Abstract

Cloud computing have slowly made it way and has gained popularity with its services and products and they have repeatedly increased, and many users are attracted to migrate their data into the cloud. But there are still issues which concern users when outsourcing their data and the business application into the cloud, security and privacy are very critical and created trust concern. There are 5 attributes related to security and privacy as follow; privacy-preservability, availability, integrity, confidentiality and accountability. The aim of this paper is to improve security in the cloud because the uses of cloud services has been more increasing and in the next few years would be likely the cloud services will be a big driving force, better to be prepare and develop majors to encounter and security loophole that may arise in the near future.
Original languageEnglish
Title of host publicationStatistics for data science and policy analysis
EditorsAzizur Rahman
PublisherSpringer
Pages173-183
Number of pages11
ISBN (Electronic)9789811517358
ISBN (Print)9789811517341
Publication statusPublished - 2020
EventThe 2nd Applied Statistics and Policy Analysis Conference: ASPAC2019 - Charles Sturt University, Wagga Wagga, Australia
Duration: 05 Sep 201906 Sep 2019
http://csusap.csu.edu.au/~azrahman/ASPAC2019/
http://csusap.csu.edu.au/~azrahman/ASPAC2019/Program%20draft.pdf?attredirects=0&d=1 (program)
http://csusap.csu.edu.au/~azrahman/ASPAC2019/ASPAC2019_Refereed_Book%20of%20Abstracts.pdf?attredirects=0&d=1 (book of abstracts)
https://ebookcentral.proquest.com/lib/CSUAU/detail.action?docID=6152166 (proceedings)

Conference

ConferenceThe 2nd Applied Statistics and Policy Analysis Conference
Abbreviated titleEffective policy through the use of big data, accurate estimates and modern computing tools and statistical modelling
CountryAustralia
CityWagga Wagga
Period05/09/1906/09/19
OtherProceedings due for publication May 2020 https://www.springer.com/gp/book/9789811517341
Internet address

Fingerprint Dive into the research topics of 'Data privacy and security in the cloud'. Together they form a unique fingerprint.

Cite this