Security and Privacy Challenges in Cloud Computing

被引:0
|
作者
Abdullah, Salasiah [1 ]
Abu Bakar, Khairul Azmi [1 ]
机构
[1] Univ Kebangsaan Malaysia, Fac Informat Sci & Technol, Bangi, Selangor, Malaysia
关键词
security; cloud computing; access control; privacy; ADOPTION; MODEL;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Cloud computing plays a crucial role in supporting the virtualization synergy as there is a large-scale demand among users in adopting cloud solutions. However, preserving the security of storage while maintaining users' privacy brings new challenges in protecting cloud computing from illegal access and shared network environment. Thus, Risk-Adaptable Access Control (RAdAC) is known within privacy-preserving perspective as a flexible prospect in managing exceptional access request and reacting to suspicious user. However, most of the previous work on the cloud security focused on storage security rather than anonymity of user nor identity. This paper explores the fundamental concept of cloud computing architecture and identifies the security requirements in cloud. In this work, the prerequisite elements in RAdAC framework has been discussed precisely and ambiguity factor is found in protecting privacy of user. Thus, we proposed the viable two-factor authentication scheme in RAdAC for future road ahead in cloud industry.
引用
收藏
页数:3
相关论文
共 50 条
  • [1] Security and Privacy Challenges in Vehicular Cloud Computing
    Lu, Rongxing
    Rahulamathavan, Yogachandran
    Zhu, Hui
    Xu, Chang
    Wang, Miao
    [J]. MOBILE INFORMATION SYSTEMS, 2016, 2016
  • [2] Security and Privacy Challenges in Cloud Computing Environments
    Takabi, Hassan
    Joshi, James B. D.
    Ahn, Gail-Joon
    [J]. IEEE SECURITY & PRIVACY, 2010, 8 (06) : 24 - 31
  • [3] Challenges on Privacy and Reliability in Cloud Computing Security
    Tse, Daniel W. K.
    [J]. 2014 INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE, ELECTRONICS AND ELECTRICAL ENGINEERING (ISEEE), VOLS 1-3, 2014, : 1180 - 1186
  • [4] Data Security and Privacy Information Challenges in Cloud Computing
    Kong, Weiwei
    Lei, Yang
    Ma, Jing
    [J]. 2016 8TH INTERNATIONAL CONFERENCE ON INTELLIGENT NETWORKING AND COLLABORATIVE SYSTEMS (INCOS), 2016, : 512 - 514
  • [5] Security and privacy protection in cloud computing: Discussions and challenges
    Sun, PanJun
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2020, 160
  • [6] Security and Privacy Challenges in Connected Vehicular Cloud Computing
    Masood, Arooj
    Lakew, Demeke Shumeye
    Cho, Sungrae
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2020, 22 (04): : 2725 - 2764
  • [7] Security and Privacy in Cloud Computing: Vision, Trends, and Challenges
    Tari, Zahir
    Yi, Xun
    Premarathne, Uthpala S.
    Bertok, Peter
    Khalil, Ibrahim
    [J]. IEEE CLOUD COMPUTING, 2015, 2 (02): : 30 - 38
  • [8] Data security and privacy information challenges in cloud computing
    Kong, Weiwei
    Lei, Yang
    Ma, Jing
    [J]. INTERNATIONAL JOURNAL OF COMPUTATIONAL SCIENCE AND ENGINEERING, 2018, 16 (03) : 215 - 218
  • [9] Cloud Computing Privacy & Security Global Issues, Challenges, & Mechanisms
    Lar, Saleem-ullah
    Liao, Xiaofeng
    Abbas, Syed Ali
    [J]. 2011 6TH INTERNATIONAL ICST CONFERENCE ON COMMUNICATIONS AND NETWORKING IN CHINA (CHINACOM), 2011, : 1240 - 1245
  • [10] Security and Privacy in Cloud Computing
    Tari, Zahir
    [J]. IEEE CLOUD COMPUTING, 2014, 1 (01): : 54 - 57