Privacy Issues In Cloud Computing
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2015, Vol 17, Issue 6
Abstract
Abstract: Cloud computing is the delivery of computing as a service rather than a product. It provides shared resources, software, and information to computers and other devices over a network. The increasing network bandwidth and reliable yet flexible network connections make it even possible that users can now subscribe high quality services from data and software that reside solely on remote data centres. We can store and retrieve the data as we like using cloud computing. The cloud computing paradigm changes the way in which information is managed, especially where personal data processing is concerned. End-users can access cloud services without the need for any expert knowledge of the underlying technology. This is a key characteristic of cloud computing, which offers the advantage of reducing cost through the sharing of computing and storage resources, combined with an on-demand provisioning mechanism based on a pay-per-use business model. These new features have a direct impact on the IT budget and cost of ownership, but also bring up issues of traditional security, trust and privacy mechanisms.Privacy, in this Article, refers to the right to self-determination, that is, the right ofindividuals to ‘know what is known about them’, be aware of stored information about them, control how that information is communicated and prevent its abuse. In other words, it refers to more than just confidentiality of information. Protection of personal information (or data protection) derives from the right to privacy via the associated right to self-determination. Every individual has the right to control his or her own data, whether private, public or professional. Privacy issues are increasingly important in the online world. It is generallyaccepted that due consideration of privacy issues promotes user confidence and economic development. However, the secure release, management and control of personal information into the cloud represent a huge challenge for all stakeholders, involving pressures both legal and commercial. This study analyses the challenges posed by cloud computing and the standardization work being done by various standards development organizations (SDOs) to mitigate privacy risks in the cloud, including the role of privacyenhancingtechnologies (PETs).
Authors and Affiliations
Leela Krishna Ganapavarapu , Sireesha Prathigadapa , Kiranmayi Bodapati
A Secure Data Transmission by Embedding Marked Encrypted Image on Cloak Image
Abstract: A mobile WSN is considered as a collection of wireless mobile nodes and a base station forming an ad-hoc network. This type of network is used in various areas; such as underwater and underground. Each no...
Spatial Correlation Based Medium Access Control Protocol Using DSR & AODV Routing In Wireless Sensor Networks For Energy Efficient Data Collection
In Wireless sensor network sensor nodes have a limited battery life and their efficient utilization is a very much importent task. Their are many ways are proposed for efficient utilization of energy.For efficie...
The impact of using Gregorian calendar dates in systems that adapt localization: In the case of Ethiopia
Ethiopian calendar has 13 months in which 12 months have 30 days equal and the 13th month has 5 or 6 days length. Date is one of the inputs for web or desktop applications. Java Development Kit(JDK) and JodaTime Date Tim...
Stationary Wavelet Transform Image Fusion and Optimization Using Particle Swarm Optimization
The complementary nature of imaging sensors of different modalities all brought a great need of image fusion to extract relevant information images. Medical image fusion using Stationary wavelet transform (SWT) an...
Efficient Construction of Dictionary using Directed Acyclic Word Graph
Abstract: Implementation of dictionary is a topic on which research is going on since a long time in the search of a better and efficient algorithm both in terms of space and time complexity. Its necessity has increased...