2013
DOI: 10.1109/surv.2012.060912.00182
|View full text |Cite
|
Sign up to set email alerts
|

Security and Privacy in Cloud Computing

Abstract: Recent advances have given rise to the popularity and success of cloud computing. However, when outsourcing the data and business application to a third party causes the security and privacy issues to become a critical concern. Throughout the study at hand, the authors obtain a common goal to provide a comprehensive review of the existing security and privacy issues in cloud environments. We have identified five most representative security and privacy attributes (i.e., confidentiality, integrity, availability… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
246
0

Year Published

2013
2013
2024
2024

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 474 publications
(246 citation statements)
references
References 109 publications
0
246
0
Order By: Relevance
“…The explosion of multimedia data (image, video, 3D, etc.) in mobile and cloud computing have created unprecedented opportunities and fundamental security and privacy challenges as they are not just big in volume, but also unstructured and multi-modal [9,12,14].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…The explosion of multimedia data (image, video, 3D, etc.) in mobile and cloud computing have created unprecedented opportunities and fundamental security and privacy challenges as they are not just big in volume, but also unstructured and multi-modal [9,12,14].…”
Section: Introductionmentioning
confidence: 99%
“…Specifically, this special issue addresses various security and privacy aspects in multimedia big data in mobile and cloud computing, with a focus on simulations of mobile and cloud networks, representation, applications/tools and analysis of mobile and cloud networks, particularly on advances computing technologies and related areas [7,10,12]. Papers were invited for this special issue considering aspects of this problem, including: This special issue contains eleven papers which were selected after rigorous review process to deal with different aspects of security and privacy issues in online social networks and other related areas [2,5,13,15].…”
Section: Introductionmentioning
confidence: 99%
“…In cloud computing, a client distributes computational tasks to multiple workers in a cloud server that are expected to perform their tasks and return the results [1], [2]. Because the workers may not return the true results and the client may be unable to control the workers, it may be unclear whether the returned result is actually true [3], which raises the problem of cloud system integrity [4]- [6].…”
Section: Introductionmentioning
confidence: 99%
“…smartphones [5][6]. Thus, although cloud-specific threats and vulnerabilities have already been identified or assessed by numerous sources [2,[7][8][9][10][11][12][13], it still remains unclear how Information Risk Management frameworks or methods can be applied in the context of the Cloud.…”
Section: Introductionmentioning
confidence: 99%
“…In Tables 1-3, we present an improved and combined list of threats applicable to a cloud deployment, based on various sources [2,8,10,17]. Each threat is mapped to indicative examples of vulnerabilities, which -if present -can facilitate its occurrence.…”
Section: Introductionmentioning
confidence: 99%