Security and Privacy Challenges in Cloud Computing

被引:0
|
作者
Abdullah, Salasiah [1 ]
Abu Bakar, Khairul Azmi [1 ]
机构
[1] Univ Kebangsaan Malaysia, Fac Informat Sci & Technol, Bangi, Selangor, Malaysia
关键词
security; cloud computing; access control; privacy; ADOPTION; MODEL;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Cloud computing plays a crucial role in supporting the virtualization synergy as there is a large-scale demand among users in adopting cloud solutions. However, preserving the security of storage while maintaining users' privacy brings new challenges in protecting cloud computing from illegal access and shared network environment. Thus, Risk-Adaptable Access Control (RAdAC) is known within privacy-preserving perspective as a flexible prospect in managing exceptional access request and reacting to suspicious user. However, most of the previous work on the cloud security focused on storage security rather than anonymity of user nor identity. This paper explores the fundamental concept of cloud computing architecture and identifies the security requirements in cloud. In this work, the prerequisite elements in RAdAC framework has been discussed precisely and ambiguity factor is found in protecting privacy of user. Thus, we proposed the viable two-factor authentication scheme in RAdAC for future road ahead in cloud industry.
引用
收藏
页数:3
相关论文
共 50 条
  • [41] Confidential Computing: Elevating Cloud Security and Privacy
    Russinovich, Mark
    [J]. COMMUNICATIONS OF THE ACM, 2024, 67 (01) : 52 - 53
  • [42] Security and Privacy in Cloud Computing: Technical Review
    Abdulsalam, Yunusa Simpa
    Hedabou, Mustapha
    [J]. FUTURE INTERNET, 2022, 14 (01)
  • [43] Confidential Computing: Elevating Cloud Security and Privacy
    Russinovich M.
    [J]. Queue, 2023, 21 (04): : 44 - 48
  • [44] Data Security and Privacy Protection of Cloud Computing
    Dai Xuebing
    Wang Zhaojing
    Zhang Yan
    [J]. ADVANCES IN MECHATRONICS, AUTOMATION AND APPLIED INFORMATION TECHNOLOGIES, PTS 1 AND 2, 2014, 846-847 : 1570 - +
  • [45] Security and Privacy-Preserving Challenges of e-Health Solutions in Cloud Computing
    Chenthara, Shekha
    Ahmed, Khandakar
    Wang, Hua
    Whittaker, Frank
    [J]. IEEE ACCESS, 2019, 7 : 74361 - 74382
  • [46] A Survey of Security Challenges in Cloud Computing
    El Moctar, Cheikh Brahim Ould Mohamed
    Konate, Karim
    [J]. 2017 2ND IEEE INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, SIGNAL PROCESSING AND NETWORKING (WISPNET), 2017, : 843 - 849
  • [47] An Analysis of Security Challenges in Cloud Computing
    Parekh, Disha H.
    Sridaran, R.
    [J]. INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2013, 4 (01) : 38 - 46
  • [48] Recent security challenges in cloud computing
    Subramanian, Nalini
    Jeyaraj, Andrews
    [J]. COMPUTERS & ELECTRICAL ENGINEERING, 2018, 71 : 28 - 42
  • [49] Security challenges in the distributed cloud computing
    Nwobodo, Ikechukwu
    Jahankhani, Hossein
    Edoh, Aloysius
    [J]. INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2014, 6 (01) : 38 - 51
  • [50] Data Security: the Challenges of Cloud Computing
    Hu Shuijing
    [J]. 2014 SIXTH INTERNATIONAL CONFERENCE ON MEASURING TECHNOLOGY AND MECHATRONICS AUTOMATION (ICMTMA), 2014, : 203 - 206