2018
DOI: 10.11591/ijeecs.v11.i3.pp1168-1175
|View full text |Cite
|
Sign up to set email alerts
|

The Factors Affecting on Managing Sensitive Data in Cloud Computing

Abstract: Cloud computing represents the most important shift in computing and information technology (IT). However, security and privacy remain the main obstacles to its widespread adoption. In this research we will review the security and privacy challenges that affect critical data in cloud computing and identify solutions that are used to address these challenges. Some questions that need answers are: (a) User access management, (b) Protect privacy of sensitive data, (c) Identity anonymity to protect the Identity of… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2018
2018
2021
2021

Publication Types

Select...
4

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(4 citation statements)
references
References 19 publications
0
4
0
Order By: Relevance
“…where δ is the predicted time sequence number, and + denotes the predicted value at time + , as shown in (7). Then, to predict the + value, the second moving average value can be measured by applying (8):…”
Section: First and Second Moving Average (Fsma) Methodmentioning
confidence: 99%
See 1 more Smart Citation
“…where δ is the predicted time sequence number, and + denotes the predicted value at time + , as shown in (7). Then, to predict the + value, the second moving average value can be measured by applying (8):…”
Section: First and Second Moving Average (Fsma) Methodmentioning
confidence: 99%
“…The cloud computing format is mainly described by using three service models: (a) Infrastructure as a Service (IaaS), which explains about the resources offering procedures by cloud providers; (b) Platform as a Service (PaaS), which describes how cloud providers provide an entire cloud environment implemented and deployed in a certain programming language for a specific type of applications; and (c) Software as a Service (SaaS), which refers to applications that can be offered to customers according to their need. The deployed cloud models are mainly classified into four forms: (a) public cloud, which is available for everyone; (b) private cloud, which is hosted solely for one industry; (c) community cloud, which is a cloud environment made accessible only to a certain group of industry or individuals in collaboration; and (d) hybrid cloud, which refers to various clouds that are interconnected with the hosted applications deployed in the cloud environment [8]. In the present work, the term "workload" refers to the number of arrived requests to access the resource of the cloud system.…”
Section: Domain Analysismentioning
confidence: 99%
“…The work in Muhasin et al [25] reviewed the issues of security and privacy affecting critical cloud data and identified solutions to tackle challenges such as user access management, sensitive data protection privacy, user identity anonymity, and data file protection. To explore the fundamental targets of the proposed system, a pilot study utilizing an organized survey was led by specialists working in cloud security.…”
Section: Related Workmentioning
confidence: 99%
“…Muhasin, H. et al of [3] focused on factors that effect on the decision of management information systems on sensitive data in public cloud like: Data Confidentiality, Availability, Privacy, Integrity, Authentication, Anonymity, Authorization and Defining the responsibilities. Also conduct Interviews and surveys to explain the impact of these factors on the decision in managing information systems on sensitive data in cloud environments.…”
Section: Introductionmentioning
confidence: 99%