2012
DOI: 10.1016/j.clsr.2012.03.003
|View full text |Cite
|
Sign up to set email alerts
|

Protecting the privacy and security of sensitive customer data in the cloud

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
77
0
6

Year Published

2013
2013
2022
2022

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 119 publications
(84 citation statements)
references
References 0 publications
1
77
0
6
Order By: Relevance
“…They come to a conclusion that regulatory reform is needed to protect personal data in the cloud computing environments and delete sections that constrain the growth of the cloud industry [17]. In addition, Robison noted that the courts will face their most difficult task in determining how cloud computing suits within the Stored Communications Act (SCA) complex framework.…”
Section: Back Groundmentioning
confidence: 99%
“…They come to a conclusion that regulatory reform is needed to protect personal data in the cloud computing environments and delete sections that constrain the growth of the cloud industry [17]. In addition, Robison noted that the courts will face their most difficult task in determining how cloud computing suits within the Stored Communications Act (SCA) complex framework.…”
Section: Back Groundmentioning
confidence: 99%
“…Security of IoT requires data confidentiality, privacy and trust. These security issues are managed by distributed intelligence, distributed systems, smart computing and communication identification systems (Sicari et al, 2015;King and Raja, 2012). Finally, in Figure 3 we have figured out the functioning pattern of markets, networks and crowds.…”
Section: The Future Of Work and Robotics: A Scenario Analysis Of Humamentioning
confidence: 99%
“…IoT is based on social, cultural and economic trust and associated trust management skills, which broadly speaking mean developed security services and antifragility operations. Critical issues of IoT security field are (Sicari et al, 2015;King and Raja, 2012): trusted platforms, low-complexity, encryption, access control, secure data, provenance, data confidentiality, authentication, identity management, and privacy enhancing technologies (PETs). Security of IoT requires data confidentiality, privacy and trust.…”
Section: The Future Of Work and Robotics: A Scenario Analysis Of Humamentioning
confidence: 99%
“…In such scenarios, security vulnerability of cloud may be an easy source for attackers to acquire sensitive information about the customers [74]. Moreover, computer-aided design (CAD) tools are being provided as a service in the cloud.…”
Section: Designmentioning
confidence: 99%