2019
DOI: 10.4018/978-1-5225-7335-7.ch004
|View full text |Cite
|
Sign up to set email alerts
|

Cloud Computing Security Issues of Sensitive Data

Abstract: Numerous organizations are using aspects of the cloud to store data, but as sensitive data is placed on the cloud, privacy and security become difficult to maintain. When users upload data to the cloud, they may become increasingly vulnerable to account hijacking, unauthorized access, and the data may become unavailable because of various technical reasons. Questions remain about the security of sensitive data in the cloud, and in this chapter, the authors perform an analysis of 36 peer reviewed publications d… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 17 publications
0
3
0
Order By: Relevance
“…This research, based on a comprehensive review of cloud insecurities [16], aims to develop, test, and validate a prototype framework for Information Flow Tracking (IFT) in cloud environments. As such, this work seeks to enhance transparency and control over data propagation, thereby bolstering client trust in the security and privacy of their data.…”
Section: Objectivesmentioning
confidence: 99%
“…This research, based on a comprehensive review of cloud insecurities [16], aims to develop, test, and validate a prototype framework for Information Flow Tracking (IFT) in cloud environments. As such, this work seeks to enhance transparency and control over data propagation, thereby bolstering client trust in the security and privacy of their data.…”
Section: Objectivesmentioning
confidence: 99%
“…However, although the characteristics of cloud computing bring great convenience to tenants, they pose a serious threat to the security of tenants' sensitive data [2]. The cloud platform has the following characteristics [3,4]:…”
Section: Introductionmentioning
confidence: 99%
“…This method can realize self-control of tenant information flow within the boundary as well as dynamic control and security sharing of information flow between tenants. 4. Based on the effective identification of the tenant virtual boundary and the dynamic control method of tenant information flow, we provide a detailed design of the dynamic security control application system of cloud tenants' sensitive information flow.…”
Section: Introductionmentioning
confidence: 99%