Cloud computing security issues of sensitive data

Manpreet Kaur Walia, Malka Halgamuge, Nadeesha D Hettikankanamage, Craig Bellamy

Research output: Book chapter/Published conference paperChapter (peer-reviewed)peer-review

Abstract

Numerous organizations are using aspects of the cloud to store data, but as sensitive data is placed on the cloud, privacy and security become difficult to maintain. When users upload data to the cloud, they may become increasingly vulnerable to account hijacking, unauthorized access, and the data may become unavailable because of various technical reasons. Questions remain about the security of sensitive data in the cloud, and in this chapter, the authors perform an analysis of 36 peer reviewed publications describing 30 observations of cloud computing technology (2010-2017). In the articles, applications of cloud computing include, for instance, business (26%) and the internet of things (IoT; 2%), and the result suggests that some issues are unique to a particular domain (such as business, education, health) and some issues cross all domains. The results suggest that data integrity issues have the highest number of solutions whereas data breaches have the lowest number of solutions.
Original languageEnglish
Title of host publication Handbook of research on the IoT, cloud computing, and wireless network optimization
EditorsSurjit Singh, Rajeev Mohan Sharma
Place of PublicationHershey PA, USA
PublisherIGI Global
Chapter4
Pages60-84
Number of pages25
Edition1st
ISBN (Electronic)9781522573364
ISBN (Print)9781522573357
DOIs
Publication statusPublished - 2019

Publication series

NameAdvances in Wireless Technologies and Telecommunication (AWTT)
PublisherIGI Global
ISSN (Print)2327-3305
ISSN (Electronic)2327-3313

Fingerprint

Dive into the research topics of 'Cloud computing security issues of sensitive data'. Together they form a unique fingerprint.

Cite this