COMPUTER STANDARDS & INTERFACES, 2017, 54 : 1 - 2
  • [24] Confidential Computing: Elevating Cloud Security and Privacy
    Russinovich, Mark
    [J]. Queue, 2023, 21 (04): : 44 - 48
  • [25] Security and Privacy in Cloud Computing: Technical Review
    Abdulsalam, Yunusa Simpa
    Hedabou, Mustapha
    [J]. FUTURE INTERNET, 2022, 14 (01)
  • [26] Confidential Computing: Elevating Cloud Security and Privacy
    Russinovich, Mark
    [J]. COMMUNICATIONS OF THE ACM, 2024, 67 (01) : 52 - 53
  • [27] Challenges on Privacy and Reliability in Cloud Computing Security
    Tse, Daniel W. K.
    [J]. 2014 INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE, ELECTRONICS AND ELECTRICAL ENGINEERING (ISEEE), VOLS 1-3, 2014, : 1180 - 1186
  • [28] Data Security and Privacy Protection of Cloud Computing
    Dai Xuebing
    Wang Zhaojing
    Zhang Yan
    [J]. ADVANCES IN MECHATRONICS, AUTOMATION AND APPLIED INFORMATION TECHNOLOGIES, PTS 1 AND 2, 2014, 846-847 : 1570 - +
  • [29] Security and Privacy Challenges in Cloud Computing Environments
    Takabi, Hassan
    Joshi, James B. D.
    Ahn, Gail-Joon
    [J]. IEEE SECURITY & PRIVACY, 2010, 8 (06) : 24 - 31
  • [30] User-controllable security and privacy for pervasive computing
    Cornwell, Jason
    Fette, Ian
    Hsieh, Gary
    Prabaker, Madhu
    Rao, Jinghai
    Tang, Karen
    Vaniea, Kami
    Bauer, Lujo
    Cranor, Lorrie
    Hong, Jason
    McLaren, Bruce
    Reiter, Mike
    Sadeh, Norman
    [J]. EIGHTH IEEE WORKSHOP ON MOBILE COMPUTING SYSTEMS AND APPLICATIONS, PROCEEDINGS, 2007, : 14 - +