Abstract
In past few years, cloud computing is one of the popular paradigm to host and deliver services over Internet. It is having popularity by offering multiple computing services as cloud storage, cloud hosting and cloud servers etc., for various types of businesses as well as in academics. Though there are several benefits of cloud computing, it suffers from security and privacy challenges. Privacy of cloud system is a serious concern for the customers. Considering the privacy within the cloud there are numerous threats to the user's sensitive data on cloud storage. In this study, we give a survey on numerous works on cloud computing, provide a survey on several research on cloud privacy issues, classify current solutions for privacy issues in cloud environments as architectures, approaches and methods and the advantages and disadvantages of current studies are tabulated. Moreover, it also discusses open research challenges and recommends future research directions. The main goal of this study is to offer a better understanding of the privacy challenges of cloud computing and to focus on current gaps to fulfil the privacy issue.
Highlights
The significance of cloud computing is increasing and is getting a rising attention in the scientific and industrial communities
This study presents a survey on numerous research on cloud computing, provides a survey on several research on cloud privacy issues, categorizes current solutions for privacy issues in cloud environments as architectures, approaches and methods and the advantages and disadvantages of current studies are tabulated
Trusted Cloud Computing Platform (TCCP) ensures the trustworthy execution of guest VMs and permits clients to verify the Infrastructure as a Service (IaaS) provider and able to know if the service is safe and secure before the clients launch their VMs
Summary
The significance of cloud computing is increasing and is getting a rising attention in the scientific and industrial communities. Pearson et al (2009) have discussed a privacy managing system for cloud computing environment, which decrease the risk of user’s private information being misused and helps the cloud systems provider to ensure the privacy laws. TCCP ensures the trustworthy execution of guest VMs and permits clients to verify the IaaS provider and able to know if the service is safe and secure before the clients launch their VMs. Song et al (2011) have presented a new framework for privacy-protected private data recovery service known as parity cloud service. Mowbray et al (2010) have discussed the privacy manager issues or decrease performance overhead Their simulation related to cloud computing system, which results showed that the proposed scheme satisfies user- controls policy-based obfuscation and de-obfuscation of demand privacy requirement and offers the better performance at the same time. A number of Cloud Computing system providers have concerned about security and privacy problems and they are unable to sort out appropriate solution in five aspects
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
More From: Research Journal of Applied Sciences, Engineering and Technology
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.