2009 ICSE Workshop on Software Engineering Challenges of Cloud Computing 2009
DOI: 10.1109/cloud.2009.5071532
|View full text |Cite
|
Sign up to set email alerts
|

Taking account of privacy when designing cloud computing services

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
206
0
2

Year Published

2011
2011
2024
2024

Publication Types

Select...
7
3

Relationship

0
10

Authors

Journals

citations
Cited by 402 publications
(209 citation statements)
references
References 6 publications
1
206
0
2
Order By: Relevance
“…Pearson identified several privacy risks for cloud computing for users, organizations, cloud platform implementers, and providers. In particular, the main risks are disclosure of personal information, noncompliance with enterprise policies, loss of reputation [24]. In [25], Khosravani et al present a case study about managing the risk of cloud adoption associated with highly sensitive data on children and sexual abuse cases of a charity.…”
Section: Introductionmentioning
confidence: 99%
“…Pearson identified several privacy risks for cloud computing for users, organizations, cloud platform implementers, and providers. In particular, the main risks are disclosure of personal information, noncompliance with enterprise policies, loss of reputation [24]. In [25], Khosravani et al present a case study about managing the risk of cloud adoption associated with highly sensitive data on children and sexual abuse cases of a charity.…”
Section: Introductionmentioning
confidence: 99%
“…identifiable information (PII) has easily found in the cloud computing service because of the privacy issues [16]. Once the provider known that the PII like Name, Address and Credit card number, it will create many difficulties to the user.…”
Section: And Challengesmentioning
confidence: 99%
“…Another important issue of cloud application is about security issue, literature [14] proposed a clientbased privacy data management, reduced the risks of cloud computing application by reducing the transmission of sensitive data, preventing leakage and loss of sensitive data under different scenarios. This shows that we should consider security policies in the early of cloud design [15], while there is also a need to deliver the message, share information and interact about the data between the user and service provider of the internet. But the distributed architecture of cloud computing makes the security issues more complex.…”
Section: Research Statusmentioning
confidence: 99%