Evaluation of The faults of Data Security and Privacy in the Cloud Computing

被引:0
作者
Waleed, Al-Museelem [1 ]
Li Chunlin [1 ]
机构
[1] Wuhan Univ Technol, Sch Comp Sci, Wuhan, Peoples R China
来源
PROCEEDINGS OF THE 2016 4TH INTERNATIONAL CONFERENCE ON MACHINERY, MATERIALS AND COMPUTING TECHNOLOGY | 2016年 / 60卷
关键词
Cloud computing; Data Security; Data Privacy; Ubuntu Cloud Simulation; CloudSim; SQL injection; Attacks; Encryption;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Recently the topic of Cloud Computing use is considered to be a burning issue as this notion is rather new and still not studied enough. Therefore, its advantages and disadvantages are currently discussed by the specialists. According to the definition, Cloud Computing is "a model for delivering information technology services in which resources are retrieved from the internet through web-based tools and applications, rather than a direct connection to a server. Data and software packages are stored in servers. However, cloud computing structure allows access to information as long as an electronic device has access to the web. The vital requirements include networking infrastructure that is physically available. The internet and the evolution that has taken place in the internet are also recognized as a major source and driving force behind the growth of cloud computing. End devices that are constantly evolving e.g. mobile, laptops, desktops are also recognized as essential in the support of cloud computing as a service. The problem is mainly the security and storage of client's data. In the paper the faults on security of their data storage and it's privacy is reviewed. It also includes in it conducted experiment and statistical analysis using ubuntu simulation. and CloudSim The paper identifies and evaluation the faults and proposes solutions to combat the identified problems.
引用
收藏
页码:1838 / 1843
页数:6
相关论文
共 14 条
[1]  
AlZain Mohammed A., 2012, Journal of Service Science Research, V4, P49, DOI 10.1007/s12927-012-0002-5
[2]  
[Anonymous], 2010, BUSINESS WIRE
[3]  
[Anonymous], 2010, Cloud security: a comprehensive guide to secure cloud computing wiley publishing
[4]  
[Anonymous], 2013, RES MARKETS OFFERS R
[5]  
[Anonymous], 2013, RES MARK ADDS REP ST
[6]  
Antonopoulos N, 2010, COMPUT COMMUN NETW S, P1, DOI 10.1007/978-1-84996-241-4
[7]  
Badamas M.A., 2012, Communications of the IIMA, V12, P1
[8]  
Bradner Scott, 2009, NETWORK WORLD, V26, P16
[9]  
Gutwirth S, 2011, COMPUTERS, PRIVACY AND DATA PROTECTION: AN ELEMENT OF CHOICE, P1, DOI 10.1007/978-94-007-0641-5
[10]  
Howell Donna, 2011, INVESTORS BUSIN 1107