Privacy in cloud computing environments: a survey and research challenges

被引:28
作者
Ghorbel, Amal [1 ]
Ghorbel, Mahmoud [1 ]
Jmaiel, Mohamed [2 ]
机构
[1] Univ Sfax, ENIS, ReDCAD Lab, BP 1173, Sfax 3038, Tunisia
[2] Digital Res Ctr Sfax, BP 275, Sakiet Ezzit 3021, Sfax, Tunisia
关键词
Survey; Privacy; Cloud computing; Privacy issues; Data confidentiality; SECURITY ISSUES; ENFORCEMENT;
D O I
10.1007/s11227-016-1953-y
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Definitely, cloud computing represents a real evolution in the IT world that provides many advantages for both providers and users. This new paradigm includes several services that allow data storage and processing. However, outsourcing data to the cloud raises many issues related to privacy concerns. In fact, for some organizations and individuals, data privacy present a crucial aspect of their business. Indeed, their sensitive data (health, finance, personal information, etc.) have a very important value, and any infringement of privacy can cause great loss in terms of money and reputation. Therefore, without considering privacy issues, the adoption of cloud computing can be discarded by large spectra of users. In this paper, we provide a survey on privacy risks and challenges for public cloud computing. We present and evaluate the main existing solutions that have made great progress in this area. To better address privacy concerns, we point out considerations and guidelines while giving the remained open issues that require additional investigation efforts to fulfill preserving and enhancing privacy in public cloud.
引用
收藏
页码:2763 / 2800
页数:38
相关论文
共 77 条
[11]  
Baase S., 2008, A Gift of Fire: Social, Legal, and Ethical Issues for Computing and the Internet, 3rd Edition, V3rd
[12]  
Bahramipanah Maryam, 2016, 2016 Power Systems Computation Conference (PSCC), P1, DOI 10.1109/PSCC.2016.7540862
[13]   End-to-end policy based encryption techniques for multi-party data management [J].
Beiter, Michael ;
Mont, Marco Casassa ;
Chen, Liqun ;
Pearson, Siani .
COMPUTER STANDARDS & INTERFACES, 2014, 36 (04) :689-703
[14]   DEPSKY: Dependable and Secure Storage in a Cloud-of-Clouds [J].
Bessani, Alysson ;
Correia, Miguel ;
Quaresma, Bruno ;
Andre, Fernando ;
Sousa, Paulo .
ACM TRANSACTIONS ON STORAGE, 2013, 9 (04)
[15]  
Betgé-Brezetz S, 2013, IEEE INT CONF CL NET, P25, DOI 10.1109/CloudNet.2013.6710554
[16]  
Bezzi M, 2011, DATA USAGE CONTROL F
[17]  
Birnhack Michael D., 2008, Computer Law and Security Report, V24, P508, DOI 10.1016/j.clsr.2008.09.001
[18]  
Brandic Ivona, 2010, 2010 IEEE 3rd International Conference on Cloud Computing (CLOUD 2010), P244, DOI 10.1109/CLOUD.2010.42
[19]   Distributed Enforcement of Sticky Policies with Flexible Trust [J].
Brown, Jordan ;
Blough, Douglas M. .
2015 IEEE 17TH INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING AND COMMUNICATIONS, 2015 IEEE 7TH INTERNATIONAL SYMPOSIUM ON CYBERSPACE SAFETY AND SECURITY, AND 2015 IEEE 12TH INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS (ICESS), 2015, :1202-1209
[20]  
Bull G., 2001, Computer Law and Security Report, V17, P239, DOI 10.1016/S0267-3649(01)00705-1