2013 IEEE 5th International Conference on Cloud Computing Technology and Science 2013
DOI: 10.1109/cloudcom.2013.31
|View full text |Cite
|
Sign up to set email alerts
|

Privacy Risk, Security, Accountability in the Cloud

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
21
0

Year Published

2014
2014
2018
2018

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 35 publications
(21 citation statements)
references
References 11 publications
0
21
0
Order By: Relevance
“…Several surveys among potential cloud adopters indicate that security and privacy is the primary concern hindering its adoption [1]. Cloud specific security and privacy threats such as insecure API, data leakage, insecure data deletion, session or service hijacking, malicious insiders should be controlled in a proactive way [9,18,22]. Similar to traditional computing environment, Attacks such as man-in-the middle, and Trojan are also potential attack for cloud computing [23].…”
Section: Security Privacy and Migration Issues In Cloudmentioning
confidence: 99%
“…Several surveys among potential cloud adopters indicate that security and privacy is the primary concern hindering its adoption [1]. Cloud specific security and privacy threats such as insecure API, data leakage, insecure data deletion, session or service hijacking, malicious insiders should be controlled in a proactive way [9,18,22]. Similar to traditional computing environment, Attacks such as man-in-the middle, and Trojan are also potential attack for cloud computing [23].…”
Section: Security Privacy and Migration Issues In Cloudmentioning
confidence: 99%
“…Khan et al, 2012;Gruschka and Jensen, 2010;Nahar et al, 2012;Gruschka and Iacono, 2009;Jensen et al, 2009;Dahbur et al, 2011;Gregg, 2010;Kalloniatis et al, 2014;CSA, 2009;Heiser and Nicolett, 2008;AWS, 2014;Office 365_CSA, 2014;CSA_ THREAT, 2010;Ardagna, 2015. Privacy risks Privacy threats and risks from the cloud computing and its surrounding environment. Vimercati et al, 2012;Savola, 2010;Theoharidou et al, 2013;Pearson, 2009;Kalloniatis et al, 2014;AWS, 2014;Office 365, 2014.…”
Section: Risks and Controls In Cloud Computingmentioning
confidence: 99%
“…For instance, it is difficult to identify and control any secondary usage of data as data is stored in the CSP's infrastructure and tends to get transferred in data centres in different geographic locations. Theoharidou et al (2013) examine the privacy risks for the migrated data, applications or services into the cloud by following privacy impact assessment with ten fundamental privacy principals such as accountability, clear purpose, consent, collection, use, accuracy, security, openness, ability to access, and ability to challenge privacy practice. Privacy risks can impact on an organization such as loss of reputation, breach of contractual obligation, economic loss and many more.…”
Section: Privacy Risksmentioning
confidence: 99%
“…Almost all existing work on data governance for cloud computing focuses on accountability and interoperability [57,60]. Accountability could be addressed at different levels, technological, regulatory and organisational [95].…”
Section: Cloud Data Governancementioning
confidence: 99%