Computer Science &Amp; Information Technology ( CS &Amp; IT ) 2015
DOI: 10.5121/csit.2015.51611
|View full text |Cite
|
Sign up to set email alerts
|

Security and Privacy of Sensitive Data in Cloud Computing : A Survey of Recent Developments

Abstract: ABSTRACT

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
21
0

Year Published

2017
2017
2021
2021

Publication Types

Select...
6
4

Relationship

0
10

Authors

Journals

citations
Cited by 47 publications
(21 citation statements)
references
References 47 publications
0
21
0
Order By: Relevance
“…Several efforts have been made to conceptualize privacy jurists, philosophers, researchers, psychologists, and sociologists in order to give us better understanding of privacy -for example, Alan West in the research study conducted in 1960 is considered to be the first significant work highlighting the problem of consuming data privacy and data protection. West defines privacy as "the claim of individuals groups, or institutions to determine for themselves when, how, and what extent information about them is communicated to other" (Gholami and Laure, 2015). aims to setup a decoy system that appears to have several vulnerabilities for easier access to its resources; and should be set up in a similar manner to those of production servers in the firm, and to be loaded with numerous fake files, directories, and other information that may look real.…”
Section: Trust and Behavioral Intention To Use Cloud Computingmentioning
confidence: 99%
“…Several efforts have been made to conceptualize privacy jurists, philosophers, researchers, psychologists, and sociologists in order to give us better understanding of privacy -for example, Alan West in the research study conducted in 1960 is considered to be the first significant work highlighting the problem of consuming data privacy and data protection. West defines privacy as "the claim of individuals groups, or institutions to determine for themselves when, how, and what extent information about them is communicated to other" (Gholami and Laure, 2015). aims to setup a decoy system that appears to have several vulnerabilities for easier access to its resources; and should be set up in a similar manner to those of production servers in the firm, and to be loaded with numerous fake files, directories, and other information that may look real.…”
Section: Trust and Behavioral Intention To Use Cloud Computingmentioning
confidence: 99%
“…To keep the sensitive information secret in a relationship is not only stressful to maintain but can be damage in various ways. There are many secrets such as alcoholism or abuses, which are required to keep secret from others [7].…”
Section: B Secrecymentioning
confidence: 99%
“…Note that the concept foretold revolves around data, and whenever we talk about data we must address both security and privacy issues [6][7][8][9] involved around it, especially with the rate at which data are enormously out growing in quantity.…”
Section: Introductionmentioning
confidence: 99%