TY - CHAP
T1 - Cloud computing security issues of sensitive data
AU - Kaur Walia, Manpreet
AU - Halgamuge, Malka
AU - Hettikankanamage, Nadeesha D
AU - Bellamy, Craig
N1 - Includes bibliographical references
PY - 2019
Y1 - 2019
N2 - Numerous organizations are using aspects of the cloud to store data, but as sensitive data is placed on the cloud, privacy and security become difficult to maintain. When users upload data to the cloud, they may become increasingly vulnerable to account hijacking, unauthorized access, and the data may become unavailable because of various technical reasons. Questions remain about the security of sensitive data in the cloud, and in this chapter, the authors perform an analysis of 36 peer reviewed publications describing 30 observations of cloud computing technology (2010-2017). In the articles, applications of cloud computing include, for instance, business (26%) and the internet of things (IoT; 2%), and the result suggests that some issues are unique to a particular domain (such as business, education, health) and some issues cross all domains. The results suggest that data integrity issues have the highest number of solutions whereas data breaches have the lowest number of solutions.
AB - Numerous organizations are using aspects of the cloud to store data, but as sensitive data is placed on the cloud, privacy and security become difficult to maintain. When users upload data to the cloud, they may become increasingly vulnerable to account hijacking, unauthorized access, and the data may become unavailable because of various technical reasons. Questions remain about the security of sensitive data in the cloud, and in this chapter, the authors perform an analysis of 36 peer reviewed publications describing 30 observations of cloud computing technology (2010-2017). In the articles, applications of cloud computing include, for instance, business (26%) and the internet of things (IoT; 2%), and the result suggests that some issues are unique to a particular domain (such as business, education, health) and some issues cross all domains. The results suggest that data integrity issues have the highest number of solutions whereas data breaches have the lowest number of solutions.
UR - https://www.igi-global.com/book/handbook-research-iot-cloud-computing/206185
U2 - 10.4018/978-1-5225-7335-7.ch004
DO - 10.4018/978-1-5225-7335-7.ch004
M3 - Chapter (peer-reviewed)
SN - 9781522573357
T3 - Advances in Wireless Technologies and Telecommunication (AWTT)
SP - 60
EP - 84
BT - Handbook of research on the IoT, cloud computing, and wireless network optimization
A2 - Singh, Surjit
A2 - Sharma, Rajeev Mohan
PB - IGI Global
CY - Hershey PA, USA
ER -