An effective cloud computing model enhancing privacy in cloud computing

被引:1
作者
Chawki, Mohamed [1 ,2 ]
机构
[1] Naif Arab Univ Secur Sci NAUSS, Riyadh, Saudi Arabia
[2] Naif Arab Univ Secur Sci NAUSS, Riyadh 11452, Saudi Arabia
来源
INFORMATION SECURITY JOURNAL | 2024年 / 33卷 / 06期
关键词
Cloud computing; GDPR; hacking; personal data; privacy; SECURITY; IDENTITY;
D O I
10.1080/19393555.2024.2307637
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud computing revolutionizes global software, system, infrastructure, and storage accessibility, offering flexibility and cost-effectiveness. This paper explores the pivotal intersection of cloud computing and privacy, presenting a model to enhance cloud privacy. Beginning with an insightful introduction, the paper conducts a comprehensive exploration. A meticulous literature review addresses data privacy intricacies in the cloud context. The study navigates international dimensions of personal data processing, revealing global implications beyond geographical boundaries. Delving into cloud computing's impact on user privacy, it emphasizes the delicate balance between convenience and safeguarding sensitive information. The examination of inherent cloud computing challenges, both technical and legal. A deep dive into recent privacy concerns is complemented by dissecting legal challenges, emphasizing the General Data Protection Regulation's (GDPR) far-reaching impact on the cloud industry. Contributions include a legal and technological overview, technologies for privacy protection, and a global legal framework. The paper identifies challenges and offers information on resolving legal intricacies. Proposed strategies provide a roadmap for industry stakeholders to ensure compliance and mitigate risks. The manuscript concludes with a future perspective on cloud computing's evolving landscape, offering insights into shaping technological advancements.
引用
收藏
页码:635 / 658
页数:24
相关论文
共 65 条
[1]   Cloud computing-enabled healthcare opportunities, issues, and applications: A systematic review [J].
Ali, Omar ;
Shrestha, Anup ;
Soar, Jeffrey ;
Wamba, Samuel Fosso .
INTERNATIONAL JOURNAL OF INFORMATION MANAGEMENT, 2018, 43 :146-158
[2]   Cyber security threats, challenges and defence mechanisms in cloud computing [J].
Aljumah, Abdullah ;
Ahanger, Tariq Ahamed .
IET COMMUNICATIONS, 2020, 14 (07) :1185-1191
[3]   Exploring Homomorphic Encryption and Differential Privacy Techniques towards Secure Federated Learning Paradigm [J].
Aziz, Rezak ;
Banerjee, Soumya ;
Bouzefrane, Samia ;
Vinh, Thinh Le .
FUTURE INTERNET, 2023, 15 (09)
[4]   Law Enforcement Agencies' activities in the cloud environment: a European legal perspective [J].
Balboni, Paolo ;
Pelino, Enrico .
INFORMATION & COMMUNICATIONS TECHNOLOGY LAW, 2013, 22 (02) :165-190
[5]   Cross-Cultural Counselling Supervision in Ukraine [J].
Baraka, Mandy Kellums ;
Zaporozhets, Olya ;
Sells, James N. ;
Goodyear, Rod K. .
INTERNATIONAL JOURNAL FOR THE ADVANCEMENT OF COUNSELLING, 2021, 43 (03) :320-339
[6]   Tracking GDPR Compliance in Cloud-Based Service Delivery [J].
Barati, Masoud ;
Rana, Omer .
IEEE TRANSACTIONS ON SERVICES COMPUTING, 2022, 15 (03) :1498-1511
[7]   Privacy Based Data Publishing Model for Cloud Computing Environment [J].
Bibal Benifa, J. V. ;
Venifa Mini, G. .
WIRELESS PERSONAL COMMUNICATIONS, 2020, 113 (04) :2215-2241
[8]   Cloud forecasting: Legal visibility issues in saturated environments [J].
Brown, Adam J. ;
Glisson, William Bradley ;
Andel, Todd R. ;
Choo, Kim-Kwang Raymond .
COMPUTER LAW & SECURITY REVIEW, 2018, 34 (06) :1278-1290
[9]   TPRPF: a preserving framework of privacy relations based on adversarial training for texts in big data [J].
Chai, Yuhan ;
Sun, Zhe ;
Qiu, Jing ;
Yin, Lihua ;
Tian, Zhihong .
FRONTIERS OF COMPUTER SCIENCE, 2022, 16 (04)
[10]  
Chernyshenko V., 2023, BLOCKCHAIN APPL TRAN