A Novel Approach for Data Security and Privacy In Cloud Computing
Loading...
Date
item.page.authors
Journal Title
Journal ISSN
Volume Title
Publisher
Abstract
Cloud is a collective term for a wide range of developments and opportunities. It is more of a practical innovation than an invention. Communication is the most significant gift that the internet has given to the common man. The internet is very essential because it is the limitless space where infinite quantities of data are available to individuals. The ease of use along with the ever-increasing number of customers entering the internet environment on a regular basis has converted the use of internet facilities into a compulsory daily activity rather than an optional interaction like it was in its early phases. This tremendous growth has encouraged many professionals and IT experts to invest in creating more innovative web services that will attract more and more customers to enhance the quality of life in both the physical and online worlds.
newlineWith resource virtualization, the cloud can provide on-demand self-service, rapid resource elasticity and usage-based pricing, which thus make cloud services as convenient as the daily-life utilities such as electricity, water, and gas. This demand of reducing the computing cost has led to the innovation of cloud computing. Cloud computing provide better computing through improved utilization, reduced administration and infrastructure costs. The data sharing capabilities benefit the user through greater productivity and eand#64259;ciency.
newlineIn spite of its widely recognized economic benefits, cloud computing removes customers direct control over the systems that manage their data, which raises significant security and privacy concerns and is one of the major barriers to its adoption. However, the cloud is susceptible to security and privacy vulnerabilities such as key management, loss of control and privacy. Sensitive information housed under the security domain of user has now been placed under the protection of service provider. Health record is the typical example of sensitive information. Access policies encourage researchers to spread widely such data in a de-identified form