Cloud Computing Security Problem (Data Privacy) and Strategy

International Journal of Computer Science and Engineering
© 2014 by SSRG - IJCSE Journal
Volume 1 Issue 9
Year of Publication : 2014
Authors : Piyush Singh Katiyar

pdf
How to Cite?

Piyush Singh Katiyar, "Cloud Computing Security Problem (Data Privacy) and Strategy," SSRG International Journal of Computer Science and Engineering , vol. 1,  no. 9, pp. 1-5, 2014. Crossref, https://doi.org/10.14445/23488387/IJCSE-V1I9P105

Abstract:

Cloud computing is an increasingly popular technology that involves the use of networked servers to support centralized data storage, software as a service (SaaS), virtualization, and web-services, just to mention a few. The benefits of the cloud include economies of scale, overhead and cost savings, simplification of IT management, and more. Despite the capabilities and advantages of cloud computing, however, the technology has not lived up to its billing as “supposedly” offering superior and even infallible security. In fact, the cloud computing presents significant and diverse problems/challenges with fundamental security issues such as data privacy. A multi-layered security strategy can, however, help organizations address this security problem.

Keywords:

Cloud Computing Security, Data

References:

[1] Singh, S. Data Security Issues and Strategy on Cloud Computing. International Journal of Science, Engineering and Technology Research, August 2013; 2(8). .
[2] Bisong, A, Rahman SM. An Overview of the Security Concerns in Enterprise Cloud Computing. International Journal of Network Security & Its Applications, 2011 January; 3(1). .
[3] Hogben G. ENISA-Cloud Computing Security Strategy. European Network and Information Security Agency 2010. Available from http://www.terena.org/activities/tfcsirt/ meeting30/hogben-cloudcomputing.pdf.
[4] Bisong, A, Rahman SM. An Overview of the Security Concerns in Enterprise Cloud Computing. International Journal of Network Security & Its Applications, 2011 January; 3(1). .
[5] Srinivasamurthy, S, Liu DQ. Survey on Cloud Computing Security. Department of Computer Science, Indiana University Purdue University Fort Wayne July 2010. .
[6] Okuhara M, Shiozaki T, Suzuki T. Security Architectures for Cloud Computing. Fujitsu Sci. Tech. J. 46(4) 2010 October: 400. .
[7] Brukbacher, S. Practical Strategies for Managing Risk in Cloud Computing. Boulder, CO: Educause Center for Applied Research Bulletin 3, 2011.
[8] Figliola, PM, Fischer EA. Overview and Issues for Implementation of the Federal Cloud Computing Initiative: Implications for Federal Information Technology Reform Management. Congressional Research Service 2014 February 3; R42887.